Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Too Many Regulatory Standards, Only One Tool Please

November 12, 2010

  • Blog
  • Archive
About every two years, I indulge myself with a new laptop. This time, I waited almost three years and will be retiring my old Dell XPS M1330 for a new Alienware M15x. I wanted raw horsepower for virtual machines in a laptop format and was not as concerned about battery life (since I carry an iPad for notes and email) or weight since I travel with a Targus TSB700 rolling backpack. I started collecting all of the software I needed to rebuild my system and realized I have a quite a few solutions to install in order to meet my day-to-day work requirements. This includes everything from Microsoft Office 2010 and Nero 10, to all the solutions eEye offers and of course, gigabyte upon gigabyte of virtual machine sessions. This made me think about how many of these solutions are now bundles and suites compared to the standalone products of years ago. MS Office 2010 contains all the programs I need from word processing to presentations, and Nero, all the tools I could ever need to create promotional DVDs, website videos, and even system backups. As these tools add more features, they cover additional areas required by me for daily work in lieu of even more and more point solutions. As solutions add more features, consider this example: a recent presales Request For Proposal (RFP) queried all the different regulatory standards and assessment standards we are able to support. These include out-of-the-box assessments, dedicated reports, flexible dashboards and best practices to help automate these processes. After a few minutes of digging around, I compiled this short list (not really short):
  • SCAP – Security Content Automation Protocol
  • CVE – Common Vulnerabilities and Exposures
  • CVSS – Common Vulnerability Scoring System
  • OVAL – Open Vulnerability and Assessment Language
  • XCCDF – The eXtensible Configuration Checklist Description Format
  • CCE – Common Configuration Enumeration
  • CPE – Common Platform Enumeration
  • STIG – Security Technical Implementation Guides
  • IAVA – Information Assurance Vulnerability Alert
  • FDCC – Federal Desktop Core Configuration
  • USGCB – The United States Government Configuration Baseline
  • CIS – The Center for Internet Security
  • PCI – Payment Card Industry Security Standards Council
  • HIPAA – The Health Insurance Portability and Accountability Act
  • GLBA – The Gramm-Leach Bliley Act
  • SOX – Sarbanes-Oxley Act
  • ITIL –Information Technology Infrastructure Library
  • COBiT – Common Objectives for Information and related Technology
  • FERC-NERC – Federal Energy Regulatory Commission
  • ISO – International Organization for Standardization
  • MASS 201 – Commonwealth of Massachusetts 201
  • NIST 800-53 – Recommended Security Controls for Federal Information Systems and Organizations
  • BugTraq - Bugtraq
I realized after creating the list, that while many vendors offer point solutions for some of these standards and regulations, eEye offers all of these in one solution: Retina. For the same reason we use MS Office as a comprehensive tool for daily operations, Retina provides a single comprehensive tool for unified vulnerability management and meets the most common regulatory standards facing businesses today. Now, if I had to go back and find point solutions for each, my cost would skyrocket and my learning curve would ramp up exponentially. I have seen companies use one solution for PCI and another for Configuration Compliance and Benchmarks (FDCC, CIS, USGCB, etc.). And many use a third solution for internal vulnerability assessment (rarely the same vendor due to cost), a fourth for patch management, and maybe even a fifth for any government requirements like STIGS and IAVAs or special projects. There are many standards out there and so many different requirements, it is no wonder that security costs are rising and users are required to work harder to meet these regulations. To address this problem, eEye can provide a solution to these initiatives in a single tool and lower the cost of ownership. Wouldn’t you benefit from a single tool that can solve these requirements verses the alternatives?

Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

A Zero Trust Approach to Secure Access

Webcasts

Rising CISOs: Ransomware, Cyber Extortion, Cloud Compromise, oh my!

Whitepapers

A Zero Trust Approach to Windows & Mac Endpoint Security

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.