Beyondtrust

Regulatory Compliance Reporting Module for Retina CS

Accelerate your compliance reporting, while driving down the cost of collecting and presenting that compliance data. The BeyondTrust Regulatory Reporting Packs provide an automated solution to help you navigate the increasingly complex regulatory landscape.

Simplify Compliance with PCI, HIPAA, SOX, GLBA, NIST, FERC/NERC and More

Today’s strict regulatory environment continues to evolve in a more aggressive fashion, requiring organizations to adapt their security policies for proof-positive compliance with data integrity and confidentiality requirements. This has added tremendous complexity and cost to over-taxed IT and security teams.

The BeyondTrust Regulatory Reporting Packs, seamlessly integrated within Retina CS Enterprise Vulnerability Management, provide an automated solution to help you navigate the regulatory compliance landscape. Unlike other products that only provide generic compliance reports, our Regulatory Reporting Packs map each of your network’s vulnerabilities to specific regulatory mandates, including PCI, HIPAA, SOX, GLBA, NIST, FERC/NERC, MASS 201, ISO, COBiT, ITIL, and HITRUST.

Regulatory Compliance Reporting

“...in Frost & Sullivan’s opinion, few security products have been able to address the unique threats presented by these technologies and practices. BeyondTrust provides the requisite security functionality to ensure that customers can safely embrace these new technologies”

Frost & Sullivan Frost & Sullivan
Easily Validate Compliance with IT Security Mandates
Map Retina vulnerability and configuration audits to mandates including PCI, HIPAA, SOX, GLBA, NIST, FERC/NERC, MASS 201, ISO, COBiT, ITIL, and HITRUST.
Support for Your Entire IT Infrastructure
BeyondTrust continues to be the only security solution provider to support regulatory compliance reporting for network, mobile, virtual and cloud assets.
Unify Regulatory Compliance with Security Intelligence
Use in conjunction with BeyondInsight’s reporting engine, which delivers analytics and trending across the threat lifecycle for multi-dimensional reports on assets, vulnerabilities, attacks and remediation.
Integrated with Retina Vulnerability Management
A centralized management, reporting and analytics console enables security, IT and compliance teams to easily manage Regulatory Compliance in concert with Retina CS Enterprise Vulnerability Management.
  • Automated compliance reporting: Validate vulnerability and configuration audits against compliance mandates including PCI, HIPAA, SOX, GLBA, NIST, FERC/NERC, MASS 201, ISO, COBiT, ITIL, and HITRUST.
  • Automated compliance mapping: Eliminate tedious manual data manipulation by mapping scans and audits to specific compliance objectives and mandated computer controls.
  • Centralized management: Identify, assess and manage risk and compliance across the enterprise via a centralized management, reporting and analytics console.
  • Continually updated reports: The BeyondTrust Research Team works to keep all Retina compliance reports updated with changes to regulatory controls and newly discovered vulnerabilities.
  • Daily compliance dashboards: Dashboards with full drilldown capabilities enable you to immediately address compliance violations and demonstrate ongoing compliance initiatives.

Datasheet

Configuration Compliance Module

Retina CS Add-On Modules

Download this overview document detailing the capabilities, highlights and competitive advantages of the three Retina CS add-on modules. By adding Retina Patch Management, Configuration Compliance and Regulatory Reporting modules to Retina CS, you not only gain a more holistic view of your enterprise security posture, but also significantly improve the efficiency of your vulnerability management program.

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

7/31/2013

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless... more

Controlling User Accounts and Regulatory Compliance

7/15/2013

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can... more

Prioritizing Vulnerability Assessment and Remediation Steps: A New Users Guide to Getting Started – Part 2

2/22/2011

The odd part about writing weekly blogs is the amount of discussions that start internally, with clients directly, and sometimes through straight blog comments. After writing “A New Users Guide to Getting Started” article, my team indicated several really good ideas for a Part II follow-up blog. Simply, just getting started with vulnerability management is not enough.... more

Prioritizing Vulnerability Assessment and Remediation Steps: A New Users Guide to Getting Started – Part 1

1/31/2011

New users to vulnerability assessment often ask the same question: “How do I get started”? While this may sound incredibly generic for a security engineer, many companies have never had a vulnerability management process in place and are trying to comprehend the problems of missing patches, remediation prioritization, and risk acceptance. As a basic recommendation,... more

Vulnerability Management in a Data Warehouse

11/16/2010

Have you ever been asked, “How long has that vulnerability been in our systems?” Have you ever wondered if your patch management process is keeping up with the number of new vulnerabilities being identified? Keep reading… Let’s start by considering the following chart to answer these questions: The green line represents the number of new... more

PCI DSS 2.0

9/16/2010

Yes its PCI time again. PCI DSS 2.0 has just completed final review and is expected to come out next month. As indicated in the summary of changes document , there are no major changes expected. Refinements to better align standards, provide clarifications, increase merchant flexibility, and additional guidance on specific technologies including virtualization and... more

Configuration Compliance and Regulatory Reporting

9/9/2010

In recent years there have been an increasing number of legislated regulatory mandates with which organizations must comply with to prove the confidentiality, integrity and availability of information stored in their systems and provided through external parties. After reading various whitepapers, websites and other articles that loosely use the terms “PCI, HIPAA, SOX, CIS, NIST,... more

See all Regulatory Reporting Module blog posts

VMware Plug-in for Retina

The industry's first and only vulnerability management solution directly integrated into vCenter.

DATASHEET VMWARE SURVEY Watch Video

Retina CS Enterprise Vulnerability Management

Delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Cofiguration Compliance Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Patch Management Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Regulatory Reporting Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina Network Security Scanner

Integrated network, web & virtual vulnerability assessment. Retina is the security industry’s most respected and industry-validated security scanner and serves as the engine for our vulnerability management solutions. There is no better option for securing your network from vulnerabilities.

Learn More Request a Free Trial

Retina Web Security Scanner

Rapidly and accurately scan large, complex web sites and web applications to tackle web-based vulnerabilities including cross-site scripting (XSS) and SQL injection.

Learn More Request a Free Trial

PowerBroker Event Vault

Automate and streamline the collection and management of standard Windows event log data and provide scalable and flexible centralized storage in the PowerBroker event database.

Learn More Request a Free Trial

PowerBroker Identity Services

Quickly and easily integrate your Linux and UNIX servers into your Active Directory infrastructure.

Learn More Request a Free Trial

PowerBroker Identity Services Open Edition

Available as a free and open source version of PowerBroker Identity Services, giving you the access and flexibility to tailor your Active Directory bridging project

Download Now

PowerBroker UNIX & Linux

Quickly and easily manage root access on UNIX and Linux servers, without ever disclosing the system password.

Learn More Request a Free Trial

PowerBroker for Windows

Implement least privilege for your Windows desktop environment, reducing attack surface and driving down costs.

Learn More Request a Free Trial

PowerBroker Auditor
for Active Directory

Track unauthorized changes to Active Directory and Group Policy configurations.

Learn More Request a Free Trial

PowerBroker Auditor
for Exchange

Tracks and reports all changes made to all Exchange Server configurations, groups, mailbox policies, information store changes, and permissions in a centralized audit log.

Learn More Request a Free Trial

PowerBroker Auditor
for File System

Enables tighter security and control over file system resources, including real-time tracking, interactive analysis, and flexible reporting on all key share, file, and folder changes.

Learn More Request a Free Trial

PowerBroker Auditor
for SQL Server

Monitor and review privileged user changes on SQL servers. Easily map your SQL activities with regulatory mandates such as GLBA, SOX, HIPAA, and PCI through consistent auditing and reporting.

Learn More Request a Free Trial

PowerBroker Privilege Explorer

Provides a centralized view of access and privileges, so you can be sure that users have access to the resources they need to do their jobs, and only those resources.

Learn More Request a Free Trial

PowerBroker Endpoint Protection Platform

Formerly known as "Blink", multi-layered security and attack prevention for windows desktops and servers.

Learn More Request a Free Trial

PowerBroker Recovery
for Active Directory

Advanced continuous data protection for Active Directory, providing unparalleled visibility and change control.

Learn More Request a Free Trial

PowerBroker Servers Enterprise

Combine the power of our UNIX/Linux root delegation and our AD bridging for an enterprise approach to server compliance

Learn More Request a Free Trial

PowerBroker Password Safe

Automate Password Management for Increased Security across your entire dynamic infrastructure.

Learn More Request a Free Trial

BeyondSaaS

A cloud-based, external vulnerability assessment solution that conducts fast, affordable security assessments of your public-facing network infrastructure and web applications.

Learn More Request a Free Trial

BeyondInsight

Merge privileged account management and vulnerability management solutions into a single, contextual lens through which to view and address user and asset risk.

Learn More Request a Free Trial

Retina Protection Agent

Close the security gap created by systems that can't be reached with remote vulnerability assessments alone with this lightweight agent for local vulnerability assessment, continuous zero-day vulnerability monitoring, and intrusion prevention.

Learn More

Configuration Compliance Module

This Retina CS add-on module defines and manages security policies to monitor compliance with industry and internally developed benchmarks such as Microsoft, NIST, USBCG, and DISA STIGs.

Learn More

Patch Management Module

This Retina CS add-on module seamlessly integrated, automated, agentless Windows patch management closes the loop on unpatched vulnerabilities.

Learn More

Regulatory Reporting Module

This Retina CS add-on module contains automated solutions to help navigate complex corporate policies, government regulations, and industry standards such as SOX, PCI, FISMA, and ISO.

Learn More

Vulnerability Management

Identifying, prioritizing, remediating, and mitigating
computer and network vulnerabilities.

Privileged Account Management

Managing user authorization to prevent internal data
breaches and meet compliance regulations.

Fusing
PAM & VM For
Stronger IT Security