FORGOT YOUR DETAILS?

BeyondTrust

BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting. BeyondTrust empower organizations to not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, our customers are able to address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible. BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction.

E-SPIN and BeyondTrust

E-SPIN have actively in promoting BeyondTrust full range of products and technologies as part of the company Vulnerability Management (long before BeyondTrust take over eEye Digital Security Vulnerability Management product - Enterprise Vulnerability Management, Network Security Scanning, Cloud-based vulnerability assessment, Web security scanning and protection). Since the take over eEye Digital Security during 2012 May, E-SPIN expand the full product porfolio to cover addition of Privileged Account Management, from Privilege Management, Active Directory Bridging, Privileged Password Management to Auditing and Protection. E-SPIN is active in provide consulting, supply, training and maintaing BeyondTrust (and formerly eEye Digital Security) products for the enterprise, government and military customers (or distribute and resell as part of the complete package) on the region E-SPIN do businesses. The enterprise range from corporate, universities, government agencies to IT service providers on data center, security management, security operation center (SOC), vulnerability management, vulnerability assessment center (VAC) and enterprise information security management / operations.

Please feel free to contact E-SPIN for your inquiry and requirement, so we can assist you on the exact requirement in the packaged solutions that you may required for your operation or project needs.

Retina Network Security Scanner Product Overview

Network Vulnerability Assessment

Retina Network Security Scanner is the security industry’s most respected and validated vulnerability assessment tool. It also serves as the scan engine for Retina CS Enterprise Vulnerability Management.


Find Vulnerabilities Across Network, Web, Virtual and Database Environments

With over 10,000 deployments since 1998, BeyondTrust Retina Network Security Scanner is the most sophisticated vulnerability assessment solution on the market. Available as a standalone application or as part of Retina CS Enterprise Vulnerability Management, Retina Security Scanner enables you to efficiently identify IT exposures and prioritize remediation enterprise-wide.

  • Continually monitor and improve enterprise security posture
  • Identify IT assets and sensitive data across disparate environments
  • Find security exposures in network, web, database, virtual, and IoT assets
  • Prioritize remediation based on real risk to critical assets
  • Easily deploy and scale from small to large environments
  • Realize optimal performance via non-intrusive scanning
  • Get fast, frequent updates from the BeyondTrust Research Team

Highlights

Fast and Non-Intrusive Vulnerability Scanning

Retina Network Security Scanner optimizes network performance and scan network devices, operating systems, applications, and databases, without impacting availability or performance.

Flexible and Scalable Vulnerability Assessment

Retina can be deployed as a standalone vulnerability scanner, distributed throughout an environment, and integrated with Retina CS for enterprise deployments.

The Most Comprehensive Vulnerability Database

The Retina vulnerability database is continually updated by the renowned BeyondTrust Research Team, allowing you to stay on top of the most current threats.

Flexible Licensing; Unlimited IPs

Retina licensing is flexible to cost-effectively meet your specific vulnerability assessment needs. A full-featured, unlimited IP, unlimited user version is available for one low price.

Internet of Things (IoT) Vulnerability Scanning

Retina’s built-in IoT audits enable organizations to Identify the make and model of vulnerable IoT devices, and safely check them for default and hard-coded credentials used with Telnet, SSH, or Basic HTTP Authentication.”

Web Application Scanning

Retina provides the user interface for launching web scans and displaying a Web Assessment Report that contains findings from those scans.


Features & Benefits

Key Capabilities

Discover all network (local and remote), database and virtual assets in your environment.

Reveal at-risk personally identifiable information (PII) and other sensitive data.

Identify system, application, database, OS and web application vulnerabilities via agent-based and/or agentless scanning.

Assess risk and prioritize remediation based on exploitability (from Core Impact®, Metasploit®, Exploit-db), CVSS, & other factors.

Confirm exploitability through penetration testing, with one click to the open-source Metasploit Framework.

Scan network assets as well as web applications, providing a complete picture of vulnerabilities in a single console.

Audit personally Identifiable Information (PII) on remote targets.

Report progress and results to colleagues in management, compliance, audit, risk and other roles.

Use a simple configuration utility to make managing licensing, central policy, event management and auto-updates as snap.

Analyze threats and gain deeper security intelligence by upgrading to Retina CS Enterprise Vulnerability Management.

Share data with popular solutions for SIEM, GRC and other security management platforms.


Network Vulnerability Assessment

Assess network devices, operating systems, applications, ports and services against a vast, constantly updated vulnerability database.

Accurately identify vulnerabilities with a false positive rate below 1%.

Perform Class C network scans in under 15 minutes on average.

Leverage ICMP, registry, NetBIOS, and the Nmap signature database, as well as proprietary OS fingerprinting capabilities.

Retina’s Smart Credentials automatically select the credentials with the highest level of privileges on each scan target to improve scanning efficiency.

Audit Windows devices using local or domain credentials.

Perform local assessments of Cisco®, Linux, Unix® and other devices via SSH tunneling.

Adjust scans for custom machine configurations, ports and applications via automated input/output data reconciliation on each port.

Support SCAP-compliant, continuous vulnerability and configuration monitoring per DIACAP, FISMA, STIG, FDCC and USGCB guidelines.

Get PCI DSS scanning and reporting capabilities out of the box.

Achieve complete vulnerability and configuration scanning across IPv4 and IPv6 networks

Simplify ad-hoc scanning with single use target types entered as IP address, IP ranges, CIDR, named host or a combination of any of those types.


Web Applications

Conduct automated vulnerability assessment and web crawling with no scripting required.

Detect OWASP Top Ten vulnerabilities including SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, OS Command Injection and more.

Fully integrated into the Retina assessment engine.


Database Vulnerability Assessment

Scan Oracle®, Microsoft SQL Server® and MySQL databases for security exposures.


Virtual Vulnerability Assessment

Conduct VMware vCenter® scans with detailed risk intelligence for ESXi and virtual machines.

Scan online & offline virtual images, plus virtualized application templates (ThinApp® packages).

Schedule scans to automatically update the vCenter console with centralized compliance and risk information.

Stay updated on new vulnerabilities that could impact the hyper-visor and virtual machines.


Application Screenshots

Scan User Interface (UI)

 

Sample reports

Guided User Interface (UI)

Scan User Interface (UI)

Retina CS Product Overview

Enterprise Vulnerability Management

Retina CS delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.


Enterprise Vulnerability Management Software for Dynamic IT Environments

Retina CS is the only vulnerability management software solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-oriented architecture works with users to proactively identify security exposures, analyze business impact, and plan and conduct remediation across disparate and heterogeneous infrastructure. Over 10,000 customers worldwide rely on Retina to enable visible, measurable and actionable vulnerability management across their organizations. Retina CS Enterprise Vulnerability Management software enables you to:

  • Discover network, web, mobile, cloud, virtual and IoT infrastructure
  • Profile asset configuration and risk potential
  • Pinpoint vulnerabilities, malware and attacks
  • Analyze threat potential and return on remediation
  • Remediate vulnerabilities via integrated patch management (optional)
  • Report on vulnerabilities, compliance, benchmarks, etc.
  • Protect endpoints against client-side attacks
  • Make more informed privilege decisions

Disrupt the Attack Chain Inside and Out

When integrated with PowerBroker Privileged Access Management platform solutions, Retina CS enables you to disrupt all stages of the cyber attack chain. The solutions combine best-in-class privilege, password and vulnerability management on top of a centralized reporting and analytics platform. As a result, you can efficiently reduce your organization’s attack surface, prevent lateral movement by attackers, and actively detect and respond to in-progress breaches.


Highlights

Zero-Gap Vulnerability Management for Diverse Infrastructure

Able to discover and assess any IT resource in your organization, Retina CS offers zero-gap vulnerability management coverage of the largest, most diverse IT environments. Agentless and agent-based scanning protects assets, whether they are connected to your network or not.

Unmatched Scalability and Flexibility for Large Enterprises

Retina’s multi-tier architecture gives you optimal scalability and maximum control over your enterprise vulnerability management processes. It is designed for simple deployment and management of networks with multiple firewalls, IDS/IPS, VLANS and disparate locations.

Results-Driven Reporting and Analytics

With the most powerful reporting and analytics capabilities in its class, Retina CS makes it easy to make smart decisions, communicate risk, and report vulnerability management progress to executives and compliance auditors.

Extensive Compliance Coverage

The Regulatory Reporting Module simplifies compliance reporting for COBIT, GLBA, HIPAA, HITRUST, ISO-27002, ITIL, MASS 201, NERC-FERC, NIST, PCI, SOX, and many more government and industry mandates.

Seamless Patch Management

The Patch Management Module closes the loop on vulnerabilities with seamless patching for Microsoft and third-party applications. Integrated, automated and agentless, the solution improves the efficiency of your patching process.

Automated Configuration Compliance

The Configuration Compliance Module streamlines auditing and reporting against industry configuration guidelines and best practices from FDCC, NIST, STIGS, USGCB, CIS and Microsoft.

The Largest Ecosystem of Integrated Partner Solutions

Out-of-the-box integration with multiple SIEMs and firewalls connects the dots on risk analysis, giving security teams a holistic view of enterprise-wide security and enabling prioritization of the most impactful risks regardless of the source.

Internet of Things (IoT) Vulnerability Scanning

Retina’s built-in IoT audits enable organizations to Identify the make and model of vulnerable IoT devices, and safely check them for default and hard-coded credentials used with Telnet, SSH, or Basic HTTP Authentication.

Fully Integrated Authenticated Scanning

Retrieve credentials with the highest level of privileges through native integration with PowerBroker Password Safe on each scan target when multiple scan credentials are provided. Using Password Safe in conjunction with Retina eliminates the concern of internally sharing highly-privileged credentials, or having static, never-changing, scan credentials.

Make Better Privilege Decisions with Vulnerability Insights

Leverage patented technology to automatically scan applications for vulnerabilities at run time to better inform IT and security teams on privileged access, enforce quarantine, reduce application privileges, or prevent the launch of applications altogether based on policy.

Flexible Deployment Options

BeyondTrust solutions can be deployed on premise via software or hardware appliance, or hosted in the cloud through services including Amazon Web Services and Azure Marketplace.

Common Criteria Certified

Common Criteria is an internationally recognized set of guidelines created to insure a high and consistent standard for evaluating information security products. You can have confidence in the security of the products that have earned this certification through extensive independent lab evaluations, and avoid the cost and complexity of additional testing. Retina CS has earned Common Criteria Certification under an Evaluation Assurance Level (EAL)2+.


Features & Benefits

THE BEST VULNERABILITY MANAGEMENT REPORTING

Results-Driven Architecture: Start by specifying what you want to accomplish, such as generating a vulnerability report, a HIPAA compliance report, or an asset delta report.

Intelligent Analytics: Run what-if scenarios and team capacity analyses to inform resource allocation decisions.

Interactive Results: Home in on data pertaining to a specific audience or goal.

260+ Actionable Reports: Communicate with technical and non-technical audiences.

Compliance Reporting: Map vulnerability and configuration audits to COBIT, GLBA, HIPAA, HITRUST, ISO-27002, ITIL, MASS 201, NERC-FERC, NIST, PCI, SOX and more (optional).

Advanced Threat Intelligence: Gauge severity based on asset scoring, BeyondTrust malware & exploit research, NSRL, exploit databases, CVSS v2 & v3, CWE and more.

Trending, Deltas, Threat Analyzers and Heat Maps: Share vulnerability management progress with executives, compliance auditors and others.

Configuration Benchmarking: Scan against benchmarks including DISA Gold Disk, SCAP, NIST, FDCC, USGCB, CIS and Microsoft®; customize images to match in-house policies; CIS Security Benchmark certified (optional).

SLA Compliance Reports: Measure threat severity level against dynamic asset groupings.

Pivot Grid Ad-Hoc Reporting: Meet unique business requirements by creating customized reports using virtually any data collected by Retina.

Third-Party Integration: Share data with SIEM, GRC, NMS and help desk solutions.


VULNERABILITY MANAGEMENT CAPABILITIES THAT GO BEYOND SCANNING

Results-Driven Architecture: Start by specifying what you want to accomplish, such as generating a vulnerability report, a HIPAA compliance report, or an asset delta report.

Intelligent Analytics: Run what-if scenarios and team capacity analyses to inform resource allocation decisions.

Interactive Results: Home in on data pertaining to a specific audience or goal.

260+ Actionable Reports: Communicate with technical and non-technical audiences.

Compliance Reporting: Map vulnerability and configuration audits to COBIT, GLBA, HIPAA, HITRUST, ISO-27002, ITIL, MASS 201, NERC-FERC, NIST, PCI, SOX and more (optional).

Advanced Threat Intelligence: Gauge severity based on asset scoring, BeyondTrust malware & exploit research, NSRL, exploit databases, CVSS v2 & v3, CWE and more.

Trending, Deltas, Threat Analyzers and Heat Maps: Share vulnerability management progress with executives, compliance auditors and others.

Configuration Benchmarking: Scan against benchmarks including DISA Gold Disk, SCAP, NIST, FDCC, USGCB, CIS and Microsoft®; customize images to match in-house policies; CIS Security Benchmark certified (optional).

SLA Compliance Reports: Measure threat severity level against dynamic asset groupings.

Pivot Grid Ad-Hoc Reporting: Meet unique business requirements by creating customized reports using virtually any data collected by Retina.

Third-Party Integration: Share data with SIEM, GRC, NMS and help desk solutions.


VULNERABILITY MANAGEMENT CAPABILITIES THAT GO BEYOND SCANNING

Vulnerability Assessment: Flag vulnerabilities, attacks, and malware by asset for a complete view of a device’s risk.

Comprehensive Discovery: Locate known and previously unknown assets across network (local and remote), web, mobile, cloud and virtual environments.

Asset Profiling: Gather information including IP, DNS, OS, MAC address, ports, services, software, processes, hardware, event logs and more.

Asset Smart Groups: Group, assess, and report on assets by IP range, naming convention, operating system, domain, applications, business function, Active Directory and more.

Asset Context Awareness: Evaluate Smart Group value & risk based on collateral damage potential or target distribution, plus confidentiality, integrity and availability requirements.

Customizable Asset Risk: Weigh asset risks based on threat risk or exposure risk, and then apply a scale of 1-10 to prioritize remediation.

Cloud Scanning: Discover and scan online and offline Amazon®, GoGrid®, IBM®, Rackspace® and VMware® environments.

VMware Verified: Scan virtual environments requiring PCI and HIPAA compliance.

Patch Management: Remediate vulnerabilities with onboard patch management for Microsoft WSUS and SCCM for Microsoft and third-party applications (optional).

Unmatched Reporting: Tap into the included BeyondInsight central data warehouse for targeted reports.

User Risk Discovery: Map vulnerability management data to privileged account management data (from BeyondTrust PowerBroker solutions) to reveal user-triggered risks.

Scheduling and Alerts: Schedule assessments and configure email alerts.


ENTERPRISE VULNERABILITY MANAGEMENT FOR LARGE ENVIRONMENTS

Automated Credentialed Scans: Automate the use of continuously rotating privileged credentials with PowerBroker Password Safe.

Flexible Deployment: Deploy software, appliances and/or virtual machines.

N-Tier, Multitenant Architecture: Ensure maximum scalability & gain centralized control.

Scalable Scan Engines: Each Retina scan engine can singlehandedly cover a Class-A network.

Credential Management: Retina CS automatically selects the credentials with the highest level of privileges on each scan target when multiple credentials are provided.

Retina Protection Agent: Local assessment, continuous zero-day monitoring, and intrusion prevention for offline devices.

Role-Based Access: Provide permissioned access to view, assess and report on data.

Centralized Dashboards: Consolidate and report on enterprise-wide activities.

Scanner Pooling: Direct multiple scanners to collaboratively assess large environments.

Integrated Data Warehouse: Sort and filter historical data to gain multiple perspectives.

Modern User Interface: Interact seamlessly with massive amounts of data.

Local and Remote Scanning: Cover segregated, firewalled and disparate infrastructure.

Effortless Updates and Upgrades: Expand capabilities through license key updates.

Retina Host Security Scanner: Very Fast and highly accurate host-based scanning of cloud, virtual and remote platforms.

Internet of Things Scanning: Identify at-risk IoT devices, such as IP cameras, DVRs, printers, routers, and more.

Rapid7 UserInSight Product Overview by E-SPIN
Increase Efficiency with Centralized Auditing and Recovery PowerBroker Auditor and Recovery for Active Directory includes a centralized database to enable both auditing and recovery of AD data, delivering a broader set of capabilities than native AD auditing — without the operational impacts. With PowerBroker Recovery for Active Directory, you have a continuous backup technology that
McAfee Data Center Security for Database Technical Overview by E-SPIN
Privilege and Session Management for Microsoft Windows BeyondTrust PowerBroker for Windows is a privilege management solution that gives you unmatched visibility and control over physical and virtual desktops and servers. Reduce attack surfaces by removing admin rights from end users and employing fine-grained policy controls for all privileged access, without disrupting productivity. Monitor and audit
Metasploit Product Overview by E-SPIN
Privileged Password Management and Privileged Session Management BeyondTrust PowerBroker® Password Safe is an automated password and session management solution that provides secure access control, auditing, alerting and recording for any privileged account — such as a local or domain shared administrator account; a user’s personal admin account; service, operating system, network device, database (A2DB) and
Ipswitch AlertFox Product Overview by E-SPIN
Privilege and Session Management for Microsoft Windows BeyondTrust® PowerBroker® for Windows is a privilege management solution that gives you unmatched visibility and control over physical and virtual Microsoft servers. Reduce attack surfaces by removing admin rights from end users and employing fine-grained policy controls for all privileged access, without disrupting productivity. Monitor and audit sessions
Retina CS Technical Overview by E-SPIN

Retina CS Technical Overview by E-SPIN

Enterprise Vulnerability Management Software for Dynamic IT Environments Retina CS delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting. Retina CS is the only vulnerability management software solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-oriented architecture works with
McAfee Risk Advisor

Retina CS Product Overview

Enterprise Vulnerability Management Software for Dynamic IT Environments Retina CS delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting. Retina CS is the only vulnerability management software solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-oriented architecture works with

Blink Endpoint Protection

Blink Endpoint Protection Blink delivers integrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against known exploits, zero day attacks, and all other attack vectors. Blink Server Edition While signature-based anti-virus continues to be the primary security solution for servers, there is a major shift in threats that bypass
TOP