CLOUD-BASED VULNERABILITY ASSESSMENT

BeyondSaaS

BeyondSaaS is an easy, affordable solution for network perimeter vulnerability scanning and web application security assessment.

Gain an Attacker’s-Eye View of Your IT Perimeter

BeyondSaaS is a cloud-based, external vulnerability assessment solution that gives you an attacker’s-eye view of your IT perimeter. The solution conducts fast, affordable security assessments of your public-facing network infrastructure and web applications, while delivering straightforward and accurate reports. As a result, you’re able to quickly identify perimeter vulnerabilities, clearly understand their potential impact, and decisively act to mitigate threats.

When used alongside an internal vulnerability management solution, such as BeyondTrust Retina Network Security Scanner or Retina CS, BeyondSaaS gives you a more holistic view of enterprise risk.

Easy and Efficient

Easy and Efficient

With nothing to install, you simply log into BeyondSaaS, specify a target IP range or web application, and BeyondSaaS handles the rest. A mobile-first HTML5 interface enables on-the-go management and reporting.

Secure

Secure

Access your account using Microsoft Live credentials with two-factor authentication. All data transmission is encrypted, and the solution is built on a Microsoft Azure multi-tenant architecture with extensive backend security measures.

Actionable

Actionable

BeyondSaaS delivers clear vulnerability and remediation reports, plus PCI DSS reports that assist with compliance initiatives. Historical trend reporting enables you to track vulnerability management progress over time.

Affordable

Affordable

Conduct network vulnerability scanning across unlimited IPs for one low annual subscription fee. Purchase web application assessments on an as-needed basis. Provide access to unlimited users for no additional charge.

NETWORK SCANNING

Assess all externally facing systems: Identify exposures in network devices, operating systems, applications, ports and services.

Cover your unique environment: Scan custom machine configurations, ports, and applications.

Build in-depth OS profiles: Profile target operating systems via Nmap and proprietary OS fingerprinting.

Get unbeatable scan performance: Perform Class C network scans in under 15 minutes on average.

Minimize false positives: Accurately identify vulnerabilities with a <1% false positive rate.

REPORTING AND COMPLIANCE

Gain actionable information: Get clear vulnerability reports with remediation action items.

Demonstrate progress: Present vulnerability and remediation trends over time.

Simplify compliance reporting: Generate reports for PCI, SOX, HIPAA, DISA-STIG, GLBA, FISMA and OWASP Top Ten.

WEB APPLICATION SCANNING

Simplify application assessments: Conduct automated vulnerability assessment and web crawling with no scripting required.

Identify OWASP Top Ten exposures: Detect vulnerabilities including SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, OS Command Injection and more.

Ensure strong passwords: Assess password strength via automated dictionary attacks.

Gain an attacker’s viewpoint: Conduct Black-box web application assessments.

SIMPLE AND SECURE

Ensure data security: Rely on encrypted data transmission & secure, two-factor authentication via Microsoft Live.

Save money: Get unlimited user accounts and scan unlimited IP addresses for one low price.

Automate for efficiency: Conduct automated, scheduled vulnerability assessments.

Speed deployment: Eliminate software, hardware and license management headaches.

Eliminate white-listing hassles: White-list just a few IPs (vs. thousands with other solutions).

Get continual support: Take advantage of optional 24 x 7 x 365 Platinum Support.