BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Scalability Part Deuce

Posted October 9, 2013    Morey Haber

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions. It includes:

  • Retina Network Security Scanner – Vulnerability assessment scan engine that can be licensed and used stand alone or with Retina CS to scale to any enterprise size environment
  • Retina CS Threat Management Console – The central management console for all BeyondTrust solutions from vulnerability management to privileged identity management
  • Retina Insight – A complete structured big data warehouse that ships for free with Retina CS
  • Retina Protection Agent – A light weight agent based scan engine for assets that can not be assessed for vulnerabilities over a network due to environmental and configuration settings

In order to scale down, our clients generally license the Retina Network Security Scanner and perform point and shoot scans as needed to get a snap shot of their environment. This data can generate local reports or be connected to Retina CS at a later time to upload the results for a true air gapped perspective of an environment. Recently, BeyondTrust began offering the Retina Network Security Scanner with an Unlimited scanning license. This new bundle is ideal for every organization to get started with vulnerability assessment or as a secondary tool to verify the results. It is a great way to scale down with unlimited assessment capabilities from your desktop, virtual machine, or server.

retinacs-insight-scalability

The second side of scalability is how we scan down to the desktop or server as an individual entity. Using the Retina Protection Agent, environments can install a light weight agent on their systems to perform scheduled vulnerability assessments and automatically forward the results to Retina CS when a connection is available. This is ideal for mobile laptops and other devices that require an assessment but are not connected reliably to the network and servers that are hardened and do not permit a remote authenticated scan.

vulnerability-assessment-report-scalability

Finally, and again thank you for the feedback, is how we scale wide. Retina has extensive third party integrations and can interface with leading GRC, SEIM, and Call Center technologies. One of the biggest, used in many enterprise environments, is RSA Archer eGRC. Based on the data shown in the previous blog, Archer can consume Threat Management information from Retina CS and display the results as part of your current risk and threat processes. In the screen shot below, that same 100,000 database was consumed in only a few hours and produced information that can scale to any size environment managing risk with this technology.

rsa-archer-scalability

The technology BeyondTrust offers is not just scalable throughout the enterprise; it can truly scale down to individual users and individual security assessment teams. It can scale from a remote user to an enterprise wide eGRC solution. It has been engineered to grow with your business and provide point and shoot technology when stuck in a dreaded fire fight situation (identifying an outbreak on critical systems, for example). The technology we offer can meet your most demanding needs. Learn more about Retina Network Security Scanner Unlimited Now!

Tags:
, , , , , ,

Leave a Reply

Additional articles

randy franklin smith

At the End of Day You Can’t Control What Privileged Users Do: It’s about Detective/Deterrent Controls and Accountability

Posted March 31, 2015    Randy Franklin Smith

Live Webinar: Thursday, April 2, 2015 | 10am PT/1pm ET | REGISTER NOW! In this webinar, Security Expert Randy Franklin Smith will look at how to audit what admins do inside Linux and UNIX with sudo’s logging capabilities.

Tags:
, ,
BA_Hacked

British Airways Executive Club Member Accounts Hacked

Posted March 30, 2015    Brian Chappell

British Airways has released information regarding the hacking of a number of their Executive Club (BA’s frequent flyer programme) member’s accounts.

Tags:
, , ,
webinar_ondemand

On Demand Webinar – Why You Still Suck at Patching

Posted March 27, 2015    Lindsay Marsh

On Demand Webinar: Dave Shackleford recounts some of his personal experiences in patch management failure, and breaks down the most critical issues holding many teams back from patching more effectively.

Tags:
,