BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘vulnerability management’

Retina Insight

Vulnerability and Identity Management (VIM) Fusion

Why BeyondTrust? BeyondTrust is a unique company in the security industry that has created the first and only fusion of Vulnerability and Identity Management (VIM). While the industry has spent over a decade refining the process of vulnerability identification and reporting using standards like OVAL and CVE, BeyondTrust has taken the leadership position in understanding what risk…

Post by Morey Haber January 23, 2013
Tags:
, , , ,
Hiding in plain sight

IT Security’s Best Kept Secret – Hiding in Plain Sight

This blog post was first posted on Wired.com on January 22nd, 2013. It can be found, in it’s original formatting, here: http://insights.wired.com/profiles/blogs/it-security-s-best-kept-secret-hiding-in-plain-sight               There’s a reason the old saying “an ounce of prevention is worth of a pound a cure” resonates in so many situations – because it’s true….

Post by Mike Puterbaugh January 22, 2013
Tags:
, , , , , ,
sclogoupdated_1448

BeyondTrust Named 2012 Industry Innovator by SC Magazine

We’re happy to announce that SC Magazine has recognized BeyondTrust as a 2012 Industry Innovator! Read the report here. What SC Magazine Says. “BeyondTrust is far more than a one-trick pony. The company’s creativity and drive to innovate is what keeps this organization at the forefront of its market. Like many companies, currently and in…

Post by Sarah Lieber December 21, 2012
Tags:
, , , , ,
bmc-img5

Retina CS 4.0 and Remedy Ticketing Integration

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Post by Jerome Diggs November 29, 2012
Tags:
, , , , , ,
sccminteg-img2

Microsoft SCCM Integration with Retina CS Threat Management Console

Overview Retina CS enables teams to centrally manage organization-wide IT security and compliance initiatives from a single, web-based console. It provides discovery, prioritization, and remediation of security risks by delivering what matters the most – context. Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the…

Post by Jerome Diggs November 28, 2012
Tags:
, , , , , , ,
reuters

Security News Roundup | September 2012

September was an active month in terms of security commentary and news; ranging from an alleged Apple data hack to an IE 0day out-of-band patch release. Since I’m sure many of you are still catching up on the news, for your convenience I’ve included some of the more insightful September coverage below.

Post by Sarah Lieber September 24, 2012
Tags:
, , ,
9.11

September 11th – Lest We Forget.

Today marks the 11 year anniversary of the “September 11th” attacks. It is on these days of remembrance that our memory serves as a tool to heal us, to free us from the emotional burdens that can keep us from moving forward. This happens not by allowing these memories to fade from our consciousness, but…

Post by Marc Maiffret September 11, 2012
Tags:
, , , , , , ,
Blink6.0

Just Released Blink 6.0: Advanced Endpoint Protection

It has been a long time since any vendor has introduced game changing features to end point protection solutions. We have seen claims of better anti-virus protection, advanced persistent threat protection (APT), and even claims of massive resource savings using their latest versions. BeyondTrust believes in a defense in depth approach to end point protection…

Post by Morey Haber August 16, 2012
Tags:
, , , , ,
blackholetoolkit1

BlackHole toolkit targets Microsoft XML Core Services flaw

Blackhole is a popular exploit kit used to inject malware onto PCs that visit an exploited site, or are redirected to such a site from another, compromised website.  As hackers get bolder they use these types of toolkits to compromise computer networks.  This allows less sophisticated individuals and organizations to compromise computer networks since these…

Post by Sarah Lieber August 1, 2012
Tags:
, , , , , , , ,
img-android

Off the beaten Google Market

There have been a number of recent articles and blog posts around Android devices infected with various malware and malicious apps.  One recent nasty piece of malware found in many Chinese Android app stores is ‘Trojan!MMarketPay.A@Android’.   The interesting feature of this malware is that it can run up an unsuspecting user’s cell phone bill by…

Post by Jerome Diggs July 10, 2012
Tags:
, , , , , , , ,