BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Scalability Part Deuce

Posted October 9, 2013    Morey Haber

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions. It includes:

  • Retina Network Security Scanner – Vulnerability assessment scan engine that can be licensed and used stand alone or with Retina CS to scale to any enterprise size environment
  • Retina CS Threat Management Console – The central management console for all BeyondTrust solutions from vulnerability management to privileged identity management
  • Retina Insight – A complete structured big data warehouse that ships for free with Retina CS
  • Retina Protection Agent – A light weight agent based scan engine for assets that can not be assessed for vulnerabilities over a network due to environmental and configuration settings

In order to scale down, our clients generally license the Retina Network Security Scanner and perform point and shoot scans as needed to get a snap shot of their environment. This data can generate local reports or be connected to Retina CS at a later time to upload the results for a true air gapped perspective of an environment. Recently, BeyondTrust began offering the Retina Network Security Scanner with an Unlimited scanning license. This new bundle is ideal for every organization to get started with vulnerability assessment or as a secondary tool to verify the results. It is a great way to scale down with unlimited assessment capabilities from your desktop, virtual machine, or server.

retinacs-insight-scalability

The second side of scalability is how we scan down to the desktop or server as an individual entity. Using the Retina Protection Agent, environments can install a light weight agent on their systems to perform scheduled vulnerability assessments and automatically forward the results to Retina CS when a connection is available. This is ideal for mobile laptops and other devices that require an assessment but are not connected reliably to the network and servers that are hardened and do not permit a remote authenticated scan.

vulnerability-assessment-report-scalability

Finally, and again thank you for the feedback, is how we scale wide. Retina has extensive third party integrations and can interface with leading GRC, SEIM, and Call Center technologies. One of the biggest, used in many enterprise environments, is RSA Archer eGRC. Based on the data shown in the previous blog, Archer can consume Threat Management information from Retina CS and display the results as part of your current risk and threat processes. In the screen shot below, that same 100,000 database was consumed in only a few hours and produced information that can scale to any size environment managing risk with this technology.

rsa-archer-scalability

The technology BeyondTrust offers is not just scalable throughout the enterprise; it can truly scale down to individual users and individual security assessment teams. It can scale from a remote user to an enterprise wide eGRC solution. It has been engineered to grow with your business and provide point and shoot technology when stuck in a dreaded fire fight situation (identifying an outbreak on critical systems, for example). The technology we offer can meet your most demanding needs. Learn more about Retina Network Security Scanner Unlimited Now!

Tags:
, , , , , ,

Leave a Reply

Additional articles

ovum-research

New Analyst SWOT Assessment Identifies Key Strengths of PowerBroker

Posted November 24, 2014    Scott Lang

Following on the heels of the Gartner PAM market guide and Frost & Sullivan review of Password Safe comes a new analyst review of our BeyondInsight and PowerBroker platforms, a SWOT assessment of BeyondTrust written by Ovum. Ovum’s honest and thorough review of BeyondTrust indicates that we are delivering, “…an integrated, one-stop approach to PAM….

Tags:
, , ,

Patented Windows privilege management brings you unmatched benefits

Posted November 24, 2014    Scott Lang

We are pleased to announce that BeyondTrust has been granted a new U.S. Patent (No. 8,850,549) for privilege management, validating our approach to helping our customers achieve least privilege in Windows environments. The methods and systems that we employ for controlling access to resources and privileges per process are unique to BeyondTrust PowerBroker for Windows….

Tags:
6

A Quick Look at MS14-068

Posted November 20, 2014    BeyondTrust Research Team

Microsoft recently released an out of band patch for Kerberos.  Taking a look at the Microsoft security bulletin, it seems like there is some kind of issue with Kerberos signatures related to tickets. Further information is available in the Microsoft SRD Blogpost So it looks like there is an issue with PAC signatures.  But what…

Tags:
, , , ,