Founded in 2002, Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Relied upon by more than 20,000 organizations around the world, Tenable’s key clients include Fortune Global 500 companies across industries as well as the entire U.S. Department of Defense and many of the world’s leading governments.
Tenable family of products includes SecurityCenter Continuous View™ and Nessus®. SecurityCenter Continuous View allows for the most comprehensive and integrated view of network health. Nessus is the global standard in detecting and assessing network data. With the largest install base and best expertise in our industry, Tenable gives customers the ability to identify their biggest threats and respond quickly.
The New IT Landscape
The concept of a network has changed significantly over the past decade. Mobile users, virtual machines, and cloud-based applications are now major pillars of the IT infrastructure. As companies adopt the new IT landscape, they are able to realize efficiencies of a dynamic and agile organization. However they also introduce visibility and security gaps that leave the organization open to vulnerabilities, exploits, and breaches.
Enterprises must ensure that the new IT paradigms do not compromise the security posture of the organization. Adopting a truly continuous monitoring solution is the only way to improve organizational effectiveness and reduce costs without compromising enterprise security. Continuous network monitoring is the process an organization uses to automate the measurement of risk with their entire network. The process continuously discovers, assesses, and then reports every component of the network against a security policy.
Organizations that have implemented continuous monitoring are more than twice as likely to be satisfied with their vulnerability management approach compared to those who use periodic scanning, according to a 2014 study by Forrester Research commissioned by Tenable.
For more on how you can incorporate continuous monitoring to identify vulnerabilities, reduce risk and ensure compliance, read the whitepaper,“Continuous Monitoring for the New IT Landscape.”
Security Center CV
The Market defining continuous network monitoring platform
Continuous Network Monitoring is a new, innovative way to continuously measure and visualize the effectiveness of your security program and gain assurance that your security team is addressing the highest priority security problems to secure their business at any time.
Tenable’s Security Center Continuous View™ is the only continuous network monitoring platform, which provides the most comprehensive and integrated view of enterprise health.
- Broadest coverage of networks, devices, systems, virtual, mobile, and cloud services
- In-depth detection of vulnerabilities, misconfigurations, malware and real-time threats
- Advanced analytics with actionable information and trending to prioritize events/alerts
- Highly customizable dashboards, reports, and workflows for rapid response
- Continuous assurance using ARCs that measure effectiveness of security investments
Nessus Manager – Combines the powerful detection, scanning, and auditing features of Nessus, the world’s most widely deployed vulnerability scanner, with extensive management and collaboration functions. Available on-premises.
Nessus Cloud – Cloud-based solution that combines the powerful detection, scanning and auditing features of Nessus with multi-user support enabling extensive collaborative capabilities of scanners and resources.
PVS PASSIVE VULNERABILITY SCANNER
Tenable’s Passive Vulnerability Scanner™ (PVS™) continuously monitors network traffic in real-time to identify risks and vulnerabilities as they occur. For mre info http://www.tenable.com/products/passive-vulnerability-scanner
Video url – https://www.youtube.com/watch?v=1Yo-yKSVZtw
The industry’s most widely deployed vulnerability scanner. Nessus Professional features high-speed asset discovery, configuration auditing, target profiling, malware detection, sensitive data discovery, and vulnerability analysis
Video url – https://www.youtube.com/watch?v=pR4YyB4LNXo