Beyondtrust

Retina Protection Agent

Local vulnerability assessment and zero-day protection for your transient computing systems, and for those which require
added levels of protection from today’s complex threats. Retina Protection Agent is included with
the Retina CS Enterprise Vulnerability Management solution.

Stronger Networks Through Host Based Security

Remote vulnerability assessment will protect most systems, but what about those blocked by firewalls or segregated from the network? What about mobile and offline devices? These are potential gaps that could be exploited.

The Retina Protection Agent, included with Retina CS, closes the security gap created by systems that can't be reached with remote vulnerability assessments alone by providing a lightweight agent for local vulnerability assessment, continuous zero-day vulnerability monitoring, and intrusion prevention. Get complete risk discovery even for systems that are offline or disconnected from the network or 'exception' systems that can’t be changed due to external regulations. And, with RPA, you get an additional layer of protection with continuous zero-day vulnerability monitoring and intrusion prevention.

Retina Protection Agent Screenshot
CA Dept. of Transportation

“Retina significantly improved network security, facilitates security compliance, and continues to be an important solution in the enterprise. ”

Martin Maxwell
Network Management Team, CA Dept. of Transportation
Local Vulnerability Assessment
Provides local vulnerability assessment capabilities to close the gap created by systems that can't be reached with a remote vulnerability assessment alone.
Zero-Day Protection and Intrusion Prevention
Provides zero-day protection where a vendor has not yet created signatures or patches to protect against vulnerabilities in their operating system or application.
Storage Protection
Prevents data leakage by regulating usage of USB and Firewire storage devices, helping demonstrate institutional control for highly-regulated organizations.
Centralized Visibility
Provides full visibility into both remote and local vulnerabilities through the Retina CS Management Console and the integrated Retina Insight Threat Intelligence Module.
  • Locally secure: Increased security through comprehensive local vulnerability scanning
  • Solid foundation: Based upon the industry’s most respected vulnerability scanning technology, Retina Network Security Scanner.
  • Simple migration: Faster mitigation with risk-level vulnerability prioritization with Retina CS.
  • Efficient: Optimized network performance through non-intrusive scanning.
  • Virtually secure: Reduce risk and close security gaps with vulnerability assessment for virtual applications.

Datasheet

Retina Protection Agent

Retina Protection Agent

Download this overview document containing capabilities, highlights and competitive advantages of Retina Protection Agent. Retina Protection Agent is a lightweight agent that augments Retina's remote vulnerability assessment with local vulnerability assessment capabilities. This simple tool eases the burden of meeting even the most stringent regulatory compliance, reduces security risks, and improves overall security across your environment.

Stopping the Skeleton Key Trojan

6/29/2015

Earlier this year Dell’s SecureWorks published an analysis of a malware they named “Skeleton Key”. This malware bypasses authentication for Active Directory users who have single-factor (password only) authentication. The “Skeleton Key” attack as documented by the SecureWorks CTU relies on several critical parts. more

On Demand Webinar: 10 Steps to Building an Effective Vulnerability Management Program

6/26/2015

In this on demand webinar, Cybersecurity Expert, Derek A.Smith will take you through his 10 steps for a successful vulnerability management program and how to get started now. more

Privileged Account Management – Another AH-HA in Cyber Security

6/25/2015

I strongly believe that the Top 4 mitigation strategies don't just simply apply to Australian organizations, it should be a global realization, a worldwide "ah ha!" for those still not quite understanding the importance here. Here's a refresher (or intro) on the Top 4 mitigation strategies. Read on... more

PowerBroker Management Suite 4.0: New Web Console and Deeper Auditing, including for NetApp Filers

6/22/2015

BeyondTrust has released version 4.0 of PowerBroker Management Suite, our solution for centralized real-time change auditing for Active Directory, File Servers, Exchange, and SQL, and recovery of Active Directory objects or attributes. This new release features some exciting enhancements – especially a new web console, deeper GPO auditing, and the addition of NetApp auditing. more

On Demand Webinar: Secure Local Window Admins with LAPS

6/19/2015

Windows & IT Security Expert, Russell Smith shows you how to configure Microsoft’s free Local Administrator Password Solution (LAPS) tool to secure local administrator accounts. Organizations often use the same password for local administrator accounts across all devices, leaving them vulnerable to Pass-the-Hash (PtH) attacks, which can result in sensitive domain credentials being exposed. LAPS automates regular changes of local administrator passwords, and securely stores passwords in Active Directory (AD). more

Are you a Data Privacy Hypocrite?

6/18/2015

As technology users, we choose to share what we share with the world. However, do you know that there is information being collected on some devices that you might not even know about? Unless you read all the terms of service, you likely don't know. more

Vulnerability Overload: Threat Analytics Can Help

6/11/2015

This blog post is republished with the permission of Network Computing. The increasing range of security information sources can be overwhelming. Brian Chappell, Director of Technical Services for BeyondTrust suggests that analytics may offer assistance. more

On Demand Webinar: Techniques for Extracting Juicy Information (like Passwords!)

6/10/2015

Paula Januszkiewicz explains and demos the techniques for memory acquisition, secrets to obtaining the juicy data, and how to find someone's memory dump! more

June 2015 Patch Tuesday

6/9/2015

This month's Patch Tuesday is a bit on the lighter side with only 8 bulletins. In total, 45 distinct vulnerabilities are addressed with over half belonging to Internet Explorer. At the time of release, Microsoft seemed to skip the MS15-058 bulletin, so we'll be sure to keep an eye out for it. more

BeyondTrust Acknowledged as a Representative Vendor in Gartner’s Market Guide for Privileged Access Management

6/9/2015

Gartner PAM market report 2015: BeyondTrust is among the leaders in the privileged access management market as one of three vendors to offer complete integrated solutions in the four product categories which define the PAM market. more

See all Retina Protection Agent blog posts

VMware Plug-in for Retina

The industry's first and only vulnerability management solution directly integrated into vCenter.

DATASHEET VMWARE SURVEY Watch Video

Retina CS Enterprise Vulnerability Management

Delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Cofiguration Compliance Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More

Retina CS Enterprise Vulnerability Management

The Patch Management Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More

Retina CS Enterprise Vulnerability Management

The Regulatory Reporting Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More

Retina Network Security Scanner

Integrated network, web & virtual vulnerability assessment. Retina is the security industry’s most respected and industry-validated security scanner and serves as the engine for our vulnerability management solutions. There is no better option for securing your network from vulnerabilities.

Learn More

Retina Web Security Scanner

Rapidly and accurately scan large, complex web sites and web applications to tackle web-based vulnerabilities including cross-site scripting (XSS) and SQL injection.

Learn More

PowerBroker Event Vault

Automate and streamline the collection and management of standard Windows event log data and provide scalable and flexible centralized storage in the PowerBroker event database.

Learn More

PowerBroker Identity Services

Quickly and easily integrate your Unix and Linux servers into your Active Directory infrastructure.

Learn More

PowerBroker Identity Services Open Edition

Available as a free and open source version of PowerBroker Identity Services, giving you the access and flexibility to tailor your Active Directory bridging project

Download Now

PowerBroker for Unix & Linux

Quickly and easily manage root access on Unix and Linux servers, without ever disclosing the system password.

Learn More Request a Free Trial

PowerBroker for Windows

Implement least privilege for your Windows desktop environment, reducing attack surface and driving down costs.

Learn More Request a Free Trial

PowerBroker Auditor
for Active Directory

Track unauthorized changes to Active Directory and Group Policy configurations.

Learn More Request a Free Trial

PowerBroker Auditor
for Exchange

Tracks and reports all changes made to all Exchange Server configurations, groups, mailbox policies, information store changes, and permissions in a centralized audit log.

Learn More Request a Free Trial

PowerBroker Auditor
for File System

Enables tighter security and control over file system resources, including real-time tracking, interactive analysis, and flexible reporting on all key share, file, and folder changes.

Learn More Request a Free Trial

PowerBroker Auditor
for SQL Server

Monitor and review privileged user changes on SQL servers. Easily map your SQL activities with regulatory mandates such as GLBA, SOX, HIPAA, and PCI through consistent auditing and reporting.

Learn More Request a Free Trial

PowerBroker Privilege Explorer

Provides a centralized view of access and privileges, so you can be sure that users have access to the resources they need to do their jobs, and only those resources.

Learn More Request a Free Trial

PowerBroker Endpoint Protection Platform

Formerly known as "Blink", multi-layered security and attack prevention for windows desktops and servers.

Learn More Request a Free Trial

PowerBroker Recovery
for Active Directory

Advanced continuous data protection for Active Directory, providing unparalleled visibility and change control.

Learn More Request a Free Trial

PowerBroker Servers Enterprise

Combine the power of our Unix/Linux root delegation and our AD bridging for an enterprise approach to server compliance

Learn More Request a Free Trial

PowerBroker Password Safe

Automate Password Management for Increased Security across your entire dynamic infrastructure.

Learn More Request a Free Trial

BeyondSaaS

A cloud-based, external vulnerability assessment solution that conducts fast, affordable security assessments of your public-facing network infrastructure and web applications.

Learn More Request a Free Trial

BeyondInsight

Merge privileged account management and vulnerability management solutions into a single, contextual lens through which to view and address user and asset risk.

Learn More Request a Free Trial

Retina Protection Agent

Close the security gap created by systems that can't be reached with remote vulnerability assessments alone with this lightweight agent for local vulnerability assessment, continuous zero-day vulnerability monitoring, and intrusion prevention.

Learn More

Configuration Compliance Module

This Retina CS add-on module defines and manages security policies to monitor compliance with industry and internally developed benchmarks such as Microsoft, NIST, USBCG, and DISA STIGs.

Learn More

Patch Management Module

This Retina CS add-on module seamlessly integrated, automated, agentless Windows patch management closes the loop on unpatched vulnerabilities.

Learn More

Regulatory Reporting Module

This Retina CS add-on module contains automated solutions to help navigate complex corporate policies, government regulations, and industry standards such as SOX, PCI, FISMA, and ISO.

Learn More

Vulnerability Management

Identifying, prioritizing, remediating, and mitigating
computer and network vulnerabilities.

Privileged Account Management

Managing user authorization to prevent internal data
breaches and meet compliance regulations.

Fusing
PAM & VM For
Stronger IT Security