Retina Web Security Scanner

Rapidly and accurately scan large, complex web sites and web applications to tackle web-based vulnerabilities including cross-site scripting (XSS) and SQL injection.

Web Security, Vulnerability Assessment, and Policy Compliance

Hackers are increasingly targeting web applications. Gartner estimates that 70% of attacks against websites occur at the application layer. At the same time, many enterprises are relying more heavily on web applications to house critical business data, as well as confidential customer information such as credit card and social security numbers. With so much information and activity online, you need a comprehensive web application scanner that accurately assesses your exposure to attacks.

Powerful Security for Web Applications

Retina Web Security Scanner is a best-in-class web scanning solution that rapidly and accurately scans large, complex web sites and web applications to tackle web-based vulnerabilities. Retina Web Security Scanner identifies application vulnerabilities as well as site exposure risk, ranks threat priority, produces highly graphical, intuitive HTML reports, and indicates site security posture by vulnerabilities and threat level.

Retina Web Security Scanner

Retina Web Security Scanner reports enable you to quickly identify and
address vulnerabilities in custom, dynamic web applications.



  • Accurate, comprehensive web application scanning
  • Vulnerability prioritization by risk-level
  • Complete threat analysis
  • Group-specific reporting (e.g. server, developer, database)
  • Graphical, interactive site mapping
  • Results in .XML or database format
  • Privacy reporting
  • Remediation estimates by time and cost
  • Web services support
  • Easy, accurate scanning of websites and applications
  • Simpler, more efficient remediation
  • Automated assessment processes
  • Increased web security and protections
  • Scalable for SMBs and large enterprises
  • Fast, flexible deployment
  • Unparalleled service and support

Enterprise Security Lifecycle

Endpoint Security Lifecycle - Discover

Key BeyondTrust Capabilities

  • Accurate baseline for all assessment activities
  • Immediate and measurable catalog and inventory of all IT assets – physical, virtual, devices and applications
  • Identification of unapproved assets such as wireless access points

Key BeyondTrust Capabilities

  • Unique “Zero-gap discovery” across physical, virtual, cloud and mobile
  • Remote, Network and Local scanning options
  • Industry’s most accurate cataloging of OS, device, applications, services, ports, users, groups etc.
Endpoint Security Lifecycle - Assessment

Key Benefits

  • Actionable data identifies proper remediation actions, accelerating risk reduction
  • Clear, concise reporting streamlines the classification of most at-risk devices
  • Assessment data can be archived and used for trending analysis

Key BeyondTrust Capabilities

  • Identification of vulnerabilities, misconfigurations, policy violations
  • Support for assessments of all assets across operating systems, applications and configurations
  • Allows for custom audits/assessments for adherence to any unique company requirements
Enterprise Security Lifecycle - Comply

Key Benefits

  • “Operational GPS” directs IT to which actions provide the most risk-reduction benefits
  • Automated reporting on compliance efforts creates consistency and accountability
  • Enterprise policy management and reporting

Key BeyondTrust Capabilities

  • Comprehensive vulnerability assessment with additional contextual knowledge
  • Seamless integration with configuration assessment module, using a certified SCAP engine (60 built-in benchmarks)
  • Additional scanning and reporting modules for regulatory reporting; integrated patch management
Enterprise Security Lifecycle - Optimize

Key Benefits

  • Receive an immediate ‘state of the union' with regards to your IT landscape
  • Greater efficiency via enterprise-centric capabilities such as role based access, internal auditing, ticketing, and integration with existing infrastructure investments

Key BeyondTrust Capabilities

  • Implement Central Management, Reporting and Logging
  • Role based policy, alert and reporting management
  • Integration with PowerBroker privileged account management solutions

Related Products

Retina NetworkSecurity Scanner

The industry’s most mature and effective vulnerability scanning technology, identifies the vulnerabilities to protect an organization’s IT assets.

Retina CS Enterprise Vulnerability Management

Delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

RetinaProtection Agent

A lightweight agent for local vulnerability assessment, continuous zero-day vulnerability monitoring, and intrusion prevention.