RETINACS Powerful Vulnerability Detection Tool
eeye Digital Security Company was founded in the late 90 's, it is the world's leading security company, using the latest research results and innovative technologies to ensure your network Brother system security, and to provide you with the most powerful services: comprehensive, vulnerability assessment, intrusion prevention, customer security solutions. We remember the widely used network Flow analyzer Iris in 09, and the Eeyebinarydiffingsuite Vulnerability Mining analysis tool, Secureiis (Protection Microsoftiis network server products), Blink (combined with firewall protection, Intrusion detection and defense systems, security policy enforcement monitoring tools, etc. are the company's masterpiece. Today to show you is his another product retinacs. Vulnerability management system, a lot of people think of it as not just like Nessus, yes, but it's newer than the Nessus is much more powerful, in fact, Retinacs is a industry and government application standards of a multiplatform vulnerability management system, it will help the government and enterprise customers greatly reduce in the physical, Virtual and mobile environments with security implications. It integrates security vulnerabilities discovery, vulnerability classification, repair and reporting capabilities. Retinacs will be more effective than ever in discovering, grading, and fixing vulnerabilities. 2012 Retinacs was informationsecurity as the best product Award of the year. I first in 09 on this software has been tested because it is limited edition, can only sweep 1 IP, and then gave up the test, fortunately last year by a well-known domestic network security assessment Organization invited to this tool carried out a comprehensive test, the following mainly show the advantages of this product.
Figure 1 Dashboard Display
Characteristics:
Centralized security management : Identify, scan, and evaluate all external devices connected to the network in an organization, not restricted by the operating system used by the device's office location and equipment, providing a single view of security risk information for all assets
vulnerability Assessment for mobile devices : Using the same vulnerability management and evaluation process as other key assets to manage mobile devices such as Android and their applications
Built-in patch management : Based on the Microsoft WSUS engine currently used by many enterprises, integrated agentless patch management tools for Microsoft and some third-party applications such as Adobe (including Distiller,elements,reader,flash, Shockwave) and Mozilla (Firefox) to provide patch services