MSSP and mobile support added by BeyondTrust

Powered by SC Magazine
 

Includes multi-tenant support.

BeyondTrust has announced the launch of multi-tenant support for MSSPs and a context-aware management solution for mobile devices.

BeyondTrust said that Retina CS 3.5 includes enhanced protection agent deployment and policy management for multi-tenant support for mobile connectors and Retina Insight.

According to the company, Retina CS is a vulnerability management solution that integrates private cloud security into existing vulnerability management practices, providing organisations complete visibility and management of all vulnerabilities.

The new version, Retina CS 3.5, allows users to visualise the before and after effects of remediation recommendations, as well as the ability to view resources within the organisation, such as mail and database servers, domain controllers, new assets and critical mobile vulnerabilities.

Brad Hibbert, executive vice president of product engineering at BeyondTrust, said: “A recent Gartner report advises that organisations looking to invest in cloud infrastructure by leveraging an MSSP should have the provider also support the security for the cloud offering.

Retina CS 3.5 also includes a connector to BeyondTrust's PowerBroker mobile solution. According to the company, PowerBroker Mobile is the first product to integrate Retina CS technology since the successful acquisition of eEye Digital Security and integrates context-aware management with vulnerability and patch information.

PowerBroker Mobile offers coverage for Android, Apple iOS, BlackBerry and ActiveSync devices, and is a mobile device provisioning and configuration platform, with policy management for virtual private networks (VPNs), email, passwords, device encryption, remote locking GPS tracking and remote wipe, according to BeyondTrust.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1064

Vote