Beyondtrust

Retina CS for Mobile

Retina CS for Mobile is the industry’s most innovative approach to security, policy and health management for mobile devices. Retina CS provides comprehensive vulnerability management for mobile devices, smart phones, and tablets.

Mobile Device Vulnerability Management

Retina CS for Mobile is the first and only product to integrate mobile device assessment and vulnerability management for proactively discovering, prioritizing and fixing smartphone security weaknesses.

  • Reduce risk across BlackBerry, Android and ActiveSync-managed mobile devices
  • Access reports locally via the mobile app and alongside enterprise vulnerability data in the BeyondInsight console
  • Ease compliance via in-depth mobile vulnerability management audit trails
  • Reveal vulnerability profiles of mobile devices accessing your network
  • Streamline remediation through severity-based mobile threat prioritization
  • Audit mobile device hardware, applications and configurations
  • Rely on automatic vulnerability audit updates from BeyondSaaS
Retina CS Mobile

"Make mobile device assessment capabilities a core requirement for vulnerability assessment product selection."

Gartner 2014 Gartner,Four Ways to Close the Gap Between Enterprise Mobility and Vulnerability Management, Oliver Rochford and Dionisio Zumerle, 4.30.2014
Reduce overall IT security risk
by extending vulnerability management to your BlackBerry, Android and ActiveSync-managed mobile devices.
Reduce resource demands
by automating vulnerability assessment for mobile devices with in-depth scanning.
Simplify and improve IT security
by managing mobile devices and all other assets through a single, Web-based console.
Gain greater visibility
through vulnerability profiles of mobile devices accessing your network.

PROTECT MOBILE DEVICES

  • Individualized: User definable ability to create rules and take action based on Device Threat Score.
  • Assess any device: Vulnerability assessment of device applications to determine the threat score prior to installation.
  • Stay current: Operating System profiling to determine when a device is out of date and that there’s an update available.
  • Easily monitor assets: Application interface to view assets and applications by Risk, New Device, Dormant, Update Available, or even potential rogue connections.
  • Application control: Application permissions to critical device API’s and functions.

Datasheet

Retina CS Enterprise Vulnerability Management

Retina CS Enterprise Vulnerability Management

BeyondTrust Retina CS is the only vulnerability management solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-driven architecture works with users to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, mobile, cloud and virtual infrastructure.

One Half of All Android Users Are Vulnerable to Lastest Attack

9/24/2014

On September 1st, a new bug was quietly leaked that has far reaching ramifications for all Android users. The bug is in the open source Android Browser that is a part of the webkit, Android Open Source Platform (AOSP). The vulnerability allows malicious sites to inject JavaScript into other sites. The result is the ability... more

Identifying Android Phone Vulnerabilities that Threaten Your Corporate Network

5/20/2014

According to a recent McKinsey survey, more than 80% of employees now use personal smartphones for work-related purposes. Vulnerable smartphones can spread malware to business infrastructure via emailed attachments and to corporate networks through bots. Assessing mobile devices for vulnerabilities that could lead to infections and data manipulation is therefore a real concern for data... more

United States Health Department Updates HIPAA Guidelines

1/25/2013

It comes as no surprise to information technology security professionals that data leaks and privacy issues can occur at virtually any level of an organization including business associates, contractors, subs-contractors and outsourced firms like payroll and billing. With this, it is has been a long time coming that the U.S. Department of Health and Human... more

Most Versions of Android have SMiShing Vulnerability

11/5/2012

Researchers at NC State University have discovered a vulnerability that allows a zero-permission App to fake SMS messages and thus lead to potential SMS Phishing (or SMiShing).   By creating fake SMS messages from legitimate looking sources, a mal-ware app could fool a user into clicking on a link to a rogue site with the intension of... more

Privilege Identity Management – A Help Desk Perspective

10/12/2012

Help desk technicians within a company are the first line of defensive for a new project or system problem. Most of the time, they are informed and trained that users will be getting a new piece of security software. The solution, in this case, is called Privileged Identity Management (PIM) and is designed to manage authenticated permissions... more

How important is Android 4 to BYOD?

9/19/2012

Android 4 (so far dubbed Ice Cream Sandwich for 4.0.x or Jelly Bean for 4.1.x) is a significant upgrade to the user experience adding in many refinement and features.  For enterprises dealing with the Bring Your Own Device (BYOD) movement, some of these upgrades can be a double-edged sword. First let’s cover the positive —... more

Create custom audits for Android devices. Come on, all the cool kids are doing it.

7/18/2012

Have you ever wanted to root your Android device, so you could be like all the other cool kids on the block? If you did your research, you learned that it makes it easier for attackers to keep their malware on your device, if it were to be infected, through the use of a rootkit.... more

Off the beaten Google Market

7/10/2012

There have been a number of recent articles and blog posts around Android devices infected with various malware and malicious apps.  One recent nasty piece of malware found in many Chinese Android app stores is ‘Trojan!MMarketPay.A@Android’.   The interesting feature of this malware is that it can run up an unsuspecting user’s cell phone bill by... more

Retina Now Offers Custom Audits for Android Devices

5/16/2012

When a marketing buzz word sticks like BYOD (Bring Your Own Device), it is inevitable to see it everywhere in an effort to capitalize on the momentum; blogs, literature, SEO, social media, etc. In the past, we have seen great terms like “ecosystem”, “framework”, and my personal favorite “distributed computing”, rise and fall in marketing.... more

Retina CS Turns Patch Tuesday into Simply “Tuesday”

2/15/2012

Last week we announced Retina CS 3.0 – which extends our already market-leading vulnerability management capabilities for mobile devices – by adding in support for Android devices, as well as Microsoft Exchange ActiveSync – and sets a new bar for enterprise cloud security, allowing private cloud deployments based on Amazon Web Services (AWS) and VMware... more

See all Retina CS for Mobile blog posts

VMware Plug-in for Retina

The industry's first and only vulnerability management solution directly integrated into vCenter.

DATASHEET VMWARE SURVEY Watch Video

Retina CS Enterprise Vulnerability Management

Delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Cofiguration Compliance Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Patch Management Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Regulatory Reporting Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina Network Security Scanner

Integrated network, web & virtual vulnerability assessment. Retina is the security industry’s most respected and industry-validated security scanner and serves as the engine for our vulnerability management solutions. There is no better option for securing your network from vulnerabilities.

Learn More Request a Free Trial

Retina Web Security Scanner

Rapidly and accurately scan large, complex web sites and web applications to tackle web-based vulnerabilities including cross-site scripting (XSS) and SQL injection.

Learn More Request a Free Trial

PowerBroker Event Vault

Automate and streamline the collection and management of standard Windows event log data and provide scalable and flexible centralized storage in the PowerBroker event database.

Learn More Request a Free Trial

PowerBroker Identity Services

Quickly and easily integrate your Linux and UNIX servers into your Active Directory infrastructure.

Learn More Request a Free Trial

PowerBroker Identity Services Open Edition

Available as a free and open source version of PowerBroker Identity Services, giving you the access and flexibility to tailor your Active Directory bridging project

Download Now

PowerBroker UNIX & Linux

Quickly and easily manage root access on UNIX and Linux servers, without ever disclosing the system password.

Learn More Request a Free Trial

PowerBroker for Windows

Implement least privilege for your Windows desktop environment, reducing attack surface and driving down costs.

Learn More Request a Free Trial

PowerBroker Auditor
for Active Directory

Track unauthorized changes to Active Directory and Group Policy configurations.

Learn More Request a Free Trial

PowerBroker Auditor
for Exchange

Tracks and reports all changes made to all Exchange Server configurations, groups, mailbox policies, information store changes, and permissions in a centralized audit log.

Learn More Request a Free Trial

PowerBroker Auditor
for File System

Enables tighter security and control over file system resources, including real-time tracking, interactive analysis, and flexible reporting on all key share, file, and folder changes.

Learn More Request a Free Trial

PowerBroker Auditor
for SQL Server

Monitor and review privileged user changes on SQL servers. Easily map your SQL activities with regulatory mandates such as GLBA, SOX, HIPAA, and PCI through consistent auditing and reporting.

Learn More Request a Free Trial

PowerBroker Privilege Explorer

Provides a centralized view of access and privileges, so you can be sure that users have access to the resources they need to do their jobs, and only those resources.

Learn More Request a Free Trial

PowerBroker Endpoint Protection Platform

Formerly known as "Blink", multi-layered security and attack prevention for windows desktops and servers.

Learn More Request a Free Trial

PowerBroker Recovery
for Active Directory

Advanced continuous data protection for Active Directory, providing unparalleled visibility and change control.

Learn More Request a Free Trial

PowerBroker Servers Enterprise

Combine the power of our UNIX/Linux root delegation and our AD bridging for an enterprise approach to server compliance

Learn More Request a Free Trial

PowerBroker Password Safe

Automate Password Management for Increased Security across your entire dynamic infrastructure.

Learn More Request a Free Trial

BeyondSaaS

A cloud-based, external vulnerability assessment solution that conducts fast, affordable security assessments of your public-facing network infrastructure and web applications.

Learn More Request a Free Trial

BeyondInsight

Merge privileged account management and vulnerability management solutions into a single, contextual lens through which to view and address user and asset risk.

Learn More Request a Free Trial

Retina Protection Agent

Close the security gap created by systems that can't be reached with remote vulnerability assessments alone with this lightweight agent for local vulnerability assessment, continuous zero-day vulnerability monitoring, and intrusion prevention.

Learn More

Configuration Compliance Module

This Retina CS add-on module defines and manages security policies to monitor compliance with industry and internally developed benchmarks such as Microsoft, NIST, USBCG, and DISA STIGs.

Learn More

Patch Management Module

This Retina CS add-on module seamlessly integrated, automated, agentless Windows patch management closes the loop on unpatched vulnerabilities.

Learn More

Regulatory Reporting Module

This Retina CS add-on module contains automated solutions to help navigate complex corporate policies, government regulations, and industry standards such as SOX, PCI, FISMA, and ISO.

Learn More

Vulnerability Management

Identifying, prioritizing, remediating, and mitigating
computer and network vulnerabilities.

Privileged Account Management

Managing user authorization to prevent internal data
breaches and meet compliance regulations.

Fusing
PAM & VM For
Stronger IT Security