Comprehensive Software Reviews to make better IT decisions
Tenable Chosen as the Successor for BeyondTrust’s Vulnerability Management Suite; BeyondTrust Steps Aside
Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite. BeyondTrust has announced the end of life for its Enterprise Vulnerability Management and Network Security Scanner offerings. BeyondTrust has issued three important dates to make note of:
- December 31, 2019 – End of sale
- June 30, 2020 – Last date to renew
- December 31, 2020 – End of life for existing customers
Source: Tenable, Accessed January 28, 2020
Source: BeyondTrust, Accessed January 28, 2020
BeyondTrust is exiting the vulnerability management market after reviewing its products within the market. BeyondTrust was trying to make sure that there is strategic and business alignment with the program. BeyondTrust’s vulnerability management offering was deemed to not be core to its leadership in the privileged access management (PAM) space and thus will be discontinued. Tenable has, according to BeyondTrust, a proven track record of product innovation in vulnerability management and extensive investment into vulnerability research.
A consolidation of scope is valuable to small businesses and enterprises alike. BeyondTrust understands the comparative advantage of limiting its product field. There is no need to continue offering a product and spending resources on its development if it is not showing a return on investment. Partnering with another vendor to close any gaps in areas that need improvements benefits BeyondTrust and its customers in the end – customers get better products for their needs.
Current BeyondTrust members should consider switching to Tenable to have a current version of a vulnerability management solution before the June 30 or December 31 deadlines. Check out Info-Tech’s Product Scorecard on Tenable to see if Tenable is the right fit for your business as a vulnerability management tool.
If you’re still developing a vulnerability management program, ensure you’ve done the work of identifying and assessing the risk of your current vulnerabilities before you implement a solution. For guidance in finding out how vulnerable you may be and what options you can take, read our blueprint Design and Implement a Vulnerability Management Program.
Want to Know More?
Evaluating vendor proposals is one of the most critical aspects of the RFP process, secondary only to negotiations. The ironic thing is that we've seen too many clients try to abbreviate this activity, take short cuts, or even avoid it altogether. Providing ample time for your team to review the vendor RFP responses is critical to a quality review process, while not rushing the evaluation process ensures that you understand their complete offer and proposal.
SC Media had its recent 2020 SC Awards Honored in the U.S. event and has awarded Qualys recognition for Best Vulnerability Management Solution in the “Trust Awards” category.
Qualys announced its new flagship product, Qualys VMDR, at RSA Conference 2020. According to the Qualys website, VMDR will be available after March 30, 2020.
There is a vulnerability at the layer 2 Wi-Fi encryption level called Kr00k (formally CVE-2019-15126 in the NIST National Vulnerability Database) affecting Broadcom and Cypress Semiconductor Wi-Fi devices.
Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found out their downloads are not applying.
Qualys’ newest product, VMDR (Vulnerability Management, Detection, and Response), will be available in March and will provide an all-in-one cloud-based solution for vulnerability management. VMDR will automate the entire management cycle on all endpoints.
Microsoft has added its Windows 10 Tamper Protection controls to the public version of Microsoft Defender. Previously available only to enterprise users, Tamper Protection is intended to better detect threats that make it past other defences and to provide remediation suggestions.
Qualys Research Labs, a vulnerability management provider, discovered a vulnerability in the OpenSMTPD Mail server used in conjunction with the OpenBSD operating system. This flaw allows for an attacker to execute arbitrary code with command privileges.
If you are experiencing pressure to lower your IT expense, a reverse auction might be a quick, efficient answer to ensure you are getting a competitive price.