BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘vulnerability management’

BeyondInsight: Privilege and Vulnerability Management Unification

Posted February 18, 2014    Morey Haber

Fifteen years ago there was a revolution in information technology operations. Different teams that managed networks and systems merged their practices and technology under frameworks like Computer Associates Unicenter and IBM Tivoli. Today, these solutions have evolved to CA Spectrum, SolarWinds, and SpiceWorks. These are all fantastic technologies that have proven that the fusion of…

Tags:
, , , , , ,
BeyondSaaS-vulnerabilitiesrootcause3

Staring At The Clouds… BeyondSaaS

Posted February 11, 2014    Morey Haber

Daydreamers tend to stare at the clouds and imagine entities from the shapes they see. Our minds form relationships from the bulges, wedges, and puffy forms to make animals, star ships, and people. From the clouds looking down, we see roads, farms, buildings, and all the physical entities we interact with everyday. For our information…

Tags:
, , , , ,
scmag1-98x98

BeyondTrust Receives 5 Star Rating from SC Magazine

Posted February 4, 2014    Sarah Lieber

Recently our UVM20 Security Management Appliance received a perfect 5-star review + “Best Buy” recognition from SC Magazine. Read the full review here. The UVM20 includes several pre-installed and pre-configured solutions: Retina Network Security Scanner, PowerBroker for UNIX/Linux, and PowerBroker for Windows, plus our patch management, regulatory reporting and configuration compliance modules — in addition…

Tags:
, , , , , , , ,

Retina Performs Continuous Vulnerability Assessment

Posted January 28, 2014    Morey Haber

SANS Critical Control 4 specifies criteria for continuous vulnerability assessment and remediation. This specification calls for vulnerabilities to be continuously assessed, correlated, and reported upon in real-time based on public disclosure and identification of new or changed assets. Critical Control 4 is mandated by many government agencies, and requires prompt automated remediation that adheres to…

Tags:
, , , ,
marc-maiffret-fox-news-screenshot

Marc Maiffret Interviewed on Fox News: How Safe is Consumer Data on the ObamaCare Website?

Posted January 17, 2014    Mike Yaffe

Yesterday, Marc Maiffret appeared as a special guest of “The Willis Report” on Fox News where he discussed how safe consumer data is on the ObamaCare website. As background, according to news reports, ObamaCare continues to leave consumer data vulnerable to theft months after security problems were first exposed. In the wake of a Christmas-season…

Tags:
, , , ,
BeyondSaas-img1

Ask Why? BeyondSaaS will tell you.

Posted November 20, 2013    Morey Haber

Encouraging team members to “ask why” is a great way to encourage creativity, solve problems, and understand why things are being done, the way they are being done. Changes and best practices for proactive security are a great reason to empower team members with this philosophy. If changes are required, and the team does not…

Tags:
, , , , ,
Welcome to BeyondSaaS IMg

BeyondSaaS Adds Diversity for Vulnerability Management

Posted November 18, 2013    Morey Haber

BeyondTrust has a wide variety of architectures for Retina Enterprise Vulnerability Management. It can be installed on premise as software or appliance, on physical hardware or virtualized assets, and even in an all mixed mode environment combining any of the four. BeyondTrust has now extended that offering with BeyondSaaS to add a fifth option. This…

Tags:
, , , , , ,
saas-new-scan-job-2013

BeyondSaaS

Posted November 4, 2013    Morey Haber

In the next few weeks, you will see the BeyondTrust marketing engine hit warp speed. Pure power and energy will drive this unstoppable force showcasing the next generation of BeyondTrust technology.  BeyondSaaS is an easy-to-use, self service, cloud-based vulnerability assessment scanning solution that addresses perimeter-based assets currently not addressed due to cost or incomplete vulnerability…

Tags:
, , , , , ,

Showcasing Retina Network Security Scanner Unlimited with Marc Maiffret

Posted October 29, 2013    Sarah Lieber

Last week BeyondTrust’s CTO, Marc Maiffret, took us through an introduction, demo and Q&A of Retina Network Security Scanner Unlimited. Retina Network Security Scanner is the fastest, most mature vulnerability assessment solution on the market, and is now available for only $1,200 per year. Features available in Retina Network Security Scanner Unlimited include: Unlimited IP…

Tags:
, , , , , ,

The 5 Keys to Context-Aware Vulnerability Management

Posted October 28, 2013    Sarah Lieber

Retina not only identifies security exposures across your entire IT landscape, but also gives you the insight you need to better understand, mitigate and communicate risk. Check out this video to see what makes Retina the most context-aware vulnerability management solution on the market. Learn more about Retina here. The 5 Keys to Context-Aware Vulnerability…

Tags:
, , , , , ,