Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

BeyondTrust Network Security Scanner v6.7.1: Building on Support for DevOps Use Cases

September 18, 2019

  • Blog
  • Archive

It is my pleasure to announce the 6.7.1 release of BeyondTrust’s Network Security Scanner. Our solution for scanning, prioritizing, and remediating vulnerabilities across the enterprise. Available as a standalone application, a host-based option, or as part of the BeyondTrust Enterprise Vulnerability Management solution, Network Security Scanner enables IT Security and Operations teams to efficiently identify IT exposures and prioritize remediation enterprise-wide.

BeyondTrust Network Security Scanner 6.7.1 builds on BeyondTrust’s support for DevOps use cases by adding new scanning and reporting capabilities for Docker containers. Keep reading for a highlight of new DevOps security features and enhancements!

Docker Container Scanning (New!)

DevOps teams must have the ability to quickly discover all Docker images and containers in their environments and report on their attributes. Network Security Scanner version 6.7.1 introduces new scanning capabilities against Docker containerization technology. With these new capabilities, organizations can quickly discover and accurately enumerate the attributes and vulnerabilities within Docker containers. This means that organizations can improve the control and visibility of Docker container usage, and mitigate potentially risky gaps in security, helping to support the further automation of DevOps processes.

The scanner can perform these subsets of enumerations and auditing compared to scanning a traditional host OS:

New! Access Report Scanning

Version 6.7.1 adds three new sections to the access report with expanded information of what was scanned and what wasn’t:

  • Unresponsive systems
  • Systems resolving to same IP address

This additional information provides context around scanning errors and enables effective troubleshooting.

Better Understand your Scan Schedules

Version 6.7.1 introduces a detailed view of scheduled scans, which allows users to right click on a scheduled job and see its details, including port group, audit group, scan options, and credential selected. This feature enables users to audit any previously scheduled jobs and better understand scan schedules.

Additional CIS Benchmark Certifications and STIG Benchmark

While previous versions of the Network Security Scanner have supported Security Content Automation Protocol (SCAP) benchmark assessments – along with CIS, DISA, Microsoft, and more – version 6.7.1 adds support for, and certification of, the following SCAP benchmarks released by the Central for Internet Security:

  • CIS Benchmark for CIS Oracle Database 11g R2 Benchmark, v2.2.0, Level 1- RDBMS
  • CIS Benchmark for CIS Oracle Database 11g R2 Benchmark, v2.2.0, Level 1- Linux Host OS
  • CIS Benchmark for CIS Oracle Database 11g R2 Benchmark, v2.2.0, Level 1- Windows Server Host
  • CIS Benchmark for CIS Oracle Database 12c Benchmark, v2.1.0, Level 1- RDBMS using Tradition
  • CIS Benchmark for CIS Oracle Database 12c Benchmark, v2.1.0, Level 1- Linux Host OS using T
  • CIS Benchmark for CIS Oracle Database 12c Benchmark, v2.1.0, Level 1- Windows Server Host T
  • CIS Benchmark for CIS Oracle Database 12c Benchmark, v2.1.0, Level 1- RDBMS using Unified A
  • CIS Benchmark for CIS Oracle Database 12c Benchmark, v2.1.0, Level 1- Linux Host OS using U
  • CIS Benchmark for CIS Oracle Database 12c Benchmark, v2.1.0, Level 1- Windows Server Host U
  • CIS Benchmark for CIS Oracle Database Server 9i10g Benchmark, v2.0.1, Level 1
  • CIS Benchmark for CIS Oracle Database Server 9i10g Benchmark, v2.0.1, Level 2
  • CIS Benchmark for CIS Oracle Database Server 11g Benchmark v1.0.1, Level 1- 11.x on any platform
  • CIS Benchmark for CIS Oracle Database Server 11g Benchmark v1.0.1, Level 1- 11.2 on any platform

Network Security Scanner 6.7.1 has also added support for the Security Technical Implementation Guide (STIG) for:

  • Red Hat Enterprise Linux 7 V2R2

For more on this exciting release, please check out the What’s New features document.

Additional Reading

BeyondTrust Enterprise Vulnerability Management Receives Five-star Review from SC Labs Expert Team (blog)

The Forrester Wave for Vulnerability Risk Management: BeyondTrust Named a Leader (analyst research)

BeyondTrust Vulnerability Management (solutions page)

Alejandro DaCosta

Product Manager

As Product Manager, Alex DaCosta is responsible for designing the company’s Vulnerability Management solutions. Alex joined BeyondTrust via the company’s acquisition of eEye Digital Security, where he held senior positions as Security Engineer in both pre and post sales operations. As a Senior Security Engineer, Alex was responsible for the success of demonstrating, architecting and implementing the Company’s enterprise solutions. Alex graduated from California State University, Long Beach with a Bachelors of Science Degree in Management Information Systems.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.