BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘retina’

windows of opp-img1

Seizing Windows of Opportunity for Vulnerability Assessment

The change control process for many organizations dictates that vulnerability assessment scanning can only occur during predefined scan windows. During these times, teams are notified that an assessment will be conducted and that alerts from IDS/IPS sensors, SIEMS, and local AV agents should be ignored or whitelisted from the scanners. This is a very typical…

Post by Morey Haber April 1, 2014
Tags:
, , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
MAS-image

Addressing the MAS Technology Risk Management Guidelines with Privilege and Vulnerability Management

The Monetary Authority of Singapore (MAS) is Singapore’s central bank and financial regulatory authority. The MAS frequently releases guidelines that address emerging technologies and evolving threat landscape. In June 2013, the MAS created an updated set of guidelines for Internet Banking and Technology Risk Management (IBTRM). This addendum mandates certain requirements for Technology Risk Management…

Post by Morey Haber March 12, 2014
Tags:
, , , , ,
Access-Report1

Neophytes and Professionals

There is a first time for everything. Your first steps, your first date, your first child, your first vulnerability assessment scan. A first time for everything. The Retina Network Security Scanner Unlimited makes taking the first step incredibly easy and affordable. For security professionals, it is just another step in making sure your assets are…

Post by Morey Haber February 14, 2014
Tags:
, , , ,

Retina Performs Continuous Vulnerability Assessment

SANS Critical Control 4 specifies criteria for continuous vulnerability assessment and remediation. This specification calls for vulnerabilities to be continuously assessed, correlated, and reported upon in real-time based on public disclosure and identification of new or changed assets. Critical Control 4 is mandated by many government agencies, and requires prompt automated remediation that adheres to…

Post by Morey Haber January 28, 2014
Tags:
, , , ,

The 5 Keys to Context-Aware Vulnerability Management

Retina not only identifies security exposures across your entire IT landscape, but also gives you the insight you need to better understand, mitigate and communicate risk. Check out this video to see what makes Retina the most context-aware vulnerability management solution on the market. Learn more about Retina here. The 5 Keys to Context-Aware Vulnerability…

Post by Sarah Lieber October 28, 2013
Tags:
, , , , , ,
Retina Security Scanner

Scalability When You Need It

I think we have all been there before. We pilot a solution, run the gambit of tests in the lab, and when it comes to production, the scalability falls flat on its face. It does not matter if the solution was architected correctly for the environment with multiple nodes, high performance database, and tons of…

Post by Morey Haber September 25, 2013
Tags:
, , ,
vmworld2013_logo_richblack

Live from VMWorld

This time it is all about virtualization and rightfully so. VMWorld 2013 is one of the largest shows I have seen in a long time, focused solely on a single subject and vendors are spread out across the expo floor covering everything from layer 7 switching fabrics for virtualized networks, to high speed SSD caches…

Post by Morey Haber August 27, 2013
Tags:
, , , , , ,
patch-tuesday

EMET 4.0: Adding a Layer to the Security Onion

With the release of the EMET 4.0 beta back in April, it’s no surprise that there has been a lot of buzz lately around Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). Now, after some delay, the beta testing is over and the brand new, and very shiny, EMET v4 has been released. The latest version of…

Post by BeyondTrust Research Team June 19, 2013
Tags:
, ,

June 2013 Patch Tuesday

It’s halfway through the year and we are seeing the total bulletin count creep just past fifty. This month, Microsoft is providing patches for Internet Explorer, the Windows kernel (and kernel-mode drivers), Windows print spooler components, and Microsoft Office. There are five bulletins in total, comprised of 1 critical (Internet Explorer) bulletin and the remaining…

Post by BeyondTrust Research Team June 11, 2013
Tags:
, , , , , ,
guy-stress-m

Do you want to do this the “hard” way?

Too often I see people working on what they can fix, what is easy. It’s like when I exercise, if I see progress I keep working at it but the problem areas (there are a lot of them) can wait until tomorrow. Over the past several years I see organizations doing a better job with…

Post by Mike Yaffe May 28, 2013
Tags:
, , , , ,