Wednesday, July 4, 2018

Retina CS

Intelligently Identify, Prioritize and Remediate System Vulnerabilities Across Diverse IT Environments

Most vulnerability management solutions do little to help security leaders put vulnerability and risk information in the context of business. Saddled with volumes of rigid data and static reports, the security team is left to manually discern real threats and determine how to act upon them. At BeyondTrust, we believe that security professionals deserve more from their vulnerability management solutions. That’s why we deliver vulnerability data in the proper context.

Retina CS: The Context-Aware Vulnerability Management Solution

BeyondTrust Retina CS is the only vulnerability management solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-driven architecture works with users to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, mobile, cloud, virtual, and IoT infrastructure.
  • Discover network, web, mobile, cloud, virtual, and IoT infrastructure
  • Profile asset configuration and risk potential
  • Pinpoint vulnerabilities, malware and attacks
  • Analyze threat potential, return on remediation and more
  • Isolate high-risk assets through advanced threat analytics
  • Remediate vulnerabilities through integrated patch management
  • Report on vulnerabilities, compliance, benchmarks, etc
  • Protect endpoints against client-side attacks
  • Make more informed privilege decisions

Key Capabilities for Retina CS

ZERO-GAP COVERAGE
Able to discover and assess any IT resource, Retina CS offers zero-gap coverage of the largest, most diverse IT environments. Agentless and agent-based scanning protects both online and offline assets.
UNMATCHED REPORTING
With the most powerful reporting capabilities in its class, Retina CS makes it easy to make smarter decisions, communicate risk, and report remediation progress to executives and compliance auditors.
ADVANCED THREAT ANALYTICS
With BeyondInsight Clarity, Retina CS  discovers data breach threats typically missed by other vulnerability solutions. Clarity pinpoints specific, high-risk users and assets by correlating privilege, vulnerability and threat data from a variety of BeyondTrust and third-party solutions.
AUTOMATED CREDENTIALED SCANS
Together with BeyondTrust PowerBroker Password Safe, Retina CS provides a secure and automated solution for performing authenticated scans with continuously rotating privileged credentials.
EXTENSIVE COVERAGE COMPLIANCE 
Reporting for COBIT, GLBA, HIPAA, HITRUST, ISO, ITIL, NERC-FERC, NIST, PCI, SOX, and many more government & industry regulations.
MAKE BETTER PRIVILEGE DECISIONS
Automatically scan applications at run time to better inform IT and security teams on privileged access, enforce quarantine, reduce application privileges, or prevent the launch of applications.
UNMATCHED REPORTING & ANALYTICS
  • Results-Driven Architecture: Tailor scans to specific reporting and compliance requirements.
  • Advanced Threat Analytics: Detect critical threats thru volumes of data.
  • Resource Planning Run: what-if scenarios and team capacity analyses to plan resource allocation.
  • 270+ Actionable Reports: Communicate with technical and non-technical audiences.
  • Compliance Reporting: COBIT, GLBA, HIPAA, HITRUST, ISO-27002, ITIL, MASS 201, NERC-FERC, NIST, PCI, SOX and more.
  • Advanced Threat Intelligence: Based on asset scoring, security research, exploit databases, exploitability, NSRL, CVSS v3, CWE, and more.
  • Trends, Deltas and Heat Maps: Share progress with executives, compliance auditors and others.
  • Configuration Benchmarking: DISA Gold Disk, SCAP, NIST, FDCC, USGCB, CIS, Microsoft®, and in-house policies; CIS Security Benchmark certified (optional).
  • SLA Compliance Reports: Measure threat severity level against dynamic asset groupings.
  • Pivot Grid: Ad-Hoc Reporting Create custom reports.
  • Third-Party Integration: SIEM, GRC, NMS and help desk integration
MAXIMUM FLEXIBILITY
  • Flexible Deployment: Deploy software, appliances and/or virtual machines.
  • Centralized Dashboards: Consolidate enterprise-wide activities.
  • Integrated Data Warehouse: Analyze historical data over time.
  • Role-Based Access: Provide permissioned access to view, assess and report on data.
  • Effortless Updates and Upgrades: Expand capabilities via license updates.
ZERO-GAP COVERAGE
  • Vulnerability Assessment: Flag vulnerabilities, attacks, and malware by asset for a complete view of risk.
  • Comprehensive Discovery: Locate network (local and remote), web, mobile, cloud, virtual and IoT assets.
  • Asset Profiling: Gather information including IP, DNS, OS, MAC address, ports, services, software, processes, hardware, event logs and more.
  • Asset Smart Groups: Group, assess, and report on assets by IP range, naming convention, OS, domain, applications, business function and more.
  • Asset Context Awareness: Evaluate risk based on damage potential or target distribution, plus confidentiality, integrity and availability requirements.
  • Smart Credentials: Automatically scan targets using the highest privilege level.
  • Asset Risk Analysis: Compare asset risk levels with custom Threat Risk and Exposure Risk scoring.
  • Cloud Scanning: Scan online & offline Amazon®, GoGrid®, Google®, IBM®, Rackspace® & VMware®.
  • VMware Verified: Scan virtual environments requiring PCI and HIPAA compliance.
  • Patch Management: Remediate with patch management for Microsoft WSUS and SCCM for Microsoft and third-party applications.
  • Scheduling and Alerts: Schedule scans and configure email alerts.
ENTERPRISE SCALABILITY
  • N-Tier, Multitenant Architecture: Gain maximum scalability and control.
  • Scan Engine Pooling: Combine scan engines, each able to scan a  Class-A network in under 15 minutes.
  • Retina Protection Agent: Local scanning, zero-day monitoring, and intrusion prevention for offline devices.
  • Local and Remote Scanning: Cover segregated, firewalled and  disparate infrastructure.

Nessus Profesional

Nessus® is deployed by millions of users worldwide to identify vulnerabilities, policy-violating configurations and malware that attackers use to penetrate your or your customer's network.
24,000 organizations can’t be wrong.

KEY FEATURES

Easy to Use

Policy creation is simple and only requires a few clicks to scan an entire network

Comprehensive Detection

The Nessus scanner covers more technologies and identifies more vulnerabilities, providing a higher detection rate than competing solutions

Low Total Cost of Ownership (TCO)

Complete vulnerability scanning solution with unlimited scans against unlimited IPs for one low cost

Fast & Accurate

High-speed accurate scanning with low false positives lets you quickly identify those vulnerabilities that need fixing first

Timely Protection

Tenable researchers leverage extensive intelligence sources – providing plug-ins that deliver timely response for the latest vulnerabilities and threats

Accommodate Growth

Easily move to Tenable.io – with tools that speed migration – as vulnerability management needs increase.

                                                         Click Here 

Rapid7


BEST IN CLASS VULNERABILITY DETECTION

Netsparker was the only scanner to detect all the vulnerabilities in the tests, which were:
  • SQL Injections
  • Cross-site Scripting
  • Command Injection
  • Remote File Inclusion
  • Server Side Request Forgery
  • Path Traversal
  • Unvalidated Redirects



  • Click Here