Comprehensive software reviews to make better IT decisions
Tenable Chosen as the Successor for BeyondTrust’s Vulnerability Management Suite; BeyondTrust Steps Aside
Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite. BeyondTrust has announced the end of life for its Enterprise Vulnerability Management and Network Security Scanner offerings. BeyondTrust has issued three important dates to make note of:
- December 31, 2019 – End of sale
- June 30, 2020 – Last date to renew
- December 31, 2020 – End of life for existing customers
Source: Tenable, Accessed January 28, 2020
Source: BeyondTrust, Accessed January 28, 2020
BeyondTrust is exiting the vulnerability management market after reviewing its products within the market. BeyondTrust was trying to make sure that there is strategic and business alignment with the program. BeyondTrust’s vulnerability management offering was deemed to not be core to its leadership in the privileged access management (PAM) space and thus will be discontinued. Tenable has, according to BeyondTrust, a proven track record of product innovation in vulnerability management and extensive investment into vulnerability research.
A consolidation of scope is valuable to small businesses and enterprises alike. BeyondTrust understands the comparative advantage of limiting its product field. There is no need to continue offering a product and spending resources on its development if it is not showing a return on investment. Partnering with another vendor to close any gaps in areas that need improvements benefits BeyondTrust and its customers in the end – customers get better products for their needs.
Current BeyondTrust members should consider switching to Tenable to have a current version of a vulnerability management solution before the June 30 or December 31 deadlines. Check out Info-Tech’s Product Scorecard on Tenable to see if Tenable is the right fit for your business as a vulnerability management tool.
If you’re still developing a vulnerability management program, ensure you’ve done the work of identifying and assessing the risk of your current vulnerabilities before you implement a solution. For guidance in finding out how vulnerable you may be and what options you can take, read our blueprint Design and Implement a Vulnerability Management Program.
Want to Know More?
Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all Chromium-based web browsers.
More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers. Trust and peace of mind are the core tenets of what they are selling and solutions like Acronis Cyber Protect Cloud can provide the platform upon which to deliver on those promises.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.
Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software
Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering with both large and small MSSPs, VMDR is designed to be scalable to any business enterprise and to automate the entire management cycle on all endpoints.
VMware has issued the highest Common Vulnerability Scoring System 3 (CVSSv3) rating, 10.0, on a vulnerability (CVE-2020-3952) found on its VMware vCenter Server version 6.7 software. VMware now has a patch to address this vulnerability, and administrators are urged to install the patch as soon as possible.
Market researcher ResearchandMarkets.com has published its market outlook for vulnerability management tools.