CLOUD-BASED VULNERABILITY ASSESSMENT

BeyondSaaS

BeyondSaaS is an easy, affordable solution for network perimeter vulnerability scanning and web application security assessment.

Gain an Attacker’s View of Your IT Perimeter

From the cloud, BeyondSaaS™ gives you an attacker’s view of your IT perimeter vulnerabilities. BeyondSaaS conducts fast, affordable security assessments of your public-facing network infrastructure and web applications, while delivering straightforward and accurate reports. As a result, you’re able to quickly identify perimeter vulnerabilities, clearly understand their potential impact, and decisively act to mitigate threats.

Using BeyondSaaS together with an internal network vulnerability management solution, such as BeyondTrust Retina CS or Retina Network Security Scanner, gives you a complete picture of enterprise risk from both inside and outside the firewall.

Easy and Efficient

Easy and Efficient

With nothing to install, simply log into BeyondSaaS, specify a target IP range or web application, and BeyondSaaS handles the rest. A mobile HTML 5 interface lets you manage and communicate risk from virtually anywhere.

Secure

Secure

Access your account using Microsoft Live two-factor authentication and rely on Microsoft Azure’s multi-tenant architecture with its extensive backend security capabilities.

Actionable

Actionable

BeyondSaaS delivers clear vulnerability and remediation reports, including PCI DSS reports that assist with compliance audits. Historical trend reporting allows you to track your progress over time.

Affordable

Affordable

Conduct network vulnerability scanning across unlimited IPs for one low annual subscription fee. Purchase web application assessments on an as-needed basis and provide access to unlimited users at no additional charge.

NETWORK SCANNING

Audit all externally facing systems: Identify weaknesses in network devices, operating systems, applications, ports and services.

Cover your unique environment: Scan custom machine configurations, ports, and applications.

Build in-depth OS profiles: Profile target operating systems via Nmap and proprietary OS fingerprinting.

Get unbeatable scan performance: Perform Class C network scans in under 15 minutes on average.

Minimize false positives: Accurately identify vulnerabilities with a <1% false positive rate.

REPORTING AND COMPLIANCE

Gain actionable information: Get clear vulnerability reports that include action items for remediation.

Communicate risk: Share vulnerability trends and remediation progress.

Simplify compliance: Assess and report against PCI, SOX, HIPAA, DISA-STIG, GLBA, FISMA and OWASP Top Ten.

WEB APPLICATION SCANNING

Accurately crawl web pages: Crawl modern technologies such as AJAX, SOAP/WDSL, SOAP/ WCF, REST/WADL, XML, JSON, Google Web Toolkit (GWT) and CRUD operations.

Automatically scan off-the-shelf or custom-built web applications: Detect SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) and over 500 other web vulnerabilities.

Easily access protected areas: Automatically crawl and scan complex password protected zones including multi-step or Single Sign-On (SSO), with a built-in login recorder.

Discover WordPress vulnerabilities: Cover more than 1,200 known vulnerabilities in WordPress core, themes and plugins.

Ensure fast reliable scans: Handle hundreds of thousands of pages without interruption, with our multi-threaded architecture.

SIMPLE AND SECURE

Ensure data security: Rely on encrypted data transmission & secure, two-factor authentication via Microsoft Live.

Save money: Get unlimited user accounts and scan unlimited IP addresses for one low price.

Automate for efficiency: Conduct automated, scheduled vulnerability assessments.

Speed deployment: Eliminate software and hardware installation and configuration.

Eliminate white-listing hassles: White-list just a few IPs (vs. thousands with other solutions).

Get support when you need it: Take advantage of optional 24 x 7 x 365 Platinum Support.