BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘Retina CS’

scmag1-98x98

BeyondTrust Receives 5 Star Rating from SC Magazine

Recently our UVM20 Security Management Appliance received a perfect 5-star review + “Best Buy” recognition from SC Magazine. Read the full review here. The UVM20 includes several pre-installed and pre-configured solutions: Retina Network Security Scanner, PowerBroker for UNIX/Linux, and PowerBroker for Windows, plus our patch management, regulatory reporting and configuration compliance modules — in addition…

Post by Sarah Lieber February 4, 2014
Tags:
, , , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE

Retina Performs Continuous Vulnerability Assessment

SANS Critical Control 4 specifies criteria for continuous vulnerability assessment and remediation. This specification calls for vulnerabilities to be continuously assessed, correlated, and reported upon in real-time based on public disclosure and identification of new or changed assets. Critical Control 4 is mandated by many government agencies, and requires prompt automated remediation that adheres to…

Post by Morey Haber January 28, 2014
Tags:
, , , ,
Retina CS

Building Automated Vulnerability Audit Groups

From time to time, the field engineering team and I see the same request cross our desks in a short period of time. This time it was how to remove certain types of audits from running when performing a vulnerability scan originating from Retina CS. The old way of doing things would have required the…

Post by Bill Tillson September 20, 2013
Tags:
, , , , , , ,
Retina CS

Top 5 Tips and Tricks for Retina CS 4.5

I honestly believe we have the best pre-sales, post sales, and technical support departments in the security industry. They are responsive, technical, and can customize BeyondTrust solutions to match individual business requirements, even when they are pretty comprehensive outside-of-the-box. Based on their work, we have an internal process and external knowledge base to document these…

Post by Morey Haber August 8, 2013
Tags:
, , , , , , ,

Controlling User Accounts and Regulatory Compliance

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can…

Post by Morey Haber July 15, 2013
Tags:
, , , , , , , , , , ,
retinacs-tierarchitecture

What can the Retina CS Threat Management Console do for me?

I am spending this week at the Microsoft Worldwide Partner Conference. It is a change for me. I am attending as a participant partner verses working the traditional conference trade show booth. This is relevant to the blog because as a I network with other partners, I find myself explaining BeyondTrust as a dynamic security…

Post by Morey Haber July 10, 2013
Tags:
, , , , , ,
sclogoupdated_1448

Our CTO Writes for SC Magazine’s Threat of the Month: SCADA “sport fishing”

Our CTO, Marc Maiffret wrote for the SC Magazine column,Threat of the Month: SCADA “sport fishing” section yesterday. Read an excerpt below and read the full article here. What is it? SCADA is not just a focus because of its often critical deployments, but also because performing vulnerability research on SCADA systems is easy, like…

Post by Sarah Lieber July 2, 2013
Tags:
, , , , , , , ,
retinacs-dashboard

Our Newest Product Release: Retina CS 4.5

We are very excited for our latest release of Retina CS 4.5. With this release, the Retina CS platform continues to extend our leadership in risk identification and prioritization. By integrating the PowerBroker product portfolio with Retina CS, our customers are able to combine vulnerability data with privileged identity and password management risk intelligence, which provides them with improved situational…

Post by Sarah Lieber June 13, 2013
Tags:
, , , , , , , , , ,

June 2013 Patch Tuesday

It’s halfway through the year and we are seeing the total bulletin count creep just past fifty. This month, Microsoft is providing patches for Internet Explorer, the Windows kernel (and kernel-mode drivers), Windows print spooler components, and Microsoft Office. There are five bulletins in total, comprised of 1 critical (Internet Explorer) bulletin and the remaining…

Post by BeyondTrust Research Team June 11, 2013
Tags:
, , , , , ,
PBW with RI

Our Newest Product Release: PowerBroker for Windows 6.0

We’re very excited to announce the release of PowerBroker for Windows 6.0, the industry’s first identity management solution able to leverage least privilege and vulnerability data scanned by the award winning Retina CS Threat Management Console. This allows our customers to take a system’s overall risk into context when deciding what level of privileges a user or…

Post by Sarah Lieber June 5, 2013
Tags:
, , , , , , , , , ,