Report Book: Retina Network Security Scanner Unlimited



Similar documents
BeyondInsight Version 5.6 New and Updated Features

IT Security & Compliance. On Time. On Budget. On Demand.

How To Manage A Privileged Account Management

Secunia Vulnerability Intelligence Manager (VIM) 4.0

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

October Application Control: The PowerBroker for Windows Difference

Privilege Gone Wild: The State of Privileged Account Management in 2015

Best Practices. Understanding BeyondTrust Patch Management

Privilege Gone Wild: The State of Privileged Account Management in 2015

PCI Compliance. Network Scanning. Getting Started Guide

Symantec Control Compliance Suite Standards Manager

eeye Digital Security Product Training

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

SecurityMetrics Vision whitepaper

9 Free Vulnerability Scanners + 1 Useful GPO Tool

PCI Compliance for Cloud Applications

Protecting Your Customers' Card Data. Presented By: Oliver Pinson-Roxburgh

rating of 5 out 5 stars

Vulnerability Management

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Best Practices for Auditing Changes in Active Directory WHITE PAPER

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Understanding Vulnerability Management Life Cycle Functions

PowerBroker for Windows

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Rozwiązanie SaaS w zakresie bezpieczeństwa teleinformatycznego i ochrony danych dla przedsiębiorstw

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

Avoiding the Top 5 Vulnerability Management Mistakes

Integrated Threat & Security Management.

PCI Data Security Standards. Presented by Pat Bergamo for the NJTC February 6, 2014

WHITE PAPER Leveraging GRC for PCI DSS Compliance. By: Chris Goodwin, Co-founder and CTO, LockPath

PCI Security Compliance

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

SecureVue Product Brochure

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

PCI DSS. Payment Card Industry Data Security Standard.

Kim Decarolis Compliance and Security Specialist (248) Mark Wayne Vice President Compliance and Security Specialist

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Policy Compliance. Getting Started Guide. January 22, 2016

SecurityMetrics. PCI Starter Kit

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Network Security and Vulnerability Assessment Solutions

Review: McAfee Vulnerability Manager

HITRUST CSF Assurance Program

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

PowerBroker for Windows Desktop and Server Use Cases February 2014

Dr. Anton Security Warrior Consulting

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

PCI DSS Overview and Solutions. Anwar McEntee

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Think like an MBA not a CISSP

GETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3. May 1, 2008

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Automated Risk Management Using NIST Standards

Caretower s SIEM Managed Security Services

E-SPIN PCI Compliancy Solution

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

NETWRIX FILE SERVER CHANGE REPORTER

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Enterprise Security Solutions

QRadar SIEM 6.3 Datasheet

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

NetIQ FISMA Compliance & Risk Management Solutions

Information Security and Risk Management

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

Achieving Compliance with the PCI Data Security Standard

EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA

Total Protection for Compliance: Unified IT Policy Auditing

Vendor Management Panel Discussion. Managing 3 rd Party Risk

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Version 7.4 & higher is Critical for all Customers Processing Credit Cards!

PCI Compliance Overview

Transcription:

REPORT BOOK Report Book: Retina Network Security Scanner Unlimited Version 5.20 January 2015 1

Table of Contents Retina Network Security Scanner Unlimited... 3 Report Title: Remediation Report... 3 Report Title: Executive Report... 3 Report Title: Summary Report... 4 Report Title: Vulnerability Export... 5 Report Title: Access Report... 6 Report Title: PCI DSS 3.0 Compliance Report... 6 Report Title: Regulatory Compliance... 7 Report Title: Dashboard Report... 8 Report Title: SCAP Benchmark Assessments Report... 9 Report Title: Web Application (Standard Edition) Report... 10 About BeyondTrust... 12 2

Retina Network Security Scanner Unlimited The following reports are available from within the Retina Network Security Scanner Unlimited (RNSSU) version. These can be generated from the vulnerability assessment scan engine, benchmark compliant scan wizard, and the web application scan engine. Report Title: Remediation Report This report is sortable by asset or vulnerability and allows filtering by risk, asset, and vulnerability. Users can customize notes presented in the report and explicit details regarding the findings are provided in the sample below: Report Title: Executive Report The executive report represents all of the findings in the form of metrics. This includes charts for the most vulnerable assets and top 10 vulnerabilities, as well as, detailed findings for asset inventory on processes, shares, etc. 3

Report Title: Summary Report The summary report provides a flattened version of all details from a scan. This includes metrics regarding the scan itself and all assets discovered. Flatten details cover all metrics from asset traits to enumerations of software, process, shares, etc. 4

Report Title: Vulnerability Export The vulnerability export is designed for consumption of the data using third party tools. Users can export the results as CSV, HTML, and XML. Fields can be selected through the UI to explicitly set which data can be exported. The sample below is a CSV export with all fields turned on. 5

Report Title: Access Report The access report is designed to enumerate all targets for a scan and whether credentials failed to authenticate for a target and why. This assists teams with identifying targets that fail authenticated scans based on faulty credentials or hardening techniques used to block authenticated access. Report Title: PCI DSS 3.0 Compliance Report This report is specific to the PCI DSS 3.0 standard. It produces a report compliant for submission as 6

an ASV, allows for completion of the required Self Assessment Questionnaires (SAQs), and company details as applicable for a compliant solution. Report Title: Regulatory Compliance The Retina Network Security Scanner contains detailed mappings for vulnerabilities to the following regulatory compliance initiatives and frameworks: ITIL, ISO 27002, COBIT, NIST, NERC/FERC, MASS 201, GLBA, HITRUST, and SOX. 7

Below are samples for NIST 800-53 and HIPAA. Note, these are modeled after the remediation report. Report Title: Dashboard Report The dashboard report provides a single page summary of a scan and the findings. Based on the findings, anything excessive will cause the assessment to be flagged as Passed or Failed. 8

Report Title: SCAP Benchmark Assessments Report The Retina Network Security Scanner Unlimited is a certified SCAP 1.1 benchmark compliance scanner. The solution contains over 70 out-of-the-box benchmark templates from NIST, MITRE, CIS, Microsoft, RedHat, and the US Government. Below is a sample for a domain controller using a STIG template. 9

Report Title: Web Application (Standard Edition) Report The Retina Network Security Contains the Standard Edition of our Web Application Scan Engine. The scan engine is available as a wizard from the tool menu and will provide interactive reports for highlighting remediation details for web applications. Below are screenshots from the summary screen and web application vulnerability details page. 10

11

About BeyondTrust BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company's integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and Security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust's Privileged Account Management and Vulnerability Management solutions are trusted by 4,000 customers worldwide, including over 50% of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com. 2015 BeyondTrust Corporation. All rights reserved. BeyondInsight, PowerBroker, Retina, and Retina Network Security Scanner are trademarks or registered trademarks of BeyondTrust in the United States and other countries. Other marks are the trademarks of their respective owners. 12