04:24 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

eEye Releases the First and Only Free Vulnerability Management Solution, Retina CS Community

Retina CS Community can identify and patch vulnerabilities in third-party applications

PHOENIX, AZ – Oct. 18, 2011 - eEye Digital Security, the company that provides Security in Context, today announced the general availability of Retina CS Community, the first and only IT security product to integrate vulnerability management along with patching for both Microsoft and common third-party applications from a single console at no cost to organizations.

With this release, eEye dramatically decreases the cost of managing IT security risks, especially for mid-size organizations that are often resource strapped and dealing with budgetary restrictions. Retina CS Community uniquely provides centralized vulnerability management, built-in patching, and vulnerability scanning for Blackberry mobile devices and virtualized applications at no cost, delivering benefits which include:

Reduced security risks with the most cost-effective vulnerability management product available for up to 128 assets. More effective and efficient remediation efforts with automated patching for both Microsoft and third-party applications including Mozilla Firefox and Adobe's Distiller, Elements, Reader, Flash and Shockwave. Increased visibility and automated vulnerability assessment for Blackberry mobile devices and virtualized applications.

A key capability of Retina CS Community is the ability to identify and patch vulnerabilities in third-party applications, such as Adobe and Firefox, which are quickly becoming a favored attack vector for hackers. Retina CS Community addresses the growing security risks associated with these third-party applications by extending Microsoft Windows Server Update Services (WSUS) beyond Microsoft application patching to also provide patching for third-party applications. With Retina CS Community, organizations get increased value around existing WSUS installations with a single, integrated solution for both Windows and third-party application patching.

“Retina CS Community expands eEye’s growing list of free security resources to help organizations understand where their weak points are and close security and compliance gaps,” said Brad Hibbert, Vice President of Strategy, eEye Digital Security. “We are very excited to provide this security industry first to help organizations of all sizes reduce security risks and make vulnerability management more efficient and effective, especially around third-party application patching, mobile devices and virtual application scanning.”

Retina CS Community is immediately available for free download at About eEye Digital Security

Since 1998, eEye Digital Security has made vulnerability and compliance management simpler and more efficient by providing the only unified solution that integrates assessment, mitigation, protection, and reporting into a complete offering with optional add-on modules for configuration compliance, regulatory reporting, and integrated patch management. eEye’s world-renowned research and development team is consistently the first to uncover critical vulnerabilities and build new protections into our solutions to prevent their exploit. Thousands of mid-to-large-size private-sector and government organizations, including the largest vulnerability management installations in the world, rely on eEye to protect against the latest known and zero-day vulnerabilities.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web