Beyondtrust

Retina CS for Mobile

Retina CS for Mobile is the industry’s most innovative approach to security, policy and health management for mobile devices. Retina CS provides comprehensive vulnerability management for mobile devices, smart phones, and tablets.

Mobile Device Vulnerability Management

One of the the biggest challenges facing enterprise security teams was the inability to centrally discover, assess and manage the risk their mobile assets brought into their network, as they do for traditional assets like desktops, servers and laptops. Retina CS was the industry’s first solution that set out to solve that problem.

Retina CS is the first and only product to integrate mobile device assessment and vulnerability management for complete visibility and context on all vulnerabilities – so that your team can discover, prioritize, and fix the weaknesses in your mobile infrastructure quickly.

Retina CS Mobile
SC MAGAZINE 2014
“Using this console, security professionals and system administrators alike can easily find and analyze weaknesses throughout the entire enterprise infrastructure” SC MAGAZINE 2014

Mobile Device Security Lifecycle

Endpoint Security Lifecycle - Discover

Key Benefits

  • Accurate baseline for all assessment activities
  • Creation of mobile-specific Smart Groups for regular assessments, risk prioritization
  • Introduction of mobile device usage data for trending and analysis

Key BeyondTrust Capabilities

  • Complete inventory of mobile assets
  • Cataloging of OS, device, application, encryption status, owner information, etc.
  • Discovery of applications and the underlying permissions on those applications.
Endpoint Security Lifecycle - Assessment

Key Benefits

  • Actionable data identifies proper remediation actions, accelerating risk reduction
  • Risk scoring streamlines the classification of most at-risk devices
  • Assessment data can be archived and used for trending analysis

Key BeyondTrust Capabilities

  • Identification of vulnerabilities, misconfigurations, policy violations
  • Threat assessments on application-specific permissions
  • Assignment of a relative risk score for each device
  • Allows for custom audits/assessments
Enterprise Security Lifecycle - Comply

Key Benefits

  • "Operational GPS" directs IT to which actions provide the most risk-reduction benefits
  • Automated reporting on compliance efforts creates consistency and accountability

Key BeyondTrust Capabilities

  • Leveraging discovery and assessment data drive the operational changes in device policy
  • Centrally manage the configuration of items such as VPN, email usage, WebDAV, password policies, encryption, device locking, etc.
Endpoint Security Lifecycle - Optimize

Key Benefits

  • Mobile Risk Score provides an immediate ‘state of the union’ with regards to your mobile deployment
  • Easily tune BYOD, compliance or device requirements based on historical trending and analytics
  • Ease the on-boarding of new devices

Key BeyondTrust Capabilities

  • Integrated reporting and data analytics extends configuration compliance reporting
  • Threat modeling demonstrates the positive impact of policy changes (application removal, device locking, etc.)

FEATURES & BENEFITS

Reduce overall
IT security risk

by extending vulnerability management to your BlackBerry, Android and ActiveSync-managed mobile devices.

Reduce resource
demands

by automating vulnerability assessment for mobile devices with in-depth scanning.

Simplify and improve
IT security

by managing mobile devices and all other assets through a single, Web-based console.

Gain greater
visibility

through vulnerability profiles of mobile devices accessing your network.

Why BeyondTrust for Mobile Device Security

  • User definable ability to create rules and take action based on Device Threat Score
  • Vulnerability assessment of device applications to determine the threat score prior to installation
  • Operating System profiling to determine when a device is out of date and that there’s an update available
  • Application interface to view assets and applications by Risk, New Device, Dormant, Update Available, or even potential rogue connections
  • Application permissions to critical device API’s and functions
Retina CS for Mobile

Related Products

To learn more about our products for securing your virtual environments, select a product area below:

PowerBroker for Windows

Implement least privilege for your Windows desktop environment, reducing attack surface and driving down costs

PowerBroker Endpoint Protection

Formerly known as "Blink", multi-layered security and attack prevention for windows desktops and servers

PRODUCT DEMOS

  • Retina CS Mobile Device Assessment
    Retina CS
    Mobile Device Assessment

SCREENSHOTS