Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/9/2009
05:04 PM
50%
50%

eEye Announces Retina CS

Retina CS boasts simplified navigation and a newly designed Web 2.0 interface

Taking advantage of the latest in rich Internet application development tools and feedback from thousands of customers, eEye Digital Security (www.eeye.com), today announced Retina' CS Compliance and Security, a powerful security and vulnerability management solution for small to mid-size enterprises and which security pros will find intuitive and easy to master. This next-generation Retina version packs the power of eEye's vulnerability management technology into a richer, more attractive and user-centric package.

With a single, Web-based security console that manages all vulnerability and endpoint protection requirements, Retina CS boasts simplified navigation and a newly designed Web 2.0 interface that offers smart filters, quick access to key functions, instant column reordering, sorting, on-the-fly report creation and fast screen transitions that make for a true next-generation user experience. (Full product details: http://www.eeye.com/Products/Retina/CS.aspx)

Traditionally, vulnerability identification has been performed with network-vulnerability assessment scanners, and protection has been managed by endpoint protection platforms coupled with host-based anti-virus solutions. Alternatively, Retina CS from eEye alters this paradigm by providing all three functions within a single console and user interface that easily deploys security agents enlisted to identify, protect and fix vulnerabilities and repair mis-configurations.

"We've spent significant time compiling our SME customers' most pressing concerns relating to their most urgent security problems," said eEye CEO Kamal Arafeh. "An intensive effort was invested to satisfy a host of administrative requirements; the pay-off is that Retina CS has fulfilled our customer wish list for a kind of 'express interface' that superbly gets the job done with no redundancy or wasted effort. For example, need a PCI report for your external servers? Select the report, and Retina CS takes care of launching the scan utilizing preconfigured scan templates."

Aimed at simplifying the complex task of assessing and managing security environments, Retina CS builds on eEye's award-winning suite of products that include the powerful and sophisticated Retina Network Security Scanner and the company's Endpoint Protection solution, Blink. Designed to fit the needs of small to mid-sized organizations (SMB/SME), Retina CS provides a vastly improved and unified management console that combines simplified workflows with advanced custom reporting into one seamless experience.

-- Simplified User Experience - We've listened to our customers and

created a streamlined interface that allows for easy navigation so that

complex tasks can be completed quickly and efficiently.

-- Customizable Reporting - Whether the task calls for modifying an

existing report or creating a new one, Retina CS makes it easy with drag &

drop report sections and customizable filters.

-- Rich Internet Application - Drag & drop, easy column reordering and

sorting, interactive charts and graphs, smooth screen transitions.

-- Cross Platform Browser Support - Retina CS can be accessed from any

browser that supports Adobe Flash player.

-- Improved Scalability and Performance - enhanced performance and

improved scalability allows reports to generate faster while supporting

more agents.

-- Results-driven Architecture - Nobody wants to run vulnerability

scans; rather, the goal of these scans is to assess the network and provide

reports on those results. Retina CS keeps that in mind by utilizing

powerful workflow.

"We designed Retina CS as a workflow-oriented solution to help customers meet regulatory and security compliance requirements while also giving them the ability to manage security from almost any Web browser or platform," said Arafeh. "The solution provides a single point of visibility into the entire vulnerability management process and enables quick identification, protection, and remediation of vulnerabilities. With these comprehensive threat and remediation benefits, Retina CS represents the next-generation of vulnerability management solutions."

Availability

Retina CS will be available by November 30th via software licensing or as a managed service. Retina CS appliance will ship Q1. Existing eEye clients of Retina Enterprise, Blink Enterprise, eEye 1505 Security Management Appliance, or Blink 200 Security Management Console can easily migrate to Retina CS while existing stand-alone users of Retina Network Security Scanner and Blink Endpoint Protection can easily upgrade to Retina CS. For pricing and additional product information, visit http://www.eeye.com/Products/Retina/CS.aspx

About eEye Digital Security

eEye Digital Security is the global leader in a new class of security solutions: comprehensive vulnerability management and zero-day endpoint security protection. eEye enables secure computing through world-renowned research and innovative technology, supplying the world's largest businesses with an integrated and research-driven vulnerability assessment, intrusion prevention, and client security solution. eEye's research team is consistently the first to identify new threats in the wild and our products leverage that research to deliver the insights and tools necessary to protect our customer's operating environments.

All trademarks contained within this press release are the sole property of their respective owners and are hereby acknowledged.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17513
PUBLISHED: 2019-10-18
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
CVE-2019-8216
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8217
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8218
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8219
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .