BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

What can the Retina CS Threat Management Console do for me?

Post by Morey Haber July 10, 2013

I am spending this week at the Microsoft Worldwide Partner Conference. It is a change for me. I am attending as a participant partner verses working the traditional conference trade show booth. This is relevant to the blog because as a I network with other partners, I find myself explaining BeyondTrust as a dynamic security company that can manage internal and external threats with both privileged identity and vulnerability management solutions. From there, the conversation diverges based on the partner but then re-focuses around a single common thread; What can the BeyondTrust analytics and management platform do for me (as a partner)?

retinacs-tierarchitecture

As you can see from the diagram, Retina CS can now manage the following BeyondTrust Solutions:

Privileged Identity

  • PowerBroker UNIX & Linux
  • PowerBroker for Windows
  • PowerBroker PasswordSafe

Endpoint Protection

  • PowerBroker Endpoint Protection Platform
  • Retina Protection Agent

Vulnerability Management

  • Retina Network Security Scanner
  • Retina Mobile
  • Retina Plugin and Cloud Connectors

And as a partner, or as a client, it is not just about a single best-of-breed product, it’s about a single management console and a single platform that can manage all of your devices with dynamic asset intelligence. Regardless of the asset in your environment – from physical to cloud, mobile to virtual – all of the asset information is automatically correlated from vulnerability data, to asset inventory, to privileged events, to full session monitoring. In fact, if you choose all the modules available from BeyondTrust you would know all of this information about any asset in a single unified platform and console (*limited to Windows):

  • Vulnerability Information
  • Attack Data*
  • Malware Identified*
  • Windows Event Logs*
  • Software Installed
  • Ports Open
  • Personally Identifiable Information*
  • Services*
  • Processes Running
  • Users
  • Shares
  • Hardware Information
  • Privileged Events
  • File Integrity Monitoring*
  • Session Monitoring
  • Keystroke Logging
  • Path Management*
  • Regulatory Reporting
  • Configuration Compliance (Benchmark)
  • Trouble Tickets
  • Free Data Warehouse for Structured Big Data
  • Extensive Report Library
  • Smart Rules and Groups
  • Alerting
  • Role Based Access
  • Extensive third party integration
  • … and tons more !

So as I go through this partner event, I find myself comparing the technology we offer to other partners and even competitors. What I have found, is no one compares to what BeyondTrust offers with a single analytics and management platform and the insight we give about your assets. Our technology is so much more than best-of-breed, it is the best for securing your assets and dynamic infrastructure. Learn more about Retina CS Threat Management Console.

Tags:
, , , , , ,

Additional articles

insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,

Vulnerability Expert Forum Highlights: April 2014

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation. Latest critical vulnerabilities, vendor patches, and zero-day…

Post by Chris Burd April 16, 2014
Tags:
, , , , ,