BeyondTrust launches a cloud-based vulnerability assessment platform

1

When it comes to patching and mitigating vulnerabilities, knowing is half the battle. Unfortunately, most organizations don’t have an effective vulnerability assessment program in place, and the businesses that need it most lack the skills and resources to manage it effectively. BeyondTrust hopes to help those companies out, though, with BeyondSaaS—its new cloud-based vulnerability assessment tool.

BeyondSaaS simplifies vulnerability management by allowing organizations to scan public-facing assets to identify open vulnerabilities. BeyondSaaS is particularly effective in helping organizations achieve and maintain compliance with regulatory and industry compliance mandates such as PCI-DSS (Payment Card Industry Data Security Standards), SOX (Sarbanes-Oxley), or HIPAA (Health Insurance Portability and Accountability Act).

The approach of BeyonSaaS is to provide an attackers-eye view—scanning your Internet-connected servers and applications from the same perspective an attacker has when scanning your network for holes to exploit. While it’s important to know where vulnerabilities exist both inside and outside the network, it’s crucial to address flaws that can be exploited directly from outside the network.

The heart of BeyondSaaS is the Retina Network Security Scanner—one of the most well-known, and widely used vulnerability scanning platforms in the industry. BeyondSaaS enables you to run manual ad hoc scans, or schedule automated vulnerability scans, and create reports that can be accessed and viewed from a Web browser.

“With the release of BeyondSaaS, BeyondTrust is providing a trusted hands-free approach to vulnerability management and regulatory compliance with a higher degree of accuracy and a lower annual cost,” said Kevin Baker, principal at Innovative Management LLC.

One of the advantages of BeyondSaaS is that it is entirely cloud-based, and there is no hardware or software to deploy. The BeyondSaaS platform integrates with Microsoft Live credentials, or Active Directory, and can be managed from any Web browser—even from a smartphone or tablet…

Read the full story at TechRepublic: BeyondTrust launches a cloud-based vulnerability assessment platform.

Full disclosure: BeyondTrust is a sponsor of TechSpective.net.

Share.

About Author

I have a passion for technology and gadgets--with a focus on Microsoft and security--and a desire to help others understand how technology can affect or improve their lives. I also love spending time with my wife, 7 kids, 3 dogs, 5 cats, 3 rabbits, 2 ferrets, pot-bellied pig and sulcata tortoise, and I like to think I enjoy reading and golf even though I never find time for either. You can contact me directly at tony@xpective.net. For more from me, you can follow me on Twitter, Facebook, Instagram and LinkedIn.

1 Comment

  1. Pingback: 10 Essential Network Vulnerability Scanning Tools

Leave A Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.