BeyondTrust Retina CS
February 01, 2013
Starts at $8,000 for 256 assets.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Full vulnerability assessment with risk management functionality.
- Weaknesses: None that we found.
- Verdict: Very good value and a venerable product with a good focus on compliance.
The Retina CS from BeyondTrust offers up quite a few strong features for vulnerability management throughout the enterprise. This solution provides discovery and remediation of security risks and vulnerabilities based on priority and severity. It offers the usual vulnerability scanning and assessment functions, but takes this a step further by adding context to those vulnerabilities, which brings in some risk management functionality alongside vulnerability management.
We found this tool to be simple to set up and deploy. To get the appliance running, we had to connect it to the network and assign an IP address using the buttons on the front panel of the appliance. After we set the IP and network information, we were able to browse to the web-based management console. The first time we logged into the console, we were presented with a short setup wizard, which allowed us to configure some basic appliance settings, such as the administrator password and licensing information. After the wizard was complete, we were taken to the main appliance dashboard. All further management and configuration was done from this web-based administration console, which we found easy to navigate. It also provides many charts, graphs and visuals displaying the overall security and risk assessments of the environment.
Aside from the easy-to-navigate dashboard and web-based management console, we found this product to include many scanning options. The scanning engine provides a number of templates for regulatory compliance scanning right out of the box. Some of these include: PCI Data Security Standards (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), Gramm-Leach-Bliley Act (GLBA), National Institute of Standards and Technology (NIST), Federal Energy Regulatory Commission (FERC)/North American Electric Reliability Corp. (NERC), 201 CMR 17 (the Massachusetts Data Protection Law), International Organization for Standardization (ISO), Control Objectives for Information and Related Technology (COBIT) and Information Technology Infrastructure Library (ITIL).
Documentation included a short quick-start guide along with a full user guide. The quick-start guide offered a good amount of detail, along with initial setup instructions to get the appliance up and running. We found all documentation to include clear step-by-step instructions, as well as many screen shots and detailed descriptions and configuration examples.
BeyondTrust offers both eight-hours-a-day/five-days-a-week and 24/7 support options as part of a subscription. Customers must purchase this at an extra cost. It provides access to both phone- and email-based technical assistance. Also available is access to an online portal that includes a knowledge base and many resources, including product downloads and technical documentation.
At a price of $8,000 for management of 256 assets, this product does carry quite the price tag for some environments, but we find it to be a very good value for the money. While expensive, this tool offers a lot in the way of overall vulnerability and risk management functions. Its feature set, combined with the many reporting and assessment options, gives an excellent overview of the enterprise's security.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Check Point tracks two waves of Cerber ransomware hitting U.S., UK
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- MIRCOP ransomware blames victim for attack, demands $28K ransom
- CYBERCOM 'reluctant' to cut off Islamic State internet
- Chinese tech professional caught selling secrets
- How 154M U.S. voter records will affect Americans' security - industry reacts