BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

What can the Retina CS Threat Management Console do for me?

Posted July 10, 2013    Morey Haber

I am spending this week at the Microsoft Worldwide Partner Conference. It is a change for me. I am attending as a participant partner verses working the traditional conference trade show booth. This is relevant to the blog because as a I network with other partners, I find myself explaining BeyondTrust as a dynamic security company that can manage internal and external threats with both privileged identity and vulnerability management solutions. From there, the conversation diverges based on the partner but then re-focuses around a single common thread; What can the BeyondTrust analytics and management platform do for me (as a partner)?

retinacs-tierarchitecture

As you can see from the diagram, Retina CS can now manage the following BeyondTrust Solutions:

Privileged Identity

  • PowerBroker UNIX & Linux
  • PowerBroker for Windows
  • PowerBroker PasswordSafe

Endpoint Protection

  • PowerBroker Endpoint Protection Platform
  • Retina Protection Agent

Vulnerability Management

  • Retina Network Security Scanner
  • Retina Mobile
  • Retina Plugin and Cloud Connectors

And as a partner, or as a client, it is not just about a single best-of-breed product, it’s about a single management console and a single platform that can manage all of your devices with dynamic asset intelligence. Regardless of the asset in your environment – from physical to cloud, mobile to virtual – all of the asset information is automatically correlated from vulnerability data, to asset inventory, to privileged events, to full session monitoring. In fact, if you choose all the modules available from BeyondTrust you would know all of this information about any asset in a single unified platform and console (*limited to Windows):

  • Vulnerability Information
  • Attack Data*
  • Malware Identified*
  • Windows Event Logs*
  • Software Installed
  • Ports Open
  • Personally Identifiable Information*
  • Services*
  • Processes Running
  • Users
  • Shares
  • Hardware Information
  • Privileged Events
  • File Integrity Monitoring*
  • Session Monitoring
  • Keystroke Logging
  • Path Management*
  • Regulatory Reporting
  • Configuration Compliance (Benchmark)
  • Trouble Tickets
  • Free Data Warehouse for Structured Big Data
  • Extensive Report Library
  • Smart Rules and Groups
  • Alerting
  • Role Based Access
  • Extensive third party integration
  • … and tons more !

So as I go through this partner event, I find myself comparing the technology we offer to other partners and even competitors. What I have found, is no one compares to what BeyondTrust offers with a single analytics and management platform and the insight we give about your assets. Our technology is so much more than best-of-breed, it is the best for securing your assets and dynamic infrastructure. Learn more about Retina CS Threat Management Console.

Tags:
, , , , , ,

Additional articles

VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,
dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,
Privileged Account Management Process

In Vulnerability Management, Process is King

Posted February 18, 2015    Morey Haber

You have a vulnerability scanner, but where’s your process? Most organizations are rightly concerned about possible vulnerabilities in their systems, applications, networked devices, and other digital assets and infrastructure components. Identifying vulnerabilities is indeed important, and most security professionals have some kind of scanning solution in place. But what is most essential to understand is…

Tags:
, , , , ,