BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘vulnerability assessment’

windows of opp-img1

Seizing Windows of Opportunity for Vulnerability Assessment

The change control process for many organizations dictates that vulnerability assessment scanning can only occur during predefined scan windows. During these times, teams are notified that an assessment will be conducted and that alerts from IDS/IPS sensors, SIEMS, and local AV agents should be ignored or whitelisted from the scanners. This is a very typical…

Post by Morey Haber April 1, 2014
Tags:
, , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
Img4

Getting Retina Data into Splunk

SIEM products do a great job correlating information from a laundry list of security and operational solutions in order to gain visibility and context within an IT environment. Today we are going to show how to forward Retina Network security data into Splunk to help improve visibility and decision making. This integration can be completed…

Post by Jason Williams March 21, 2014
Tags:
, , , , , ,
beyondtrust-dashboard-auditingprivaccessblog

Auditing Privileged Access on Windows

When a user is given privileged access to a Windows host, they gain access to a wide variety of tools to control the system. Everything from the GUI and Start Menu to PowerShell and command line allow system alteration and software installation. In truly secure world, no end users would have administrative privileges. However, we…

Post by Morey Haber March 20, 2014
Tags:
, , , , , , , ,
Access-Report1

Neophytes and Professionals

There is a first time for everything. Your first steps, your first date, your first child, your first vulnerability assessment scan. A first time for everything. The Retina Network Security Scanner Unlimited makes taking the first step incredibly easy and affordable. For security professionals, it is just another step in making sure your assets are…

Post by Morey Haber February 14, 2014
Tags:
, , , ,
BeyondSaaS-vulnerabilitiesrootcause3

Staring At The Clouds… BeyondSaaS

Daydreamers tend to stare at the clouds and imagine entities from the shapes they see. Our minds form relationships from the bulges, wedges, and puffy forms to make animals, star ships, and people. From the clouds looking down, we see roads, farms, buildings, and all the physical entities we interact with everyday. For our information…

Post by Morey Haber February 11, 2014
Tags:
, , , ,
combined-executive-dashboard

BeyondInsight Reports: All The Difference In The World

Last week, we announced the release of the BeyondInsight IT Risk Management Platform, which provides a central environment for managing several of our PowerBroker Privileged Account Management and Retina Vulnerability Management solutions. A quick look at the BeyondInsight Analytics and Reporting module uncovers a startling revelation for our competitors and a hidden gem for our…

Post by Morey Haber February 7, 2014
Tags:
, , , , , ,
scmag1-98x98

BeyondTrust Receives 5 Star Rating from SC Magazine

Recently our UVM20 Security Management Appliance received a perfect 5-star review + “Best Buy” recognition from SC Magazine. Read the full review here. The UVM20 includes several pre-installed and pre-configured solutions: Retina Network Security Scanner, PowerBroker for UNIX/Linux, and PowerBroker for Windows, plus our patch management, regulatory reporting and configuration compliance modules — in addition…

Post by Sarah Lieber February 4, 2014
Tags:
, , , , , , , ,

Retina Performs Continuous Vulnerability Assessment

SANS Critical Control 4 specifies criteria for continuous vulnerability assessment and remediation. This specification calls for vulnerabilities to be continuously assessed, correlated, and reported upon in real-time based on public disclosure and identification of new or changed assets. Critical Control 4 is mandated by many government agencies, and requires prompt automated remediation that adheres to…

Post by Morey Haber January 28, 2014
Tags:
, , , ,
BeyondSaas-img1

Ask Why? BeyondSaaS will tell you.

Encouraging team members to “ask why” is a great way to encourage creativity, solve problems, and understand why things are being done, the way they are being done. Changes and best practices for proactive security are a great reason to empower team members with this philosophy. If changes are required, and the team does not…

Post by Morey Haber November 20, 2013
Tags:
, , , ,
Welcome to BeyondSaaS IMg

BeyondSaaS Adds Diversity for Vulnerability Management

BeyondTrust has a wide variety of architectures for Retina Enterprise Vulnerability Management. It can be installed on premise as software or appliance, on physical hardware or virtualized assets, and even in an all mixed mode environment combining any of the four. BeyondTrust has now extended that offering with BeyondSaaS to add a fifth option. This…

Post by Morey Haber November 18, 2013
Tags:
, , , , , ,