BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The Retina Protection Agent

Posted September 2, 2010    Morey Haber

Traditional anti-virus solutions that rely on blacklisting malware are insufficient to protect today’s systems from the plethora of threats. Security vendors have evolved endpoint protection solutions to include firewalls, host-based intrusion prevention solutions, and even proactive application protection capabilities in order to defend against the evolving threat landscape. Unfortunately, many businesses still rely on anti-virus technology alone, and have implemented very few, if any, of the new endpoint protection solutions to combat modern threats.

In addition, zero-day vulnerabilities, misconfigurations, and third-party application vulnerabilities generally elude the IT administrator and become another vector for a successful exploit.  Gathering endpoint vulnerability data assists in determining these attack vectors and also serves a dual role for the security team in complying with regulatory initiatives. The general problem seems enormous for organizations to solve and a myriad of technologies must be implemented, paid for, and managed to defend against these dark arts…until now.

eEye Digital Security  is proud to offer a new form of agent-based vulnerability assessment: the Retina Protection Agent.  This solution can gather and report on all of the security vulnerabilities, zero-day vulnerabilities, and misconfigurations on a host, and provide advanced protection capabilities that co-exist with your existing anti-virus vendor. This unique layered approach allows you to augment your current anti-virus investment with a tool that can protect against the evolving threat landscape and provide critical vulnerability information for patch management processes and regulatory compliance initiatives. These features include:

  • Host-Based Intrusion Prevention including Zero–Day Vulnerability Prevention
  • System Protection
  • Application Control
  • Registry Protection
  • Removable Storage Protection
  • Local Vulnerability Assessment Agent

For clients that want to completely replace their existing antivirus solution, eEye Digital Security offers Blink Endpoint Protection Platform. This solution offers all the capabilities of the Retina Protection Agent while also giving you:

  • System and Application Based Firewalls
  • Virus and Spyware Protection
  • Web Application Firewall (optional add-on)

It is no longer a consideration of how to protect your assets, but rather when will they be compromised due to inferior and outdated protection and vulnerability management solutions. eEye offers modern solutions to combat these evolving threats and is the only solution available today with a complete endpoint protection and vulnerability management solution deliverable as a single agent with a rich internet enabled management application called Retina CS.

I encourage you to take a look at what modern Unified Vulnerability Management looks like today from eEye.

Tags:
, , , , , , , , , , ,

Leave a Reply

Additional articles

Sudo_logo

Don’t Create a Different sudoers File for Each System

Posted May 20, 2015    Randy Franklin Smith

What if you have multiple Linux and/or Unix systems? Sudo management can become onerous and unwieldy if you try to manage a different sudoers file on each system. The good news is that sudo supports multiple systems.

password-safety

What Does Microsoft Local Administrator Password Solution Really Do?

Posted May 19, 2015    Morey Haber

LAPS is a feature that allows the randomization of local administrator accounts across the domain. Although it would seem that this capability overlaps with features in BeyondTrust’s PowerBroker Password Safe (PBPS), the reality is it is more suited for simple use cases such as changing the local Windows admin account and not much more.

Tags:
, ,
webinar_ondemand

On Demand Webinar: Securing Windows Server with Security Compliance Manager

Posted May 14, 2015    BeyondTrust Software

On Demand Webinar: Security Expert Russell Smith, explains how to use Microsoft’s free Security Compliance Manager (SCM) tool to create and deploy your own security baselines, including user and computer authentication settings.

Tags:
, ,