BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The Retina Protection Agent Part II

Posted September 10, 2010    Morey Haber

Part of being a good product manager is keeping an eye on your competition with a lifecycle development approach in mind. This considers whether the competition is expanding their product line outside of the solutions core competency and if the maturity requires rapid development and feature releases. At the end of lifecycle, the solution becomes End of Life (EoL) and dropped as a product. For standalone Host Intrusion Prevention Solutions (HIPS), the grim reaper is just around the corner.

Consider that Cisco has announced EoS (End of Sale) and EoL dates for the Cisco Security Agent and this agent was based on an acquisition of Okena in 2003, HIPS has had a relatively short life of seven years as a standalone enterprise product. Gartner, in their recent 2010 IT Market Clock for Infrastructure Protection, has also indicated that HIPS has passed the “Dusk of Obsolesce” for personal computers. So what technology is replacing HIPS to combat modern day threats?

For starters, the concept of a host-based intrusion prevention as a standalone tool has lost its value as a single agent technology solution. It targets protocol, service, and network based vulnerabilities and their accompanying exploits as a prevention product. With trends indicating that threats are evolving to web applications and client side attacks, HIPS becomes an older (but required) piece of a much larger puzzle. This is where the Retina Protection Agent (and its parent solution Blink Professional) become the next viable solution for organizations.

As I indicated above, products either mature and die like CSA, or they evolve to meet current challenges. These challenges can warrant new features, platform support, or even just updates to the workflow for simplification and usability. The Retina Protection Agent has exceeded the requirements of being a basic HIPS solution by supporting the latest Microsoft operating systems, adding key features for local agent-based vulnerability assessment to detect which client applications are vulnerability, and a new Management Console, Retina CS, to simplify the deployment and administration of this agent-based technology.

Host Intrusion Prevent Solutions may be at the end of their useful lives, but the need to protect the desktop is as important as ever. The threats have evolved and therefore the technology must evolve to meet these threats. eEye is ahead of the curve and our products will exceed your expectations for Unified Vulnerability Management from Assessment, Mitigation, to Endpoint Protection.

Leave a Reply

Additional articles

skeletonkey3_713678_713680

Stopping the Skeleton Key Trojan

Posted June 29, 2015    Robert Auch

Earlier this year Dell’s SecureWorks published an analysis of a malware they named “Skeleton Key”. This malware bypasses authentication for Active Directory users who have single-factor (password only) authentication. The “Skeleton Key” attack as documented by the SecureWorks CTU relies on several critical parts.

Tags:
, , , , ,
webinar 2

On Demand Webinar: 10 Steps to Building an Effective Vulnerability Management Program

Posted June 26, 2015    BeyondTrust Software

In this on demand webinar, Cybersecurity Expert, Derek A.Smith will take you through his 10 steps for a successful vulnerability management program and how to get started now.

Tags:
, ,
AHHA_PRO.LOGO

Privileged Account Management – Another AH-HA in Cyber Security

Posted June 25, 2015    Nigel Hedges

I strongly believe that the Top 4 mitigation strategies don’t just simply apply to Australian organizations, it should be a global realization, a worldwide “ah ha!” for those still not quite understanding the importance here. Here’s a refresher (or intro) on the Top 4 mitigation strategies. Read on…

Tags:
, ,