BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The Retina Protection Agent

Posted September 2, 2010    Morey Haber

Traditional anti-virus solutions that rely on blacklisting malware are insufficient to protect today’s systems from the plethora of threats. Security vendors have evolved endpoint protection solutions to include firewalls, host-based intrusion prevention solutions, and even proactive application protection capabilities in order to defend against the evolving threat landscape. Unfortunately, many businesses still rely on anti-virus technology alone, and have implemented very few, if any, of the new endpoint protection solutions to combat modern threats.

In addition, zero-day vulnerabilities, misconfigurations, and third-party application vulnerabilities generally elude the IT administrator and become another vector for a successful exploit.  Gathering endpoint vulnerability data assists in determining these attack vectors and also serves a dual role for the security team in complying with regulatory initiatives. The general problem seems enormous for organizations to solve and a myriad of technologies must be implemented, paid for, and managed to defend against these dark arts…until now.

eEye Digital Security  is proud to offer a new form of agent-based vulnerability assessment: the Retina Protection Agent.  This solution can gather and report on all of the security vulnerabilities, zero-day vulnerabilities, and misconfigurations on a host, and provide advanced protection capabilities that co-exist with your existing anti-virus vendor. This unique layered approach allows you to augment your current anti-virus investment with a tool that can protect against the evolving threat landscape and provide critical vulnerability information for patch management processes and regulatory compliance initiatives. These features include:

  • Host-Based Intrusion Prevention including Zero–Day Vulnerability Prevention
  • System Protection
  • Application Control
  • Registry Protection
  • Removable Storage Protection
  • Local Vulnerability Assessment Agent

For clients that want to completely replace their existing antivirus solution, eEye Digital Security offers Blink Endpoint Protection Platform. This solution offers all the capabilities of the Retina Protection Agent while also giving you:

  • System and Application Based Firewalls
  • Virus and Spyware Protection
  • Web Application Firewall (optional add-on)

It is no longer a consideration of how to protect your assets, but rather when will they be compromised due to inferior and outdated protection and vulnerability management solutions. eEye offers modern solutions to combat these evolving threats and is the only solution available today with a complete endpoint protection and vulnerability management solution deliverable as a single agent with a rich internet enabled management application called Retina CS.

I encourage you to take a look at what modern Unified Vulnerability Management looks like today from eEye.

Tags:
, , , , , , , , , , ,

Leave a Reply

Additional articles

{c4eae211-3ca2-4f8e-b2b9-6df0e970aab1}_g.markhardy

The “insider” threat. Is it real, or is it being blown out of proportion?

Posted March 4, 2015    G. Mark Hardy

A lot depends on whether or not you’ve been compromised. And therein lies the problem. Cyber threats are often ignored until they cause some damage, at which point management looks for people to blame and gives all kinds of attention to fixing the problem – until the next crisis in accounting or warehousing or staffing comes along.

Tags:
, , ,
webinar_chalk

Webinar March 4th: Recreating the Carbanak Breach & Techniques for Mitigating Similar Attacks

Posted March 3, 2015    Lindsay Marsh

Join BeyondTrust Research and Development team for an in-depth live webinar that will explore the attack vectors used in the Carbanak Bank Breach and share successful mitigation techniques needed to prevent this type of attack.

Tags:
, ,
VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,