Beyondtrust

The BeyondInsight IT Risk Management Platform

BeyondInsight unifies PowerBroker privileged account management and Retina vulnerability management solutions, enabling IT and security teams to collaborate on risk reduction efforts.

A Unified Platform for Privileged Account Management and Vulnerability Management

The BeyondInsight™ IT Risk Management Platform is an integrated suite of software solutions used by IT professionals and security experts to collaboratively:

  • Reduce user-based risk and mitigate threats to information assets
  • Address security exposures across large, diverse IT environments
  • Comply with internal, industry and government mandates

By unifying BeyondTrust privileged account management and vulnerability management solutions, BeyondInsight provides IT and security teams a single, contextual lens through which to view and address user and asset risk.

(Click image to enlarge)
BeyondInsight enables proactive, joint decision-making
while ensuring that daily operations are guided
by common goals for risk reduction.

Privileged Account Management

Easily enforce least-privilege best practices and provide the access employees need to perform their jobs safely, without obstructing IT or end-user productivity. BeyondInsight solutions for Privileged Account Management include:

Centralized Platform Capabilities

BeyondInsight adds significant value to Retina and PowerBroker via platform capabilities including:

  • Reporting & analytics
  • Data warehouse
  • Asset discovery & profiling
  • Asset smart groups
  • Role-based user management
  • Workflow & notification
  • Third-party integration
Vulnerability Management

Proactively identify exposures, analyze business impact, and plan and conduct remediation across network, web, mobile, cloud and virtual infrastructure. BeyondInsight solutions for Vulnerability Management include:

Advanced User & Asset Threat Analytics

BeyondInsight Clarity efficiently detects critical IT security threats that were previously lost amidst volumes of data, enabling you to identify users and assets displaying patterns of risky activity.

  • Aggregate users and asset data to centrally baseline and track behavior
  • Correlate diverse asset, user and threat activity to reveal critical risks
  • Measure the velocity of asset changes to flag in-progress threats
  • Isolate users and assets exhibiting deviant behavior
  • Increase the ROI of deployed security solutions with deep risk analytics
  • Generate reports to inform and align security decisions
BeyondInsight Clarity Diagram

BeyondInsight Clarity correlates and analyzes diverse asset and user data to identify critical threats in your IT environment.
(Click image to enlarge)

Features

Whether you configure BeyondInsight for vulnerability management, privilege management, or both, you have access to powerful, centralized features including:

  • Advanced Threat Analytics: Correlate low-level data from a variety of BeyondTrust and third-party solutions to uncover critical threats.
  • Unmatched Reporting & Analytics: Report on compliance, benchmarks, threat analytics, what-if scenarios, resource requirements, and more.
  • Integrated Data Warehouse: View, sort and filter historical data for multiple perspectives.
  • Comprehensive Discovery: Locate network (local & remote), web, mobile, cloud and virtual assets, as well as privileged accounts.
  • Asset Profiling: Profile IP, DNS, OS, Mac address, users, accounts, password ages, ports, services, software, processes, hardware, event logs, and more.
  • Asset Smart Groups: Group, assess, & report on assets by IP range, naming convention, OS, domain, applications, business function, Active Directory, and more.
  • Role-Based User Management: Import from Active Directory or set custom permissions.
  • Workflow, Ticketing & Notification: Coordinate IT and security teams.
  • Third-Party Integration: Share data with leading SIEM, GRC, NMS and help desk solutions.

Benefits

BeyondInsight empowers IT and security teams to...

  • Discover network, web, mobile, cloud and virtual infrastructure
  • Profile asset configuration and assess risk potential
  • Detect applications and OS functions that require administrator privileges
  • Manage access to admin and root privileges across all infrastructure
  • Identify vulnerabilities enterprise-wide
  • Reveal user, account and asset risks previously hidden in diverse data sets
  • Analyze threat potential, return on remediation, and more
  • Remediate vulnerabilities through integrated patch management
  • Report on vulnerabilities, compliance, benchmarks, and more
  • Protect endpoints from client-side attacks

Vulnerability-Based Application Management

PowerBroker for Windows customers have access to Vulnerability-Based Application Management (VBAM) capabilities via the BeyondInsight console. VBAM enables PowerBroker for Windows to access the Retina vulnerability database and create rules, such as:

  1. Allow administrator privileges if the system contains any vulnerability that maps to PCI or HIPAA and is less than 30 days old.
  2. Allow standard user privileges and display a warning if the system contains any critical vulnerability less than 90 days old, regardless of regulation.
  3. Deny operations and alert operations and security staff if the system contains any critical vulnerability that is older than 90 days.

In all cases, BeyondInsight would provide real-time alerts of all vulnerabilities.

BeyondInsight Clarity: Advanced Threat Analytics

An application is launched for the first time. An administrator logs in at 2am. A server has unpatched vulnerabilities. Seen individually, these events may be written off as low-risk blips. When combined on a single system, in a single time period, they add up to a red alert.

BeyondInsight Clarity enables IT and security professionals to identify the data breach threats typically missed by other security analytics solutions. A standard capability of the BeyondInsight IT Risk Management Console, Clarity pinpoints specific, high-risk users and assets by correlating low-level privilege, vulnerability and threat data from a variety of BeyondTrust and third-party solutions.

Datasheet

BeyondInsight IT Risk Management Platform

BeyondInsight IT Risk Management Platform

This datasheet covers the extensive capabilities of BeyondInsight, detailing the unification of BeyondTrust products into one centralized platform for Privileged Account Management and Vulnerability Management.

Datasheet

BeyondInsight Clarity

BeyondInsight Clarity

This datasheet details the advanced user, account and asset threat analytics capabilities in the latest version of BeyondInsight, labeled Clarity. Clarity pinpoints specific, high-risk users and assets by correlating low-level privilege, vulnerability and threat data from a variety of BeyondTrust and third-party solutions.

Documentation

BeyondInsight Version 5.4 New and Updated Features

BeyondInsight Version 5.4 New and Updated Features

BeyondInsight version 5.4 introduces Clarity, an advanced threat analytics solution that enables IT and security professionals to identify the data breach threats typically missed by other security analytics solutions. BeyondInsight Clarity pinpoints specific, high-risk users and assets by correlating low-level privilege, vulnerability and threat data from a variety of BeyondTrust and third-party solutions.

White Paper

Who’s Using Cyberthreat Intelligence and How?

Who’s Using Cyberthreat Intelligence and How?

The idea behind cyberthreat intelligence is to provide the ability to recognize and act upon indicators of attack and compromise scenarios in a timely manner. While bits of information about attacks abound, cyberthreat intelligence (CTI) recognizes indicators of attacks as they progress, in essence putting these pieces together with shared knowledge about attack methods and processes.

White Paper

Fusing Vulnerability Data and User Intelligence

Fusing Vulnerability Data and User Intelligence

BeyondTrust joins asset and user information in one platform, allowing IT and Security teams to have one lens through which to view risk. This puts events in context and enables joint decision-making within your IT organization, ensuring daily operations are guided by common goals for reducing risk.

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

2/27/2015

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent... more

Advanced Threat Analytics Reveals Hidden Risks: Introducing BeyondInsight Clarity

2/3/2015

BeyondInsight Clarity, now shipping standard with BeyondInsight v5.4, enables our customers to detect critical IT security threats previously lost amidst volumes of data, while identifying specific users, accounts and assets exhibiting patterns of risky activity. more

Introducing BeyondInsight v5.3: Delivering New Levels of Threat Analytics

11/4/2014

Today, we’re excited to announce new releases of both our Retina vulnerability assessment technology and the BeyondInsight risk management platform. Here’s a brief overview of what’s new in BeyondInsight. With the release of BeyondInsight v5.3, BeyondTrust solutions that come equipped with the centralized BeyondInsight management, analytics and reporting console now benefit from several additional platform... more

Keeping Track of Shellshock Vulnerabilities with Retina CS and BeyondInsight

10/2/2014

Worried about BASH Shellshock? Retina CS Enterprise Vulnerability Management can scan your environment to identify applications affected by Shellshock. BeyondTrust has generated several Retina vulnerability audits to help our customers identify the various permutations of applications affected by Shellshock. The BeyondInsight Analytics and Reporting engine, included with Retina CS, makes it simple to view and... more

IT and Security Collaboration: A Quick Win for Risk Management

8/4/2014

During World War II, the United States posted flyers such as “Loose Lips Might Sink Ships” to discourage gossip and sharing data that could ultimately end up in enemy hands. More recently we’ve heard, “If You See Something, Say Something.” Both bits of wisdom apply to security within organizations. Users have to consider the potential... more

Where Passive Scanning Falls Short

7/11/2014

In many sports, as in business, teams will promote a strategy to gain an edge – even if the concept is possibly flawed. Consider an American football hurry-up offense: will it cause the defense to stumble, or will it just exhaust the offense? The play has potential pros and cons, and many strategic technologies are... more

Tidings from the Year 2036: The Search for Relevant Security Data

6/24/2014

A few years ago, I wrote a blog post about finding personal information online. I recently Googled myself again to see who knows what about me. I expected to find some posts and papers I’ve written, and maybe some of my contact details. Instead, the majority of the first-page results associate my name with a... more

BeyondInsight Evolution is Paving the Way for a Revolution in IT Risk Management

5/27/2014

2008: Unifying Vulnerability Management + Endpoint Protection It all started in 2008, when eEye Digital Security transformed its REM management platform into Retina CS, a solution that could do more than just vulnerability management. Retina CS (short for “Compliance and Security” – or, as we joke internally, for “Chris Silva” our Chief Architect) merged the... more

A New Way of Looking at Vulnerabilities in Your Environment

4/23/2014

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does... more

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

4/21/2014

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in... more

See all BeyondInsight blog posts

VMware Plug-in for Retina

The industry's first and only vulnerability management solution directly integrated into vCenter.

DATASHEET VMWARE SURVEY Watch Video

Retina CS Enterprise Vulnerability Management

Delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Cofiguration Compliance Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Patch Management Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Regulatory Reporting Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina Network Security Scanner

Integrated network, web & virtual vulnerability assessment. Retina is the security industry’s most respected and industry-validated security scanner and serves as the engine for our vulnerability management solutions. There is no better option for securing your network from vulnerabilities.

Learn More Request a Free Trial

Retina Web Security Scanner

Rapidly and accurately scan large, complex web sites and web applications to tackle web-based vulnerabilities including cross-site scripting (XSS) and SQL injection.

Learn More Request a Free Trial

PowerBroker Event Vault

Automate and streamline the collection and management of standard Windows event log data and provide scalable and flexible centralized storage in the PowerBroker event database.

Learn More Request a Free Trial

PowerBroker Identity Services

Quickly and easily integrate your Linux and UNIX servers into your Active Directory infrastructure.

Learn More Request a Free Trial

PowerBroker Identity Services Open Edition

Available as a free and open source version of PowerBroker Identity Services, giving you the access and flexibility to tailor your Active Directory bridging project

Download Now

PowerBroker UNIX & Linux

Quickly and easily manage root access on UNIX and Linux servers, without ever disclosing the system password.

Learn More Request a Free Trial

PowerBroker for Windows

Implement least privilege for your Windows desktop environment, reducing attack surface and driving down costs.

Learn More Request a Free Trial

PowerBroker Auditor
for Active Directory

Track unauthorized changes to Active Directory and Group Policy configurations.

Learn More Request a Free Trial

PowerBroker Auditor
for Exchange

Tracks and reports all changes made to all Exchange Server configurations, groups, mailbox policies, information store changes, and permissions in a centralized audit log.

Learn More Request a Free Trial

PowerBroker Auditor
for File System

Enables tighter security and control over file system resources, including real-time tracking, interactive analysis, and flexible reporting on all key share, file, and folder changes.

Learn More Request a Free Trial

PowerBroker Auditor
for SQL Server

Monitor and review privileged user changes on SQL servers. Easily map your SQL activities with regulatory mandates such as GLBA, SOX, HIPAA, and PCI through consistent auditing and reporting.

Learn More Request a Free Trial

PowerBroker Privilege Explorer

Provides a centralized view of access and privileges, so you can be sure that users have access to the resources they need to do their jobs, and only those resources.

Learn More Request a Free Trial

PowerBroker Endpoint Protection Platform

Formerly known as "Blink", multi-layered security and attack prevention for windows desktops and servers.

Learn More Request a Free Trial

PowerBroker Recovery
for Active Directory

Advanced continuous data protection for Active Directory, providing unparalleled visibility and change control.

Learn More Request a Free Trial

PowerBroker Servers Enterprise

Combine the power of our UNIX/Linux root delegation and our AD bridging for an enterprise approach to server compliance

Learn More Request a Free Trial

PowerBroker Password Safe

Automate Password Management for Increased Security across your entire dynamic infrastructure.

Learn More Request a Free Trial

BeyondSaaS

A cloud-based, external vulnerability assessment solution that conducts fast, affordable security assessments of your public-facing network infrastructure and web applications.

Learn More Request a Free Trial

BeyondInsight

Merge privileged account management and vulnerability management solutions into a single, contextual lens through which to view and address user and asset risk.

Learn More Request a Free Trial

Retina Protection Agent

Close the security gap created by systems that can't be reached with remote vulnerability assessments alone with this lightweight agent for local vulnerability assessment, continuous zero-day vulnerability monitoring, and intrusion prevention.

Learn More

Configuration Compliance Module

This Retina CS add-on module defines and manages security policies to monitor compliance with industry and internally developed benchmarks such as Microsoft, NIST, USBCG, and DISA STIGs.

Learn More

Patch Management Module

This Retina CS add-on module seamlessly integrated, automated, agentless Windows patch management closes the loop on unpatched vulnerabilities.

Learn More

Regulatory Reporting Module

This Retina CS add-on module contains automated solutions to help navigate complex corporate policies, government regulations, and industry standards such as SOX, PCI, FISMA, and ISO.

Learn More

Vulnerability Management

Identifying, prioritizing, remediating, and mitigating
computer and network vulnerabilities.

Privileged Account Management

Managing user authorization to prevent internal data
breaches and meet compliance regulations.

Fusing
PAM & VM For
Stronger IT Security