BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

The Retina Protection Agent

Post by Morey Haber September 2, 2010

Traditional anti-virus solutions that rely on blacklisting malware are insufficient to protect today’s systems from the plethora of threats. Security vendors have evolved endpoint protection solutions to include firewalls, host-based intrusion prevention solutions, and even proactive application protection capabilities in order to defend against the evolving threat landscape. Unfortunately, many businesses still rely on anti-virus technology alone, and have implemented very few, if any, of the new endpoint protection solutions to combat modern threats.

In addition, zero-day vulnerabilities, misconfigurations, and third-party application vulnerabilities generally elude the IT administrator and become another vector for a successful exploit.  Gathering endpoint vulnerability data assists in determining these attack vectors and also serves a dual role for the security team in complying with regulatory initiatives. The general problem seems enormous for organizations to solve and a myriad of technologies must be implemented, paid for, and managed to defend against these dark arts…until now.

eEye Digital Security  is proud to offer a new form of agent-based vulnerability assessment: the Retina Protection Agent.  This solution can gather and report on all of the security vulnerabilities, zero-day vulnerabilities, and misconfigurations on a host, and provide advanced protection capabilities that co-exist with your existing anti-virus vendor. This unique layered approach allows you to augment your current anti-virus investment with a tool that can protect against the evolving threat landscape and provide critical vulnerability information for patch management processes and regulatory compliance initiatives. These features include:

  • Host-Based Intrusion Prevention including Zero–Day Vulnerability Prevention
  • System Protection
  • Application Control
  • Registry Protection
  • Removable Storage Protection
  • Local Vulnerability Assessment Agent

For clients that want to completely replace their existing antivirus solution, eEye Digital Security offers Blink Endpoint Protection Platform. This solution offers all the capabilities of the Retina Protection Agent while also giving you:

  • System and Application Based Firewalls
  • Virus and Spyware Protection
  • Web Application Firewall (optional add-on)

It is no longer a consideration of how to protect your assets, but rather when will they be compromised due to inferior and outdated protection and vulnerability management solutions. eEye offers modern solutions to combat these evolving threats and is the only solution available today with a complete endpoint protection and vulnerability management solution deliverable as a single agent with a rich internet enabled management application called Retina CS.

I encourage you to take a look at what modern Unified Vulnerability Management looks like today from eEye.

Tags:
, , , , , , , , , ,

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,