CLOUD-BASED VULNERABILITY ASSESSMENT
BeyondSaaS is an easy solution for internal and network perimeter vulnerability scanning and web application security assessments.
Gain an Attacker’s View of Your IT Perimeter
From the cloud, BeyondSaaS™ gives you an attacker’s view of your IT perimeter vulnerabilities. BeyondSaaS conducts fast, affordable security assessments of your public-facing network infrastructure and web applications, while delivering straightforward and accurate reports. As a result, you’re able to quickly identify perimeter vulnerabilities, clearly understand their potential impact, and decisively act to mitigate threats.
Using the new internal scanning capabilities available in BeyondSaaS, you will have a complete picture of enterprise risk from both inside and outside the firewall.
Easy and Efficient
With nothing to install, simply log into BeyondSaaS, specify a target IP range or web application, and BeyondSaaS handles the rest. A mobile HTML 5 interface lets you manage and communicate risk from virtually anywhere.
Access your account using Microsoft Live two-factor authentication and rely on Microsoft Azure’s multi-tenant architecture with its extensive backend security capabilities.
BeyondSaaS delivers clear vulnerability and remediation reports, including PCI DSS reports that assist with compliance audits. Historical trend reporting allows you to track your progress over time.
More Coverage, Less Cost
Conduct network vulnerability scanning across unlimited IPs for one low annual subscription fee. Purchase web application assessments on an as-needed basis and provide access to unlimited users at no additional charge.
Internet of Things (IoT) Vulnerability Scanning
Retina’s built-in IoT audits enable organizations to Identify the make and model of vulnerable IoT devices, and safely check them for default and hard-coded credentials used with Telnet, SSH, or Basic HTTP Authentication.
Audit all externally facing systems: Identify weaknesses in network devices, operating systems, applications, IoT devices, ports and services.
Perform internal scans: Deploy one or multiple scanners inside the perimeter, and centrally manage them from the cloud, offers complete coverage for both internal and external assessments as well as comprehensive external Web Application scanning.
Cover your unique environment: Scan custom machine configurations, ports, and applications.
Build in-depth OS profiles: Profile target operating systems via Nmap and proprietary OS fingerprinting.
Get unbeatable scan performance: Perform Class C network scans in under 15 minutes on average.
Minimize false positives: Accurately identify vulnerabilities with a <1% false positive rate.
REPORTING AND COMPLIANCE
Gain actionable information: Get clear vulnerability reports that include action items for remediation.
Communicate risk: Share vulnerability trends and remediation progress.
Simplify compliance: Assess and report against PCI, SOX, HIPAA, DISA-STIG, GLBA, FISMA and OWASP Top Ten.
WEB APPLICATION SCANNING
Accurately crawl web pages: Crawl modern technologies such as AJAX, SOAP/WDSL, SOAP/ WCF, REST/WADL, XML, JSON, Google Web Toolkit (GWT) and CRUD operations.
Automatically scan off-the-shelf or custom-built web applications: Detect SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) and over 500 other web vulnerabilities.
Easily access protected areas: Automatically crawl and scan complex password protected zones including multi-step or Single Sign-On (SSO), with a built-in login recorder.
Discover WordPress vulnerabilities: Cover more than 1,200 known vulnerabilities in WordPress core, themes and plugins.
Ensure fast reliable scans: Handle hundreds of thousands of pages without interruption, with our multi-threaded architecture.
SIMPLE AND SECURE
Ensure data security: Rely on encrypted data transmission & secure, two-factor authentication via Microsoft Live.
Save money: Get unlimited user accounts and scan unlimited IP addresses for one low price.
Automate for efficiency: Conduct automated, scheduled vulnerability assessments.
Speed deployment: Eliminate software and hardware installation and configuration.
Eliminate white-listing hassles: White-list just a few IPs (vs. thousands with other solutions).
Get support when you need it: Take advantage of optional 24 x 7 x 365 Platinum Support.