BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The Retina Protection Agent

Posted September 2, 2010    Morey Haber

Traditional anti-virus solutions that rely on blacklisting malware are insufficient to protect today’s systems from the plethora of threats. Security vendors have evolved endpoint protection solutions to include firewalls, host-based intrusion prevention solutions, and even proactive application protection capabilities in order to defend against the evolving threat landscape. Unfortunately, many businesses still rely on anti-virus technology alone, and have implemented very few, if any, of the new endpoint protection solutions to combat modern threats.

In addition, zero-day vulnerabilities, misconfigurations, and third-party application vulnerabilities generally elude the IT administrator and become another vector for a successful exploit.  Gathering endpoint vulnerability data assists in determining these attack vectors and also serves a dual role for the security team in complying with regulatory initiatives. The general problem seems enormous for organizations to solve and a myriad of technologies must be implemented, paid for, and managed to defend against these dark arts…until now.

eEye Digital Security  is proud to offer a new form of agent-based vulnerability assessment: the Retina Protection Agent.  This solution can gather and report on all of the security vulnerabilities, zero-day vulnerabilities, and misconfigurations on a host, and provide advanced protection capabilities that co-exist with your existing anti-virus vendor. This unique layered approach allows you to augment your current anti-virus investment with a tool that can protect against the evolving threat landscape and provide critical vulnerability information for patch management processes and regulatory compliance initiatives. These features include:

  • Host-Based Intrusion Prevention including Zero–Day Vulnerability Prevention
  • System Protection
  • Application Control
  • Registry Protection
  • Removable Storage Protection
  • Local Vulnerability Assessment Agent

For clients that want to completely replace their existing antivirus solution, eEye Digital Security offers Blink Endpoint Protection Platform. This solution offers all the capabilities of the Retina Protection Agent while also giving you:

  • System and Application Based Firewalls
  • Virus and Spyware Protection
  • Web Application Firewall (optional add-on)

It is no longer a consideration of how to protect your assets, but rather when will they be compromised due to inferior and outdated protection and vulnerability management solutions. eEye offers modern solutions to combat these evolving threats and is the only solution available today with a complete endpoint protection and vulnerability management solution deliverable as a single agent with a rich internet enabled management application called Retina CS.

I encourage you to take a look at what modern Unified Vulnerability Management looks like today from eEye.

Tags:
, , , , , , , , , , ,

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,