03.03.2017 Views

Government Security News 2016 Digital Yearbook

GSN's Homeland Security Awards Digital Yearbook of Winners and Finalists

GSN's Homeland Security Awards Digital Yearbook of Winners and Finalists

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>2016</strong><br />

Beyond Trust<br />

<strong>2016</strong> Winner<br />

GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Vendors of IT and Cybersecurity Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Retina CS Enterprise Vulnerability Management<br />

With its actionable reporting capabilities, advanced<br />

threat analytics, centralized data warehouse, zero-gap<br />

coverage, and tight integrations with 3rd party solutions,<br />

Retina’s results-driven architecture works with<br />

government users to proactively discover what’s connected<br />

to their networks, put context around what<br />

systems and applications are most at risk, streamline<br />

remediation, track threats over time, and communicate<br />

progress to various stakeholders across their agencies.<br />

The following is just a sample of the key capabilities<br />

offered by Retina CS:<br />

Threat and Behavioral Analytics:<br />

• Correlates privilege, vulnerability and threat data<br />

from a variety of BeyondTrust and third-party<br />

solutions<br />

• Aggregate users and asset data to centrally base<br />

line and track behavior<br />

• Assign threat levels to events from various<br />

BeyondTrust and 3rd party data sources, based on<br />

scoring, malware, exploit research, exploit data<br />

bases, exploitability indices, CVSS, and more<br />

• Measure the velocity of asset changes to flag<br />

in-progress threats<br />

• Isolate users and assets exhibiting deviant<br />

behavior and report on outliers and risks<br />

Actionable Reporting:<br />

• Over 270 standard reports and pivot grid<br />

capabilities for custom reports<br />

• Maps vulnerabilities and misconfigurations to<br />

DISA Gold Disk, FDCC, NIST, USGCB, and many<br />

more regulatory frameworks<br />

• Risk Matrices and Heat Maps pinpoint vulnerabili<br />

ties with known exploits in the wild<br />

• Threat Analyzers measure remediation results<br />

before you do the work<br />

• Vulnerability and Compliance Scorecards and<br />

SLAs measure remediation and mitigation<br />

response times in the context of business risk<br />

BeyondInsight Risk Management Platform:<br />

• Reporting and analytics engine for Retina CS,<br />

provides a single, contextual lens through which<br />

to view user and asset risk<br />

• Group, assess, & report on assets by OS, domain,<br />

applications, function, vulnerabilities, and more<br />

• Built-in workflow, ticketing, and notification<br />

• Dozens of certified integrations with SIEM,<br />

GRC, NMS solutions, and more<br />

• Correlates McAfee, Qualys, Rapid7,<br />

Tenable, and Tripwire vulnerability<br />

scan data<br />

Vulnerability and Privilege Integration:<br />

• Control application access based on its<br />

known vulnerabilities, as well as their age,<br />

potential risk, and impact on regulatory<br />

compliance<br />

• Use application usage information to help<br />

prioritize which vulnerabilities to focus on<br />

Vulnerability Assessment:<br />

• Smart Credentials automatically scan targets using<br />

the highest level privilege credentials<br />

• Host-Based scanning closes security gaps<br />

created by cloud and virtual environments, and<br />

mobile devices<br />

• Cloud/Virtual scanning of Amazon, Azure,<br />

Hyper-V, VMware, and more.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.beyondtrust.com/<br />

Link to additional information:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ttps://www.beyondtrust.com/wp-content/uploads/<br />

ds-retina-cs.pdf?1453837501<br />

Nominating contact for this entry:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Mike Bradshaw, Partner<br />

Connect Marketing<br />

office: 801-373-7888<br />

Nominating organization address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Connect Marketing<br />

881 W. State Street<br />

Pleasant Grove, UT 84062<br />

BeyondTrust is proud of the fact that hundreds<br />

of U.S. Federal departments and agencies rely daily<br />

on Retina CS and are honored to have been selected by<br />

the Department of Homeland <strong>Security</strong> CDM program as<br />

its Vulnerability Management solution. BeyondTrust’s<br />

commitment to serving the U.S. government, and<br />

government-related organizations, starts with its compliance<br />

support for strategic cybersecurity mandates such<br />

as FISMA, CSIP, and the DoD Cybersecurity Culture and<br />

Compliance Initiative. This also includes the continuous<br />

monitoring and command and control capabilities made<br />

possible by Retina CS and its BeyondInsight platform,<br />

delivering unsurpassed analytics and intelligence to its<br />

end users.<br />

16 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!