BeyondTrust streamlines cyber security and vulnerability management with BeyondInsight 6.0

 
BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorised access, announced today the release of BeyondInsight 6.0, enabling organisations to assess cloud and virtual environments, share actionable intelligence with leading SIEMs, consolidate vulnerability data from various scanners and centrally manage host-based scans.
“With the mainstream adoption of cloud, virtual and mobile platforms, the rise of the application economy, and the escalating velocity and ferocity of threat activity, it’s no surprise that getting a true picture of enterprise risk requires a vast amount of data,” said Brad Hibbert, CTO at BeyondTrust. “BeyondInsight 6.0 enables organisations to correlate seemingly disparate pieces of data into definitive and actionable security intelligence.”
The new and enhanced connectors further BeyondTrust’s comprehensive vulnerability management strategy by:

  • Closing security gaps created by cloud, virtual and mobile platforms: BeyondTrust’s cloud and virtual connectors and Retina Host Security Scanner eliminate gaps within an organisations security posture, providing a true picture of its enterprise risk
  • Improving visibility of hidden and emerging threats: BeyondTrust’s SIEM connectors give organisations automated access to normalized threat intelligence, enabling them to more quickly prioritise threats and in turn respond more efficiently.
  • Covering the widest range of assets and vulnerabilities: Tenable Security Center and Tripwire connectors add to BeyondTrust’s list of supported 3rd party scanners, enabling organisations to correlate vulnerability data from a number of on premise and cloud-based scanners within a centralised reporting and analytics platform.

“Cloud and virtual infrastructures by nature are very elastic,” said Brad Hibbert, CTO at BeyondTrust. “As a result, their presence can be hard to predict making scanning them even more difficult. Unknown or undermanaged cloud and virtual environments pose a significant risk opening networks to security breaches, data loss, intellectual property theft, and regulatory compliance issues. BeyondInsight’s connectors enable organisations to discover all cloud and virtual instances in an environment, group cloud assets for secure management, and scan for known and emerging vulnerabilities.”

Subscribe to our newsletter

Don't miss new updates on your email
Scroll to Top