BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘threat management’

Java-Logo

Recently Patched Java Vulnerability Exploited In the Wild: How (Not) Surprising

A type confusion vulnerability, recently patched in Java 7u21 and Java 6u45, has been spotted in the wild. According to a recent blog post from F-Secure, exploitation of CVE-2013-2423 started shortly after April 21st, 2013 and continues. Given what we know about Java, none of this is surprising. “Why?!” you may ask, “didn’t we all…

Post by BeyondTrust Research Team April 23, 2013
Tags:
, , , , , , , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
jpeg blog pic

Die Hard – Windows XP Against the World

Today marks the beginning of a significant year-long event in the worldwide computer industry – a year from today, Microsoft will end support for the Windows XP Operating System. Mainstream support had already ended in 2009  and this new milestone marks the end of security updates on the platform. Are you ready? According to a…

Post by Mike Puterbaugh April 8, 2013
Tags:
, , ,
sccminteg-img2

Microsoft SCCM Integration with Retina CS Threat Management Console

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Post by Jerome Diggs November 28, 2012
Tags:
, , , , , , ,
android4_skate

How important is Android 4 to BYOD?

Android 4 (so far dubbed Ice Cream Sandwich for 4.0.x or Jelly Bean for 4.1.x) is a significant upgrade to the user experience adding in many refinement and features.  For enterprises dealing with the Bring Your Own Device (BYOD) movement, some of these upgrades can be a double-edged sword.

Post by Scott Ellis September 19, 2012
Tags:
, , , , , ,
9.11

September 11th – Lest We Forget.

Today marks the 11 year anniversary of the “September 11th” attacks. It is on these days of remembrance that our memory serves as a tool to heal us, to free us from the emotional burdens that can keep us from moving forward. This happens not by allowing these memories to fade from our consciousness, but…

Post by Marc Maiffret September 11, 2012
Tags:
, , , , , , ,
rsa-archer-egrc-2-680x393

Now Available! Direct Integration from Retina CS into RSA Archer eGRC

Yet another first for BeyondTrust and eEye Digital Security. Our combined companies are proud to release our first new direct integration from Retina CS into RSA Archer eGRC. The business value provides comprehensive vulnerability management data directly into Archer’s Threat Management system. Using direct database access from Archer’s Integration System, the eGRC platform harvests asset…

Post by Morey Haber June 1, 2012
Tags:
, , , , , ,
retinainsight-pivotgrids2-680x242-1

Retina Insight Pivot Grids, Custom Report Sharing on eEye Forums

Around this time last year I wrote a blog on the Pivot Grids within Retina Insight and how they allow a user to custom build historical reports based on almost every piece of data collected by Retina Insight. Recently I spoke with an analyst on this same topic and he was very pleased to see that we…

Post by Morey Haber May 29, 2012
Tags:
, , , , , , , ,
einstein

Call it Genius. Our Smart Groups Make Vulnerability Management Simple for Security Teams

eEye R&D has been hard at work on optimizing how our enterprise clients can manage and schedule assessments within Retina CS. These efforts will increase the efficiency of how our clients perform assessments across their IT infrastructure – be it their traditional server or desktop assets, or new technologies like mobile, virtual and cloud.

Post by Morey Haber April 20, 2012
Tags:
, , , , , ,