BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘vulnerability assessment’

BeyondSaas-img1

Ask Why? BeyondSaaS will tell you.

Posted November 20, 2013    Morey Haber

Encouraging team members to “ask why” is a great way to encourage creativity, solve problems, and understand why things are being done, the way they are being done. Changes and best practices for proactive security are a great reason to empower team members with this philosophy. If changes are required, and the team does not…

Tags:
, , , , ,
Welcome to BeyondSaaS IMg

BeyondSaaS Adds Diversity for Vulnerability Management

Posted November 18, 2013    Morey Haber

BeyondTrust has a wide variety of architectures for Retina Enterprise Vulnerability Management. It can be installed on premise as software or appliance, on physical hardware or virtualized assets, and even in an all mixed mode environment combining any of the four. BeyondTrust has now extended that offering with BeyondSaaS to add a fifth option. This…

Tags:
, , , , , ,
saas-new-scan-job-2013

BeyondSaaS

Posted November 4, 2013    Morey Haber

In the next few weeks, you will see the BeyondTrust marketing engine hit warp speed. Pure power and energy will drive this unstoppable force showcasing the next generation of BeyondTrust technology.  BeyondSaaS is an easy-to-use, self service, cloud-based vulnerability assessment scanning solution that addresses perimeter-based assets currently not addressed due to cost or incomplete vulnerability…

Tags:
, , , , , ,

Showcasing Retina Network Security Scanner Unlimited with Marc Maiffret

Posted October 29, 2013    Sarah Lieber

Last week BeyondTrust’s CTO, Marc Maiffret, took us through an introduction, demo and Q&A of Retina Network Security Scanner Unlimited. Retina Network Security Scanner is the fastest, most mature vulnerability assessment solution on the market, and is now available for only $1,200 per year. Features available in Retina Network Security Scanner Unlimited include: Unlimited IP…

Tags:
, , , , , ,
retinacs-insight-scalability

Scalability Part Deuce

Posted October 9, 2013    Morey Haber

It was great to see a flood of email on the previous scalability blog. Thank you all for the emails directly to me on the topic. Based on the responses, I would be remiss not to cover the other three sides of scalability. First, is how we scale down. Retina is a family of solutions….

Tags:
, , , , , ,
ScanMetrics-screenshot

Now Available: Retina Unlimited – $1,200 Unlimited IP Addresses

Posted October 8, 2013    Marc Maiffret

It has been over 15 years since we first introduced Retina, the Network Security Scanner, to the world. In those early days the vulnerability assessment space was still in its infancy with much of the focus being around scanning network based services for remotely exploitable vulnerabilities. Back then there were no compliance mandates or policies…

Tags:
, , , , ,

August VEF Participant Wins a Kindle Fire

Posted August 19, 2013    Qui Cao

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Tags:
, , , , , , , , , , ,
retina-virtual-graph

BeyondTrust Performs Vulnerability Assessment of VMware Solutions Better Than Anyone Else!

Posted May 15, 2013    Morey Haber

Retina from BeyondTrust performs vulnerability assessment of VMware solutions so incredibly, extremely, amazingly much better than anyone else…. Ok, I’m in product management and maybe marketing isn’t my forte, but let me explain to you in all seriousness why I think we’ve done something pretty special here. First, let me pose some real world questions…

Tags:
, , , , ,
RNSS-Video-Screenshot

Data Discovery using the Retina Network Security Scanner

Posted May 9, 2013    Morey Haber

One of the challenges facing every organization is locating where Personally Identifiable Information (PII) resides on workstations and servers. This data, by nature, is sensitive. However, if this data is not properly being tracked, secured, or even encrypted it can result in data loss. This type of data loss can result in a violation of…

Tags:
, , , , , ,
Break in

Scanning Problems through a Firewall

Posted April 7, 2011    Morey Haber

Vulnerability assessment scanning through a network or host-based firewall can create an unknown level of complexity, uncertainty into the quality of scan results, and a change control process that essentially decreases the security posture of the network and / or host in order to perform a vulnerability assessment scan.

Tags:
, ,