BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

What can the Retina CS Threat Management Console do for me?

Posted July 10, 2013    Morey Haber

I am spending this week at the Microsoft Worldwide Partner Conference. It is a change for me. I am attending as a participant partner verses working the traditional conference trade show booth. This is relevant to the blog because as a I network with other partners, I find myself explaining BeyondTrust as a dynamic security company that can manage internal and external threats with both privileged identity and vulnerability management solutions. From there, the conversation diverges based on the partner but then re-focuses around a single common thread; What can the BeyondTrust analytics and management platform do for me (as a partner)?

retinacs-tierarchitecture

As you can see from the diagram, Retina CS can now manage the following BeyondTrust Solutions:

Privileged Identity

  • PowerBroker UNIX & Linux
  • PowerBroker for Windows
  • PowerBroker PasswordSafe

Endpoint Protection

  • PowerBroker Endpoint Protection Platform
  • Retina Protection Agent

Vulnerability Management

  • Retina Network Security Scanner
  • Retina Mobile
  • Retina Plugin and Cloud Connectors

And as a partner, or as a client, it is not just about a single best-of-breed product, it’s about a single management console and a single platform that can manage all of your devices with dynamic asset intelligence. Regardless of the asset in your environment – from physical to cloud, mobile to virtual – all of the asset information is automatically correlated from vulnerability data, to asset inventory, to privileged events, to full session monitoring. In fact, if you choose all the modules available from BeyondTrust you would know all of this information about any asset in a single unified platform and console (*limited to Windows):

  • Vulnerability Information
  • Attack Data*
  • Malware Identified*
  • Windows Event Logs*
  • Software Installed
  • Ports Open
  • Personally Identifiable Information*
  • Services*
  • Processes Running
  • Users
  • Shares
  • Hardware Information
  • Privileged Events
  • File Integrity Monitoring*
  • Session Monitoring
  • Keystroke Logging
  • Path Management*
  • Regulatory Reporting
  • Configuration Compliance (Benchmark)
  • Trouble Tickets
  • Free Data Warehouse for Structured Big Data
  • Extensive Report Library
  • Smart Rules and Groups
  • Alerting
  • Role Based Access
  • Extensive third party integration
  • … and tons more !

So as I go through this partner event, I find myself comparing the technology we offer to other partners and even competitors. What I have found, is no one compares to what BeyondTrust offers with a single analytics and management platform and the insight we give about your assets. Our technology is so much more than best-of-breed, it is the best for securing your assets and dynamic infrastructure. Learn more about Retina CS Threat Management Console.

Tags:
, , , , , ,

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,