NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

CCOs: Let Threat Analyzer do the heavy lifting

June 20, 2012

  • Blog
  • Archive
In a recent article on Dark Reading, The Compliance Officer's Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance. I’m sure there are many debates that can go back and forth of the efficacy of either case depending on industry, regulatory requirements, the degree of a breach, etc. but in MANY cases the former is far more costly than the latter when you think of legal risks from class action lawsuits (incurred following a breach), cost of notification to customers, brand image, potential stock price fallout not to mention the cost of consultants and technology to remediate the problem. Retina Insight provides organizations with an in-depth enterprise view so compliance teams can make informed decisions on where their highest risk areas are located, as provided in our Threat Analyzer Asset Risk Heat Map. In the example below we see across the organization that the Cricklewood data center presents the highest risk (based on Total Asset Score) within the organization and is a natural starting point for corporate risk reduction. Risk Profilers allow compliance and operational teams to ability to quickly identify where the most critical vulnerabilities within the enterprise lie using both built-in and customizeable profiles. Here (above) we see a Risk Profile that filters all vulnerabilities with malware toolkits across the enterprise. Customization allows us to build on the profile and narrow down to a specific platform (database for example). This allows operational efficiency as the database team understands which areas of their network needs focus. Once identified compliance teams can steer operational teams towards remediation efforts that will yield the highest rate of risk reduction during a normal remediation cycle. Operations teams can determine an acceptable number of vulnerabilities they can remediate during a cycle and the Threat Analyzer can then recommend which vulnerabilities will yield the highest asset risk reduction. In this case the operations team is looking for the top 20 recommendations across the assets in the Cricklewood datacenter. Threat Analyzer looks across various mitigation types and determines which ones will reduce the risk profile most effectively. Here we see a total asset score reduction close to 10% and a total vulnerability count reduction of close to 20%. Compliance officers can immediately understand how to effectively reduce corporate risk. Diving deeper in the Capacity worksheet allows us to further understand the amount of resources needed to appropriately plan for remediation during a customer’s normal remediation cycle. Allowing for customization based on platform, available resources and the number of tasks a resource can reliably accomplish during the remediation cycle. Operational teams can now best plan where to focus their efforts. Retina’s Threat Analyzers bridges the gap between compliance and operations which provides CCOs visibility into the current risk landscape as well as what cost and efforts are needed to reduce risk in a timely manner which is unique to the Retina solution. Try Retina for Free Now.
Photograph of Scott Lang

Scott Lang, Sr. Director, Product Marketing at BeyondTrust

Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Microsoft Vulnerabilities Report 2022

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Privileged Access Management: PAM Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.