BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Scalability Part Deuce

Posted October 9, 2013    Morey Haber

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions. It includes:

  • Retina Network Security Scanner – Vulnerability assessment scan engine that can be licensed and used stand alone or with Retina CS to scale to any enterprise size environment
  • Retina CS Threat Management Console – The central management console for all BeyondTrust solutions from vulnerability management to privileged identity management
  • Retina Insight – A complete structured big data warehouse that ships for free with Retina CS
  • Retina Protection Agent – A light weight agent based scan engine for assets that can not be assessed for vulnerabilities over a network due to environmental and configuration settings

In order to scale down, our clients generally license the Retina Network Security Scanner and perform point and shoot scans as needed to get a snap shot of their environment. This data can generate local reports or be connected to Retina CS at a later time to upload the results for a true air gapped perspective of an environment. Recently, BeyondTrust began offering the Retina Network Security Scanner with an Unlimited scanning license. This new bundle is ideal for every organization to get started with vulnerability assessment or as a secondary tool to verify the results. It is a great way to scale down with unlimited assessment capabilities from your desktop, virtual machine, or server.

retinacs-insight-scalability

The second side of scalability is how we scan down to the desktop or server as an individual entity. Using the Retina Protection Agent, environments can install a light weight agent on their systems to perform scheduled vulnerability assessments and automatically forward the results to Retina CS when a connection is available. This is ideal for mobile laptops and other devices that require an assessment but are not connected reliably to the network and servers that are hardened and do not permit a remote authenticated scan.

vulnerability-assessment-report-scalability

Finally, and again thank you for the feedback, is how we scale wide. Retina has extensive third party integrations and can interface with leading GRC, SEIM, and Call Center technologies. One of the biggest, used in many enterprise environments, is RSA Archer eGRC. Based on the data shown in the previous blog, Archer can consume Threat Management information from Retina CS and display the results as part of your current risk and threat processes. In the screen shot below, that same 100,000 database was consumed in only a few hours and produced information that can scale to any size environment managing risk with this technology.

rsa-archer-scalability

The technology BeyondTrust offers is not just scalable throughout the enterprise; it can truly scale down to individual users and individual security assessment teams. It can scale from a remote user to an enterprise wide eGRC solution. It has been engineered to grow with your business and provide point and shoot technology when stuck in a dreaded fire fight situation (identifying an outbreak on critical systems, for example). The technology we offer can meet your most demanding needs. Learn more about Retina Network Security Scanner Unlimited Now!

Tags:
, , , , , ,

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,