SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!
Need Help? Email [email protected]
  • LOGIN

E-SPIN Group

CONTACT US / GET A QUOTE
  • No products in cart.
  • HOME
  • PROFILE
    • Corporate Profile
    • About us
    • Customer Overview
    • Investor Relations
    • Procurement
  • GLOBAL THEMES
    • Artificial Intelligence (AI)
    • Big Data
    • Blockchain
    • Cloud Computing
    • Cognitive Computing
    • Cyber Security
    • DevSecOps
    • Digital Transformation (DT)
    • Modern Workplace
    • Internet of Things (IoT)
    • Quantum Computing
  • SOLUTIONS
    • Application Security
    • DevSecOps
    • Digital Forensics
    • IT Operations Management (ITOM)
    • Malware Analysis and Reverse Engineering
    • Network Management System (NMS)
    • Network Operation (NetOps)
    • Network Performance Monitoring and Diagnostics (NPMD)
    • Penetration Testing
    • Secure Development
    • Security Information & Event Management (SIEM)
  • INDUSTRIES
    • Aerospace & Defense
    • Automotive
    • Banking & Financial Markets
    • Chemical & Petroleum
    • Commercial and Professional Services
    • Construction & Real Estate
    • Consumer Products
    • Education
    • Electronics
    • Energy & Utilities
    • Food & Beverage
    • Information Technology
    • Insurance
    • Healthcare
    • Goverment
    • Telecommunications
    • Transportation
    • Travel
    • Manufacturing
    • Media & Entertainment
    • Mining & Natural Resources
    • Life Sciences
    • Retail
  • PRODUCTS
    • Brand Overview
      • Acunetix
      • E-Lock
      • Hex-Rays
      • Immunity
      • Progress | Ipswitch
      • Metageek
      • Qualys
      • Parasoft
      • Tenable
      • Titania
      • Veracode
    • Rest of Brands
      • Adobe
      • BeyondTrust
      • Core Security
      • DefenseCode
      • HCL
      • ImmuniWeb
      • LiveAction
      • McAfee
      • Micro Focus
      • Microsoft
        • Microsoft Surface
      • Netsparker
      • Nutanix
      • Paessler
      • PECB
      • Portswigger
      • Red Hat
      • Riverbed
      • RSA
      • Solarwinds
      • TamoSoft
      • Trend Micro
      • TSFactory
      • Trustwave
      • VMware
      • VanDyke
      • Visiwave
    • Services Overview
    • Line Card
  • e-STORE
    • e-STORE
    • eSTORE Guide
    • SUPPORT
  • CAREERS
    • Careers
    • Culture, Values and CSR
    • How We Hire
    • Job Openings
  • BLOG / NEWS
    • Blogs and News
    • Resources Library
    • Calendar of Events
  • CONTACT
  • Home
  • Brand
  • BeyondTrust
  • Retina CS Product Overview
E-SPIN Unified Vulnerability Management (UVM) Explained
0
E-SPIN
Friday, 18 September 2015 / Published in BeyondTrust, Brand, Product, Videos

Retina CS Product Overview

Enterprise Vulnerability Management Software for Dynamic IT Environments

Retina CS delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

Retina CS is the only vulnerability management software solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-oriented architecture works with users to proactively identify security exposures, analyze business impact, and plan and conduct remediation across disparate and heterogeneous infrastructure. Over 10,000 customers worldwide rely on Retina to enable visible, measurable and actionable vulnerability management across their organizations. Retina CS

Enterprise Vulnerability Management software enables you to:

  • Discover network, web, mobile, cloud, virtual and IoT infrastructure
  • Profile asset configuration and risk potential
  • Pinpoint vulnerabilities, malware and attacks
  • Analyze threat potential and return on remediation
  • Remediate vulnerabilities via integrated patch management (optional)
  • Report on vulnerabilities, compliance, benchmarks, etc.
  • Protect endpoints against client-side attacks
  • Make more informed privilege decisions

Features & Benefits

THE BEST VULNERABILITY MANAGEMENT REPORTING

  • Results-Driven Architecture: Start by specifying what you want to accomplish, such as generating a vulnerability report, a HIPAA compliance report, or an asset delta report.
  • Intelligent Analytics: Run what-if scenarios and team capacity analyses to inform resource allocation decisions.
  • Interactive Results: Home in on data pertaining to a specific audience or goal.
  • 260+ Actionable Reports: Communicate with technical and non-technical audiences.
  • Compliance Reporting: Map vulnerability and configuration audits to COBIT, GLBA, HIPAA, HITRUST, ISO-27002, ITIL, MASS 201, NERC-FERC, NIST, PCI, SOX and more (optional).
  • Advanced Threat Intelligence: Gauge severity based on asset scoring, BeyondTrust malware & exploit research, NSRL, exploit databases, CVSS v2 & v3, CWE and more.
  • Trending, Deltas, Threat Analyzers and Heat Maps: Share vulnerability management progress with executives, compliance auditors and others.
  • Configuration Benchmarking: Scan against benchmarks including DISA Gold Disk, SCAP, NIST, FDCC, USGCB, CIS and Microsoft®; customize images to match in-house policies; CIS Security Benchmark certified (optional).
  • SLA Compliance Reports: Measure threat severity level against dynamic asset groupings.
  • Pivot Grid Ad-Hoc Reporting: Meet unique business requirements by creating customized reports using virtually any data collected by Retina.
  • Third-Party Integration: Share data with SIEM, GRC, NMS and help desk solutions.

VULNERABILITY MANAGEMENT CAPABILITIES THAT GO BEYOND SCANNING

  • Vulnerability Assessment: Flag vulnerabilities, attacks, and malware by asset for a complete view of a device’s risk.
  • Comprehensive Discovery: Locate known and previously unknown assets across network (local and remote), web, mobile, cloud and virtual environments.
  • Asset Profiling: Gather information including IP, DNS, OS, MAC address, ports, services, software, processes, hardware, event logs and more.
  • Asset Smart Groups: Group, assess, and report on assets by IP range, naming convention, operating system, domain, applications, business function, Active Directory and more.
  • Asset Context Awareness: Evaluate Smart Group value & risk based on collateral damage potential or target distribution, plus confidentiality, integrity and availability requirements.
  • Customizable Asset Risk: Weigh asset risks based on threat risk or exposure risk, and then apply a scale of 1-10 to prioritize remediation.
  • Cloud Scanning: Discover and scan online and offline Amazon®, GoGrid®, IBM®, Rackspace® and VMware® environments.
  • VMware Verified: Scan virtual environments requiring PCI and HIPAA compliance.
  • Patch Management: Remediate vulnerabilities with onboard patch management for Microsoft WSUS and SCCM for Microsoft and third-party applications (optional).
  • Unmatched Reporting: Tap into the included BeyondInsight central data warehouse for targeted reports.
  • User Risk Discovery: Map vulnerability management data to privileged account management data (from BeyondTrust PowerBroker solutions) to reveal user-triggered risks.
  • Scheduling and Alerts: Schedule assessments and configure email alerts.

ENTERPRISE VULNERABILITY MANAGEMENT FOR LARGE ENVIRONMENTS

  • Automated Credentialed Scans: Automate the use of continuously rotating privileged credentials with PowerBroker Password Safe.
  • Flexible Deployment: Deploy software, appliances and/or virtual machines.
  • N-Tier, Multitenant Architecture: Ensure maximum scalability & gain centralized control.
  • Scalable Scan Engines: Each Retina scan engine can singlehandedly cover a Class-A network.
  • Credential Management: Retina CS automatically selects the credentials with the highest level of privileges on each scan target when multiple credentials are provided.
  • Retina Protection Agent: Local assessment, continuous zero-day monitoring, and intrusion prevention for offline devices.
  • Role-Based Access: Provide permissioned access to view, assess and report on data.
  • Centralized Dashboards: Consolidate and report on enterprise-wide activities.
  • Scanner Pooling: Direct multiple scanners to collaboratively assess large environments.
  • Integrated Data Warehouse: Sort and filter historical data to gain multiple perspectives.
  • Modern User Interface: Interact seamlessly with massive amounts of data.
  • Local and Remote Scanning: Cover segregated, firewalled and disparate infrastructure.
  • Effortless Updates and Upgrades: Expand capabilities through license key updates.
  • Retina Host Security Scanner: Very Fast and highly accurate host-based scanning of cloud, virtual and remote platforms.
  • Internet of Things Scanning: Identify at-risk IoT devices, such as IP cameras, DVRs, printers, routers, and more.

This video is about Retina CS Product Overview

Retina CS Product Overview

For those who can not join us for the session, please see the summary and highlight clip for the event.

E-SPIN recently run a Retina CS what’s new session cover what new for new user and existing users.

If you have any inquiry or questions, feel free to contact E-SPIN for solution, product and project requirements.

Tagged under: E-SPIN, espincorp, Retina CS Management Console

What you can read next

Retina Network Security Scanner Demo by E-SPIN
WhatsUp Gold FailOver Manager Technical Overview by E-SPIN
Web Application Security Assessment (WASA) as a Service Product Overview by E-SPIN
Acunetix v12 Web Vulnerability Scanner (WVS) Latest Build and Release
Mobile Application Development Platform (MADP) Product Overview by E-SPIN
Metasploit Product Overview by E-SPIN

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Retail trends for 2021 and beyond

    After a year long of COVID-19 pandemic, lockdow...
  • AppSec Lab AppUse Pro product discontinued notice

    For all the business partners and customers, Be...
  • Linux dominance DevSecOps

    Whether from the DevOps to modern DevSecOps, Li...
  • Artificial Intelligence (AI)

    AI computer be the most of people boss

    A lot of people focus on artificial intelligenc...
  • Vulnerability Management explained in E-SPIN Vulnerability Management Wheel model

    The innovators dilemma new technologies cause established firm to fail

    Today we want to talk about the innovators dile...

Recent Comments

  • Dorai M on 5 Common ML Challenges Data Scientists Face

Archives

  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • March 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • January 2015
  • December 2014
  • October 2014
  • September 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • February 2012
  • July 2011
  • June 2011
  • February 2009
  • July 2008

Categories

  • Acunetix
  • Adobe
  • Aerospace and Defence
  • AppSec Labs
  • Automotive
  • Banking and Financial Markets
  • BeyondTrust
  • Brand
  • Chemical and petroleum
  • Codified Security
  • Commercial and Professional Services
  • Construction and Real Estate
  • Consumer products
  • Contact Us
  • Core Impact
  • Core Security
  • DefenseCode
  • E-Lock
  • Education
  • Electronics
  • Energy and utilities
  • FAQ
  • Food and Beverage (F&B)
  • GFI
  • Global Themes and Feature Topics
  • Government
  • HCL
  • Healthcare
  • Hex-Rays
  • IBM
  • Immunity
  • ImmuniWeb
  • Industries
  • Information Technology
  • Insurance
  • Ipswitch
  • Job
  • Life Science
  • LiveAction
  • Logpoint
  • Manufacturing
  • McAfee
  • Media and Entertainment
  • Metageek
  • Micro Focus
  • Microsoft
  • Mining and Natural Resources
  • Nessus
  • Netsparker
  • News
  • Nutanix
  • Paessler
  • Parasoft
  • PECB
  • PortSwigger
  • Pradeo
  • Product
  • Qualys
  • Rapid7
  • RedHat
  • Retail
  • Retina
  • Riverbed
  • RSA
  • Security Innovation
  • Security Roots
  • Services
  • SILICA
  • Smart City
  • Soft Activity
  • SolarWinds
  • Solution
  • Symantec
  • TamoSoft
  • Telecommunications
  • Tenable
  • Titania
  • Transportation
  • Travel
  • Trend Micro
  • Trustwave
  • TSFactory
  • Uncategorized
  • Vandyke
  • Veracode
  • Videos
  • VisiWave
  • VMware
  • Webinar Archive

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

CORPORATE

  • Profile
  • About us
  • Careers
  • Investor Relations
  • Procurement

SOLUTIONS & PRODUCTS

  • Industries
  • Solutions
  • Products
  • Brand Overview
  • Services

STORE & SUPPORT

  • Shop
  • Cart
  • Checkout
  • My Account
  • Support

PRODUCTS & SERVICES

  • Industries
  • Solutions
  • Products
  • Brand Overview
  • Services

FOLLOW US

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • YouTube
  • WordPress Blog
© 2005 - 2021 E-SPIN Group of Companies | All rights reserved.
  • Contact
  • Privacy
  • Terms of use
TOP