BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Scalability Part Deuce

Posted October 9, 2013    Morey Haber

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions. It includes:

  • Retina Network Security Scanner – Vulnerability assessment scan engine that can be licensed and used stand alone or with Retina CS to scale to any enterprise size environment
  • Retina CS Threat Management Console – The central management console for all BeyondTrust solutions from vulnerability management to privileged identity management
  • Retina Insight – A complete structured big data warehouse that ships for free with Retina CS
  • Retina Protection Agent – A light weight agent based scan engine for assets that can not be assessed for vulnerabilities over a network due to environmental and configuration settings

In order to scale down, our clients generally license the Retina Network Security Scanner and perform point and shoot scans as needed to get a snap shot of their environment. This data can generate local reports or be connected to Retina CS at a later time to upload the results for a true air gapped perspective of an environment. Recently, BeyondTrust began offering the Retina Network Security Scanner with an Unlimited scanning license. This new bundle is ideal for every organization to get started with vulnerability assessment or as a secondary tool to verify the results. It is a great way to scale down with unlimited assessment capabilities from your desktop, virtual machine, or server.

retinacs-insight-scalability

The second side of scalability is how we scan down to the desktop or server as an individual entity. Using the Retina Protection Agent, environments can install a light weight agent on their systems to perform scheduled vulnerability assessments and automatically forward the results to Retina CS when a connection is available. This is ideal for mobile laptops and other devices that require an assessment but are not connected reliably to the network and servers that are hardened and do not permit a remote authenticated scan.

vulnerability-assessment-report-scalability

Finally, and again thank you for the feedback, is how we scale wide. Retina has extensive third party integrations and can interface with leading GRC, SEIM, and Call Center technologies. One of the biggest, used in many enterprise environments, is RSA Archer eGRC. Based on the data shown in the previous blog, Archer can consume Threat Management information from Retina CS and display the results as part of your current risk and threat processes. In the screen shot below, that same 100,000 database was consumed in only a few hours and produced information that can scale to any size environment managing risk with this technology.

rsa-archer-scalability

The technology BeyondTrust offers is not just scalable throughout the enterprise; it can truly scale down to individual users and individual security assessment teams. It can scale from a remote user to an enterprise wide eGRC solution. It has been engineered to grow with your business and provide point and shoot technology when stuck in a dreaded fire fight situation (identifying an outbreak on critical systems, for example). The technology we offer can meet your most demanding needs. Learn more about Retina Network Security Scanner Unlimited Now!

Tags:
, , , , , ,

Leave a Reply

Additional articles

Restricted Area Sign

Implementing Least Privilege for Windows the Easy Way

Posted July 31, 2014    Morey Haber

The concept of least privilege states that asset users should have the lowest level of access privileges required to effectively conduct their jobs. Implementing least privilege can bring several benefits to your organization, including: Increased security by reducing the attack surface available to users and to potential attackers who compromise user systems via phishing, malware,…

Tags:
, , ,
gartner market guide image - aug 2014

Introducing the Gartner Market Guide for Privileged Account Management

Posted July 29, 2014    Chris Burd

Gartner recently released a new Market Guide for Privileged Account Management (PAM), and we’d like to share a complimentary copy with you. The report includes PAM market analysis and direction, vendor overviews, and recommendations for selecting PAM solutions for your environment. BeyondTrust is one of two representative vendors (out of 20) to address all solution…

Tags:
, , , , , , , ,
Integrating Least Privilege and Password Management to Solve Account Security Challenges

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Posted July 24, 2014    Morey Haber

There is a reason all BeyondTrust Privileged Account Management (PAM) solutions share the PowerBroker name: They all inherently enable you to reduce user-based risk and can be integrated under a centralized IT risk management platform. Here’s one common use case that demonstrates how this integration changes the playing field. Consider the challenge of privileged access:…

Tags:
, , , , ,