BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘vulnerability assessment’

saas-new-scan-job-2013

BeyondSaaS

In the next few weeks, you will see the BeyondTrust marketing engine hit warp speed. Pure power and energy will drive this unstoppable force showcasing the next generation of BeyondTrust technology.  BeyondSaaS is an easy-to-use, self service, cloud-based vulnerability assessment scanning solution that addresses perimeter-based assets currently not addressed due to cost or incomplete vulnerability…

Post by Morey Haber November 4, 2013
Tags:
, , , , , ,

Showcasing Retina Network Security Scanner Unlimited with Marc Maiffret

Last week BeyondTrust’s CTO, Marc Maiffret, took us through an introduction, demo and Q&A of Retina Network Security Scanner Unlimited. Retina Network Security Scanner is the fastest, most mature vulnerability assessment solution on the market, and is now available for only $1,200 per year. Features available in Retina Network Security Scanner Unlimited include: Unlimited IP…

Post by Sarah Lieber October 29, 2013
Tags:
, , , , , ,
retinacs-insight-scalability

Scalability Part Deuce

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions….

Post by Morey Haber October 9, 2013
Tags:
, , , , , ,
ScanMetrics-screenshot

Now Available: Retina Unlimited – $1,200 Unlimited IP Addresses

It has been over 15 years since we first introduced Retina, the Network Security Scanner, to the world. In those early days the vulnerability assessment space was still in its infancy with much of the focus being around scanning network based services for remotely exploitable vulnerabilities. Back then there were no compliance mandates or policies…

Post by Marc Maiffret October 8, 2013
Tags:
, , , , ,

August VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao August 19, 2013
Tags:
, , , , , , , , , , ,
retina-virtual-graph

BeyondTrust Performs Vulnerability Assessment of VMware Solutions Better Than Anyone Else!

Retina from BeyondTrust performs vulnerability assessment of VMware solutions so incredibly, extremely, amazingly much better than anyone else…. Ok, I’m in product management and maybe marketing isn’t my forte, but let me explain to you in all seriousness why I think we’ve done something pretty special here. First, let me pose some real world questions…

Post by Morey Haber May 15, 2013
Tags:
, , , , ,
RNSS-Video-Screenshot

Data Discovery using the Retina Network Security Scanner

One of the challenges facing every organization is locating where Personally Identifiable Information (PII) resides on workstations and servers. This data, by nature, is sensitive. However, if this data is not properly being tracked, secured, or even encrypted it can result in data loss. This type of data loss can result in a violation of…

Post by Morey Haber May 9, 2013
Tags:
, , , , , ,
Break in

Scanning Problems through a Firewall

Vulnerability assessment scanning through a network or host-based firewall can create an unknown level of complexity, uncertainty into the quality of scan results, and a change control process that essentially decreases the security posture of the network and / or host in order to perform a vulnerability assessment scan.

Post by Morey Haber April 7, 2011
Tags:
, ,
bigdata-98x98

Prioritizing Vulnerability Assessment and Remediation Steps: A New Users Guide to Getting Started – Part 2

The odd part about writing weekly blogs is the amount of discussions that start internally, with clients directly, and sometimes through straight blog comments. After writing “A New Users Guide to Getting Started” article, my team indicated several really good ideas for a Part II follow-up blog. Simply, just getting started with vulnerability management is not enough….

Post by Morey Haber February 22, 2011
Tags:
, , ,
pillars

Prioritizing Vulnerability Assessment and Remediation Steps: A New Users Guide to Getting Started – Part 1

New users to vulnerability assessment often ask the same question: “How do I get started”? While this may sound incredibly generic for a security engineer, many companies have never had a vulnerability management process in place and are trying to comprehend the problems of missing patches, remediation prioritization, and risk acceptance. As a basic recommendation,…

Post by Morey Haber January 31, 2011
Tags:
, , ,