blog-the-retina-difference-3Editors note: This is the third in a four-part series of blogs summarizing why customers choose Retina to solve their vulnerability management challenges, stemming from the study of our customer base that BeyondTrust commissioned in early 2015. The previous blogs focused on reporting visibility and remediation and enterprise scalability. Watch for more in this series. Today’s IT network infrastructures are becoming more complex with a mix of in-house physical and virtual systems, cloud-based environments, BYOD and a honeypot of networks derived from mergers and acquisitions. Often times we don’t know what is actually plugged into our own networks and what risk that may pose. Enterprises with complex environments require solutions with multi-tier architecture, which deliver optimal scalability and maximum control over common security capabilities. To put it simply — enterprise infrastructures grow more like weed patches than manicured gardens. And IT security administrators need tools to help them manage their ever-growing infrastructure. To keep pace with the growth of the enterprise, IT security administrators must conduct vulnerability scans across an array of environments, all while promising maximum coverage and minimal disruption to the business. If the enterprise is a weed garden that’s quickly spreading across multiple locations, behind different firewalls, IDS/IPS and VLANs, how do security administrators retain control? In a survey of more than 100 customers conducted in partnership with TechValidate, those customers indicated that BeyondTrust’s enterprise scalability was a competitive differentiator versus other options in the vulnerability management market. This differentiator was also important to Standard Bank of South Africa, one of South Africa’s largest financial institutions, who was looking to:
  • Gain visibility into exposures across multiple layers of infrastructurethe retina difference
  • Profile previously unknown assets on the network
  • Report risk to IT administrators, management and auditors
  • Identify and prioritize remediation tactics
In the words of Andrew De Lange, Engineer, “The drive for more efficient patch management has increased tenfold since our implementation. We are the trusted source the company looks to for all kinds of data collected in our scans, not just vulnerabilities.” Retina CS, with its agentless and optional agent technology, is designed to discover all assets within an enterprise regardless of network complexity or device type. Next, assessing these devices for vulnerabilities is easily accomplished with Retina CS result driven architecture. You simply start with the type of output you will like and let the solution perform the right assessment for you. All steps within the vulnerability management lifecycle, including discovery and assessment, can be fully automated. This allows Retina CS to actively discover, alert and assess your enterprise with little to no user interaction. To learn more about how Retina CS compares to other vulnerability management solutions, check out the Retina CS product review conducted by analyst Frost & Sullivan.