Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/9/2009
05:04 PM
50%
50%

eEye Announces Retina CS

Retina CS boasts simplified navigation and a newly designed Web 2.0 interface

Taking advantage of the latest in rich Internet application development tools and feedback from thousands of customers, eEye Digital Security (www.eeye.com), today announced Retina' CS Compliance and Security, a powerful security and vulnerability management solution for small to mid-size enterprises and which security pros will find intuitive and easy to master. This next-generation Retina version packs the power of eEye's vulnerability management technology into a richer, more attractive and user-centric package.

With a single, Web-based security console that manages all vulnerability and endpoint protection requirements, Retina CS boasts simplified navigation and a newly designed Web 2.0 interface that offers smart filters, quick access to key functions, instant column reordering, sorting, on-the-fly report creation and fast screen transitions that make for a true next-generation user experience. (Full product details: http://www.eeye.com/Products/Retina/CS.aspx)

Traditionally, vulnerability identification has been performed with network-vulnerability assessment scanners, and protection has been managed by endpoint protection platforms coupled with host-based anti-virus solutions. Alternatively, Retina CS from eEye alters this paradigm by providing all three functions within a single console and user interface that easily deploys security agents enlisted to identify, protect and fix vulnerabilities and repair mis-configurations.

"We've spent significant time compiling our SME customers' most pressing concerns relating to their most urgent security problems," said eEye CEO Kamal Arafeh. "An intensive effort was invested to satisfy a host of administrative requirements; the pay-off is that Retina CS has fulfilled our customer wish list for a kind of 'express interface' that superbly gets the job done with no redundancy or wasted effort. For example, need a PCI report for your external servers? Select the report, and Retina CS takes care of launching the scan utilizing preconfigured scan templates."

Aimed at simplifying the complex task of assessing and managing security environments, Retina CS builds on eEye's award-winning suite of products that include the powerful and sophisticated Retina Network Security Scanner and the company's Endpoint Protection solution, Blink. Designed to fit the needs of small to mid-sized organizations (SMB/SME), Retina CS provides a vastly improved and unified management console that combines simplified workflows with advanced custom reporting into one seamless experience.

-- Simplified User Experience - We've listened to our customers and

created a streamlined interface that allows for easy navigation so that

complex tasks can be completed quickly and efficiently.

-- Customizable Reporting - Whether the task calls for modifying an

existing report or creating a new one, Retina CS makes it easy with drag &

drop report sections and customizable filters.

-- Rich Internet Application - Drag & drop, easy column reordering and

sorting, interactive charts and graphs, smooth screen transitions.

-- Cross Platform Browser Support - Retina CS can be accessed from any

browser that supports Adobe Flash player.

-- Improved Scalability and Performance - enhanced performance and

improved scalability allows reports to generate faster while supporting

more agents.

-- Results-driven Architecture - Nobody wants to run vulnerability

scans; rather, the goal of these scans is to assess the network and provide

reports on those results. Retina CS keeps that in mind by utilizing

powerful workflow.

"We designed Retina CS as a workflow-oriented solution to help customers meet regulatory and security compliance requirements while also giving them the ability to manage security from almost any Web browser or platform," said Arafeh. "The solution provides a single point of visibility into the entire vulnerability management process and enables quick identification, protection, and remediation of vulnerabilities. With these comprehensive threat and remediation benefits, Retina CS represents the next-generation of vulnerability management solutions."

Availability

Retina CS will be available by November 30th via software licensing or as a managed service. Retina CS appliance will ship Q1. Existing eEye clients of Retina Enterprise, Blink Enterprise, eEye 1505 Security Management Appliance, or Blink 200 Security Management Console can easily migrate to Retina CS while existing stand-alone users of Retina Network Security Scanner and Blink Endpoint Protection can easily upgrade to Retina CS. For pricing and additional product information, visit http://www.eeye.com/Products/Retina/CS.aspx

About eEye Digital Security

eEye Digital Security is the global leader in a new class of security solutions: comprehensive vulnerability management and zero-day endpoint security protection. eEye enables secure computing through world-renowned research and innovative technology, supplying the world's largest businesses with an integrated and research-driven vulnerability assessment, intrusion prevention, and client security solution. eEye's research team is consistently the first to identify new threats in the wild and our products leverage that research to deliver the insights and tools necessary to protect our customer's operating environments.

All trademarks contained within this press release are the sole property of their respective owners and are hereby acknowledged.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1448
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1447.
CVE-2020-1449
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Project software when the software fails to check the source markup of a file, aka 'Microsoft Project Remote Code Execution Vulnerability'.
CVE-2020-1450
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1451, CVE-2020-1456.
CVE-2020-1451
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1450, CVE-2020-1456.
CVE-2020-1454
PUBLISHED: 2020-07-14
This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Re...