BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘Retina CS’

RPA-screenshot

Advanced Architectures with the Retina Protection Agent

One of the extended features of Retina CS is the Retina Protection Agent. This component is licensed with Retina and allows for users to assess hosts for vulnerabilities using a local scanning agent verses a network scan. This forgoes the need of a traditional SaaS or on-premise vulnerability assessment solution to perform a scan outside…

Post by Morey Haber May 31, 2013
Tags:
, , , ,
retina-cs-calendar

Retina CS 4.5 – Calendars and Vulnerability Smart Rules

One of the many challenges facing Product Management today is addressing client feature requests. Often times, the request for a specific business problem does not translate to other customers or markets. Other times, the request is so complicated to explain, it takes multiple discussions to figure out the root problem and to figure out if…

Post by Morey Haber May 21, 2013
Tags:
, , , ,
EventStream-Reports

PowerBroker for Windows Rule Creation with Retina CS

For any enterprise solution, manually creating rules can be a daunting task and repetitive exercise. This problem is even more complex when working with solutions that potentially touch every application within your environment. Consider the complexity of identifying every application that requires escalated privileges for a least privilege project. How can you identity every user application…

Post by Morey Haber February 20, 2013
Tags:
, , , ,
sclogoupdated_1448

BeyondTrust Retina CS Earns Perfect 5 Star Rating by SC Magazine

We are happy to announce that for the 5th year in a row, SC Magazine has given a glowing review of Retina CS Threat Management Console with 5 stars across all its judging categories. SC Magazine tests all products in the most logical way: they vulnerability or pen tested them directly. Their “…results were excellent and…

Post by Sarah Lieber February 4, 2013
Tags:
, , , , , , ,
ieflaw

Another (sigh) IE Zero-Day

Unfortunately, the security industry was not going to escape 2012 without seeing yet another zero-day vulnerability in Microsoft’s Internet Explorer. It has been discovered that a targeted attack, leveraging a zero-day in IE, has been posed against the Council on Foreign Relations Portal. The technical origin of the flaw is as follows: the vulnerability occurs…

Post by BeyondTrust Research Team December 30, 2012
Tags:
, , , , , ,
sclogoupdated_1448

BeyondTrust Named 2012 Industry Innovator by SC Magazine

We’re happy to announce that SC Magazine has recognized BeyondTrust as a 2012 Industry Innovator! Read the report here. What SC Magazine Says. “BeyondTrust is far more than a one-trick pony. The company’s creativity and drive to innovate is what keeps this organization at the forefront of its market. Like many companies, currently and in…

Post by Sarah Lieber December 21, 2012
Tags:
, , , , ,
bmc-img5

Retina CS 4.0 and Remedy Ticketing Integration

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Post by Jerome Diggs November 29, 2012
Tags:
, , , , , ,
sccminteg-img2

Microsoft SCCM Integration with Retina CS Threat Management Console

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Post by Jerome Diggs November 28, 2012
Tags:
, , , , , , ,
img

PowerBroker for Windows – Solution Deployment

PowerBroker for Windows (PBW) is designed to integrate directly into your corporate Active Directory (AD) structure without modifying your existing schema. In the asset labeled “1” below, an administrator simply loads a Group Policy Option (GPO) snap-in onto an asset that uses the Microsoft Management Console (MMC).  The administrator can then create policies and rules…

Post by Morey Haber October 11, 2012
Tags:
, , , , , , , ,
IE-0day

Mmm, Smells Like 0day

Just when you thought we were out of the woods, Internet Explorer 0day shows up, in the wild. Here’s what you need to know about the vulnerability: Internet Explorer 6, 7, 8, and 9 are vulnerable (UPDATE: Out-of-band patch available now!) Use-after-free when the CMshtmlEd object is deleted and then the same area in memory…

Post by BeyondTrust Research Team September 17, 2012
Tags:
, , , , , ,