Beyondtrust

Configuration Compliance Reporting Module for Retina CS

Simplify your audit and report activities for common industry configuration guidelines and best practices.

Automated Configuration Compliance Auditing & Reporting

Even with the smartest users, fully patched systems, and the latest and greatest in firewall and antivirus technology, it is still possible for attackers to breach your network. Therefore, in addition to patching and remediation, configuration management is a necessary practice for securing enterprise networks. When leveraged as part of the Retina CS Enterprise Vulnerability Management solution, the Configuration Compliance Module streamlines auditing and reporting against industry configuration guidelines and best practices.

  • Integrated templates for operating systems and applications from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft
  • Audit configurations against internal policies, industry regulations, or recommended best practices
  • Centralize reporting for simple monitoring and streamlined regulatory compliance
  • Integrated data warehouse technology for long term-trending, analytics and reporting
Configuration Compliance Web Servers

“...in Frost & Sullivan’s opinion, few security products have been able to address the unique threats presented by these technologies and practices. BeyondTrust provides the requisite security functionality to ensure that customers can safely embrace these new technologies”

Frost & SullivanFrost & Sullivan
Simple and Flexible Configuration Compliance
The Configuration Compliance Module includes templates for Windows, Linux, and UNIX, plus applications assessments from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft. Robust auditing and reporting capabilities help keep your network running, available, and accessible using industry-standard best practices.
Support for Your Entire IT Infrastructure
BeyondTrust continues to be the only security solution provider to support configuration compliance reporting for network, virtual and cloud assets.
Unify Configuration Compliance with Security Intelligence
Use in conjunction with BeyondInsight’s reporting engine, which delivers analytics and trending across the threat lifecycle for multi-dimensional reports on assets, vulnerabilities, attacks and remediation.
Integrated with Retina Vulnerability Management
A centralized management, reporting and analytics console enables security, IT and compliance teams to easily manage Configuration Compliance in concert with Retina CS Enterprise Vulnerability Management.

Features & Benefits

  • Configuration assessment: Validate audit settings, security settings, user rights, logging configuration, and more.
  • Built-in templates: Includes templates for Windows operating systems and applications from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft.
  • Customizable: Includes a benchmark importer for customizing configuration benchmarks to your specific requirements. Allows you to import and synchronize new and updated benchmarks directly from BeyondTrust‘s Research Team.
  • Streamlined reporting: Demonstrate compliance with government and corporate standards via built-in vulnerability reporting and integration with BeyondInsight for deltas, trends and drilldowns.
  • Centralized management console: Manage and report on configuration compliance in conjunction with vulnerability management, patch management, and regulatory compliance via a unified console.
  • OVAL SCAP-certified scan engine and interpreter with report export capabilities to ARF, NIST, XCCDF, and other government formats.

Datasheet

Configuration Compliance Module

Retina CS Add-On Modules

Download this overview document detailing the capabilities, highlights and competitive advantages of the three Retina CS add-on modules. By adding Retina Patch Management, Configuration Compliance and Regulatory Reporting modules to Retina CS, you not only gain a more holistic view of your enterprise security posture, but also significantly improve the efficiency of your vulnerability management program.

Configuration Mistakes Make for Costly Security Gaps

5/25/2012

Earlier this week, Brian Prince over at Security Week posted an article on a subject that we’ve always been passionate about here at eEye, now BeyondTrust, Research – and that’s configuration.  More specifically, the incredible impact that smart, effective configuration can have on reducing attack surface for any size organization. From Brian’s article, I agree... more

Automating Configuration Auditing

3/15/2011

????????I want to discuss a rather simple use case with my readers that until recently, had a rather complex solution. Consider you are a major airline, corporation, or even a local government with thousands of systems that should be identical from a configuration perspective. These could be airline check-in kiosks, a call center handling support calls,... more

Too Many Regulatory Standards, Only One Tool Please

11/12/2010

About every two years, I indulge myself with a new laptop. This time, I waited almost three years and will be retiring my old Dell XPS M1330 for a new Alienware M15x. I wanted raw horsepower for virtual machines in a laptop format and was not as concerned about battery life (since I carry an... more

See all Configuration Compliance Module blog posts

VMware Plug-in for Retina

The industry's first and only vulnerability management solution directly integrated into vCenter.

DATASHEET VMWARE SURVEY Watch Video

Retina CS Enterprise Vulnerability Management

Delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Cofiguration Compliance Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Patch Management Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Regulatory Reporting Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina Network Security Scanner

Integrated network, web & virtual vulnerability assessment. Retina is the security industry’s most respected and industry-validated security scanner and serves as the engine for our vulnerability management solutions. There is no better option for securing your network from vulnerabilities.

Learn More Request a Free Trial

Retina Web Security Scanner

Rapidly and accurately scan large, complex web sites and web applications to tackle web-based vulnerabilities including cross-site scripting (XSS) and SQL injection.

Learn More Request a Free Trial

PowerBroker Event Vault

Automate and streamline the collection and management of standard Windows event log data and provide scalable and flexible centralized storage in the PowerBroker event database.

Learn More Request a Free Trial

PowerBroker Identity Services

Quickly and easily integrate your Linux and UNIX servers into your Active Directory infrastructure.

Learn More Request a Free Trial

PowerBroker Identity Services Open Edition

Available as a free and open source version of PowerBroker Identity Services, giving you the access and flexibility to tailor your Active Directory bridging project

Download Now

PowerBroker UNIX & Linux

Quickly and easily manage root access on UNIX and Linux servers, without ever disclosing the system password.

Learn More Request a Free Trial

PowerBroker for Windows

Implement least privilege for your Windows desktop environment, reducing attack surface and driving down costs.

Learn More Request a Free Trial

PowerBroker Auditor
for Active Directory

Track unauthorized changes to Active Directory and Group Policy configurations.

Learn More Request a Free Trial

PowerBroker Auditor
for Exchange

Tracks and reports all changes made to all Exchange Server configurations, groups, mailbox policies, information store changes, and permissions in a centralized audit log.

Learn More Request a Free Trial

PowerBroker Auditor
for File System

Enables tighter security and control over file system resources, including real-time tracking, interactive analysis, and flexible reporting on all key share, file, and folder changes.

Learn More Request a Free Trial

PowerBroker Auditor
for SQL Server

Monitor and review privileged user changes on SQL servers. Easily map your SQL activities with regulatory mandates such as GLBA, SOX, HIPAA, and PCI through consistent auditing and reporting.

Learn More Request a Free Trial

PowerBroker Privilege Explorer

Provides a centralized view of access and privileges, so you can be sure that users have access to the resources they need to do their jobs, and only those resources.

Learn More Request a Free Trial

PowerBroker Endpoint Protection Platform

Formerly known as "Blink", multi-layered security and attack prevention for windows desktops and servers.

Learn More Request a Free Trial

PowerBroker Recovery
for Active Directory

Advanced continuous data protection for Active Directory, providing unparalleled visibility and change control.

Learn More Request a Free Trial

PowerBroker Servers Enterprise

Combine the power of our UNIX/Linux root delegation and our AD bridging for an enterprise approach to server compliance

Learn More Request a Free Trial

PowerBroker Password Safe

Automate Password Management for Increased Security across your entire dynamic infrastructure.

Learn More Request a Free Trial

BeyondSaaS

A cloud-based, external vulnerability assessment solution that conducts fast, affordable security assessments of your public-facing network infrastructure and web applications.

Learn More Request a Free Trial

BeyondInsight

Merge privileged account management and vulnerability management solutions into a single, contextual lens through which to view and address user and asset risk.

Learn More Request a Free Trial

Retina Protection Agent

Close the security gap created by systems that can't be reached with remote vulnerability assessments alone with this lightweight agent for local vulnerability assessment, continuous zero-day vulnerability monitoring, and intrusion prevention.

Learn More

Configuration Compliance Module

This Retina CS add-on module defines and manages security policies to monitor compliance with industry and internally developed benchmarks such as Microsoft, NIST, USBCG, and DISA STIGs.

Learn More

Patch Management Module

This Retina CS add-on module seamlessly integrated, automated, agentless Windows patch management closes the loop on unpatched vulnerabilities.

Learn More

Regulatory Reporting Module

This Retina CS add-on module contains automated solutions to help navigate complex corporate policies, government regulations, and industry standards such as SOX, PCI, FISMA, and ISO.

Learn More

Vulnerability Management

Identifying, prioritizing, remediating, and mitigating
computer and network vulnerabilities.

Privileged Account Management

Managing user authorization to prevent internal data
breaches and meet compliance regulations.

Fusing
PAM & VM For
Stronger IT Security