Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/9/2009
05:04 PM
50%
50%

eEye Announces Retina CS

Retina CS boasts simplified navigation and a newly designed Web 2.0 interface

Taking advantage of the latest in rich Internet application development tools and feedback from thousands of customers, eEye Digital Security (www.eeye.com), today announced Retina' CS Compliance and Security, a powerful security and vulnerability management solution for small to mid-size enterprises and which security pros will find intuitive and easy to master. This next-generation Retina version packs the power of eEye's vulnerability management technology into a richer, more attractive and user-centric package.

With a single, Web-based security console that manages all vulnerability and endpoint protection requirements, Retina CS boasts simplified navigation and a newly designed Web 2.0 interface that offers smart filters, quick access to key functions, instant column reordering, sorting, on-the-fly report creation and fast screen transitions that make for a true next-generation user experience. (Full product details: http://www.eeye.com/Products/Retina/CS.aspx)

Traditionally, vulnerability identification has been performed with network-vulnerability assessment scanners, and protection has been managed by endpoint protection platforms coupled with host-based anti-virus solutions. Alternatively, Retina CS from eEye alters this paradigm by providing all three functions within a single console and user interface that easily deploys security agents enlisted to identify, protect and fix vulnerabilities and repair mis-configurations.

"We've spent significant time compiling our SME customers' most pressing concerns relating to their most urgent security problems," said eEye CEO Kamal Arafeh. "An intensive effort was invested to satisfy a host of administrative requirements; the pay-off is that Retina CS has fulfilled our customer wish list for a kind of 'express interface' that superbly gets the job done with no redundancy or wasted effort. For example, need a PCI report for your external servers? Select the report, and Retina CS takes care of launching the scan utilizing preconfigured scan templates."

Aimed at simplifying the complex task of assessing and managing security environments, Retina CS builds on eEye's award-winning suite of products that include the powerful and sophisticated Retina Network Security Scanner and the company's Endpoint Protection solution, Blink. Designed to fit the needs of small to mid-sized organizations (SMB/SME), Retina CS provides a vastly improved and unified management console that combines simplified workflows with advanced custom reporting into one seamless experience.

-- Simplified User Experience - We've listened to our customers and

created a streamlined interface that allows for easy navigation so that

complex tasks can be completed quickly and efficiently.

-- Customizable Reporting - Whether the task calls for modifying an

existing report or creating a new one, Retina CS makes it easy with drag &

drop report sections and customizable filters.

-- Rich Internet Application - Drag & drop, easy column reordering and

sorting, interactive charts and graphs, smooth screen transitions.

-- Cross Platform Browser Support - Retina CS can be accessed from any

browser that supports Adobe Flash player.

-- Improved Scalability and Performance - enhanced performance and

improved scalability allows reports to generate faster while supporting

more agents.

-- Results-driven Architecture - Nobody wants to run vulnerability

scans; rather, the goal of these scans is to assess the network and provide

reports on those results. Retina CS keeps that in mind by utilizing

powerful workflow.

"We designed Retina CS as a workflow-oriented solution to help customers meet regulatory and security compliance requirements while also giving them the ability to manage security from almost any Web browser or platform," said Arafeh. "The solution provides a single point of visibility into the entire vulnerability management process and enables quick identification, protection, and remediation of vulnerabilities. With these comprehensive threat and remediation benefits, Retina CS represents the next-generation of vulnerability management solutions."

Availability

Retina CS will be available by November 30th via software licensing or as a managed service. Retina CS appliance will ship Q1. Existing eEye clients of Retina Enterprise, Blink Enterprise, eEye 1505 Security Management Appliance, or Blink 200 Security Management Console can easily migrate to Retina CS while existing stand-alone users of Retina Network Security Scanner and Blink Endpoint Protection can easily upgrade to Retina CS. For pricing and additional product information, visit http://www.eeye.com/Products/Retina/CS.aspx

About eEye Digital Security

eEye Digital Security is the global leader in a new class of security solutions: comprehensive vulnerability management and zero-day endpoint security protection. eEye enables secure computing through world-renowned research and innovative technology, supplying the world's largest businesses with an integrated and research-driven vulnerability assessment, intrusion prevention, and client security solution. eEye's research team is consistently the first to identify new threats in the wild and our products leverage that research to deliver the insights and tools necessary to protect our customer's operating environments.

All trademarks contained within this press release are the sole property of their respective owners and are hereby acknowledged.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...