BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘Unified Vulnerability Management’

oracle-logo-98x98

Java: Sizeable Critical Patch Update and Two Sugars, Please

Oracle is rolling out yet another Critical Patch Update (CPU) for Java – and this time they’ve fixed 39 remotely exploitable vulnerabilities. This is not to say that all of these vulnerabilities may provide an attacker with remote code execution. However, the highest CVSS Base Score of all the vulnerabilities was a 10.0, meaning that…

Post by BeyondTrust Research Team April 15, 2013
Tags:
, , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
eye in the sky_smaller-resized-600.jpg

Monitoring Your Change Control Processes

I have responded to a number of RFPs (Request For Proposal) in my day and recently I have seen a trend in some of the questions. While the question varies between requests, there seems to be a growing trend that users want vulnerability assessment tools to not only identify vulnerabilities, but to also track changes to…

Post by Morey Haber February 3, 2011
Tags:
, , , ,

The Retina Protection Agent

Traditional anti-virus solutions that rely on blacklisting malware are insufficient to protect today’s systems from the plethora of threats. Security vendors have evolved endpoint protection solutions to include firewalls, host-based intrusion prevention solutions, and even proactive application protection capabilities in order to defend against the evolving threat landscape. Unfortunately, many businesses still rely on anti-virus…

Post by Morey Haber September 2, 2010
Tags:
, , , , , , , , , ,