BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘BeyondTrust’

retinacs-insight-scalability

Scalability Part Deuce

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions….

Post by Morey Haber October 9, 2013
Tags:
, , , , , ,
ScanMetrics-screenshot

Now Available: Retina Unlimited – $1,200 Unlimited IP Addresses

It has been over 15 years since we first introduced Retina, the Network Security Scanner, to the world. In those early days the vulnerability assessment space was still in its infancy with much of the focus being around scanning network based services for remotely exploitable vulnerabilities. Back then there were no compliance mandates or policies…

Post by Marc Maiffret October 8, 2013
Tags:
, , , , ,
Retina Security Scanner

Scalability When You Need It

I think we have all been there before. We pilot a solution, run the gambit of tests in the lab, and when it comes to production, the scalability falls flat on its face. It does not matter if the solution was architected correctly for the environment with multiple nodes, high performance database, and tons of…

Post by Morey Haber September 25, 2013
Tags:
, , ,
Retina CS

Building Automated Vulnerability Audit Groups

From time to time, the field engineering team and I see the same request cross our desks in a short period of time. This time it was how to remove certain types of audits from running when performing a vulnerability scan originating from Retina CS. The old way of doing things would have required the…

Post by Bill Tillson September 20, 2013
Tags:
, , , , , , ,
vmworld2013_logo_richblack

Live from VMWorld

This time it is all about virtualization and rightfully so. VMWorld 2013 is one of the largest shows I have seen in a long time, focused solely on a single subject and vendors are spread out across the expo floor covering everything from layer 7 switching fabrics for virtualized networks, to high speed SSD caches…

Post by Morey Haber August 27, 2013
Tags:
, , , , , ,
patch-tuesday

August 2013 Patch Tuesday

Just a little over one week after hackers flooded Vegas for BlackHat and Defcon, August’s Patch Tuesday greets us with eight bulletins: three critical and five important. Software fixed this month includes Internet Explorer, Exchange, Windows, and Active Directory. MS13-059 addresses 11 privately disclosed vulnerabilities, including multiple memory corruptions, an information disclosure, and a privilege…

Post by BeyondTrust Research Team August 13, 2013
Tags:
,
patch-tuesday

July 2013 Patch Tuesday

July’s patch Tuesday fixes vulnerabilities in .NET, Windows, and Internet Explorer. There are a total of seven bulletins addressing 34 unique vulnerabilities; six bulletins are rated critical and one is rated important. MS13-052 addresses a TrueType font parsing vulnerability in .NET (CVE-2013-3129, also addressed in MS13-053 and MS13-054), as well as six other vulnerabilities. This…

Post by BeyondTrust Research Team July 9, 2013
Tags:
, ,
sclogoupdated_1448

Our CTO Writes for SC Magazine’s Threat of the Month: SCADA “sport fishing”

Our CTO, Marc Maiffret wrote for the SC Magazine column,Threat of the Month: SCADA “sport fishing” section yesterday. Read an excerpt below and read the full article here. What is it? SCADA is not just a focus because of its often critical deployments, but also because performing vulnerability research on SCADA systems is easy, like…

Post by Sarah Lieber July 2, 2013
Tags:
, , , , , , , ,
BTU2

School is in Session

We’re proud to announce that we’ve scheduled the next installments of BeyondTrust University. BeyondTrust’s commitment to our customer’s success goes beyond the typical vendor/client relationship. To better serve our customers and partners who rely upon our privilege identity and vulnerability management solutions, we have developed a world-class training curriculum to complement our award-winning security and…

Post by Mike Puterbaugh July 1, 2013
Tags:
, , , ,
patch-tuesday

EMET 4.0: Adding a Layer to the Security Onion

With the release of the EMET 4.0 beta back in April, it’s no surprise that there has been a lot of buzz lately around Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). Now, after some delay, the beta testing is over and the brand new, and very shiny, EMET v4 has been released. The latest version of…

Post by BeyondTrust Research Team June 19, 2013
Tags:
, ,