Powerful vulnerability Detection Tool: Retina CS

Source: Internet
Author: User

RETINACS Powerful Vulnerability Detection Tool

eeye Digital Security Company was founded in the late 90 's, it is the world's leading security company, using the latest research results and innovative technologies to ensure your network Brother system security, and to provide you with the most powerful services: comprehensive, vulnerability assessment, intrusion prevention, customer security solutions. We remember the widely used network Flow analyzer Iris in 09, and the Eeyebinarydiffingsuite Vulnerability Mining analysis tool, Secureiis (Protection Microsoftiis network server products), Blink (combined with firewall protection, Intrusion detection and defense systems, security policy enforcement monitoring tools, etc. are the company's masterpiece. Today to show you is his another product retinacs. Vulnerability management system, a lot of people think of it as not just like Nessus, yes, but it's newer than the Nessus is much more powerful, in fact, Retinacs is a industry and government application standards of a multiplatform vulnerability management system, it will help the government and enterprise customers greatly reduce in the physical, Virtual and mobile environments with security implications. It integrates security vulnerabilities discovery, vulnerability classification, repair and reporting capabilities. Retinacs will be more effective than ever in discovering, grading, and fixing vulnerabilities. 2012 Retinacs was informationsecurity as the best product Award of the year. I first in 09 on this software has been tested because it is limited edition, can only sweep 1 IP, and then gave up the test, fortunately last year by a well-known domestic network security assessment Organization invited to this tool carried out a comprehensive test, the following mainly show the advantages of this product.

Figure 1 Dashboard Display

Characteristics:

Centralized security management : Identify, scan, and evaluate all external devices connected to the network in an organization, not restricted by the operating system used by the device's office location and equipment, providing a single view of security risk information for all assets

vulnerability Assessment for mobile devices : Using the same vulnerability management and evaluation process as other key assets to manage mobile devices such as Android and their applications

Built-in patch management : Based on the Microsoft WSUS engine currently used by many enterprises, integrated agentless patch management tools for Microsoft and some third-party applications such as Adobe (including Distiller,elements,reader,flash, Shockwave) and Mozilla (Firefox) to provide patch services

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.