End to End Management

Address every phase of the vulnerability management lifecycle – from assessment to remediation – eliminating the need for multiple, sometimes overlapping, solutions to address vulnerability management risks.

  • Vulnerability Assessment: Flag vulnerabilities, attacks, and malware by asset for a complete view of a device’s risk.
  • Asset Profiling: Gather information including IP, DNS, OS, MAC address, ports, services, software, processes, hardware, event logs and more.
  • Patch Management: Remediate vulnerabilities with onboard patch management for Microsoft WSUS and SCCM for Microsoft and third-party applications (optional).
  • Cloud Scanning: Discover and scan online and offline Amazon®, GoGrid®, IBM®, Rackspace® and VMware® environments.
  • VMware Verified: Scan virtual environments requiring PCI and HIPAA compliance.
  • User Risk Discovery: Map vulnerability management data to privileged account management data (from BeyondTrust PAM solutions) to reveal user-triggered risks.
  • Scheduling and Alerts: Schedule assessments and configure email alerts.

Zero Gap Coverage

Discover and assess any IT resource in the organization including network, web, mobile, cloud and virtual infrastructures, reducing risk by ensuring that no assets are left unprotected.

  • Comprehensive Discovery: Locate known and previously unknown assets across network (local and remote), web, mobile, cloud and virtual environments.
  • Automated Credentialed Scans: Automate the use of continuously rotating privileged credentials with Password Safe.
  • Scalable Scan Engines: Each scan engine can singlehandedly cover a Class-A network.
  • Scanner Pooling: Direct multiple scanners to collaboratively assess large environments.
  • Local and Remote Scanning: Cover segregated, firewalled and disparate infrastructure.
  • Retina Host Security Scanner: Very Fast and highly accurate host-based scanning of cloud, virtual and remote platforms.
  • Internet of Things Scanning: Identify at-risk IoT devices, such as IP cameras, DVRs, printers, routers, and more. Download free Retina IoT scanner.

Risk in Context

Make smart decisions and take the right actions to best secure the organization by providing a holistic view of enterprise-wide security, including risk from users, accounts and their privileges, and other security solutions such as SIEMs and firewalls.

  • Customizable Asset Risk: Weigh asset risks based on threat risk or exposure risk, and then apply a scale of 1-10 to prioritize remediation.
  • Asset Smart Groups: Group, assess, and report on assets by IP range, naming convention, operating system, domain, applications, business function, Active Directory and more.
  • Third-Party Integration: Share data with SIEM, GRC, NMS and help desk solutions.



Deep Reporting & Analytics

Deep analytics and reporting delivered in a single dashboard ensures that all teams have the information and views they need to effectively manage application and asset risk.

  • Intelligent Analytics: Run what-if scenarios and team capacity analyses to inform resource allocation decisions.
  • Interactive Results: Home in on data pertaining to a specific audience or goal.
  • 270+ Actionable Reports: Communicate with technical and non-technical audiences.
  • Compliance Reporting: Map vulnerability and configuration audits to COBIT, GLBA, HIPAA, HITRUST, ISO-27002, ITIL, MASS 201, NERC-FERC, NIST, PCI, SOX and more.
  • Advanced Threat Intelligence: Gauge severity based on asset scoring, BeyondTrust malware & exploit research, NSRL, exploit databases, CVSS v2 & v3, CWE and more.
  • Trending, Deltas, Threat Analyzers and Heat Maps: Share vulnerability management progress with executives, compliance auditors and others.
  • Configuration Benchmarking: Scan against benchmarks including DISA Gold Disk, SCAP, NIST, FDCC, USGCB, CIS and Microsoft®; customize images to match in-house policies; CIS Security Benchmark certified.
  • SLA Compliance Reports: Measure threat severity level against dynamic asset groupings.
  • Pivot Grid Ad-Hoc Reporting: Meet unique business requirements by creating customized reports using virtually any data collected by Retina.


Integrated Scanning

Retrieve credentials with the highest level of privileges through native integration with Password Safe, improving the efficiency of scanning, and making scanning much more thorough than with other solutions available in the market