Megan Daudelin is an Information Security Content Analyst at Tenable, developing research content for SecurityCenter. Megan specializes in content related to digital forensics and incident response. Prior to joining Tenable, Megan worked as a security analyst and digital forensic analyst. She is a GIAC Certified Forensic Analyst (GCFA) and GIAC Certified Intrusion Analyst (GCIA).
Personal mobile devices are not often managed by Mobile Device Management (MDM) solutions or held to the security standards required by the company. Detecting and assessing the vulnerabilities associated with unmanaged devices is a key priority in securing a network. By leveraging the capabilities of the Passive Vulnerability Scanner (PVS), organizations can use SecurityCenter to more effectively monitor the unmanaged mobile devices connecting to their network. The Android Devices and Vulnerabilities dashboard assists security teams in understanding the Android devices connected to their network and the associated vulnerabilities.
Detecting the various operating systems on a network can be a daunting task. Understanding which operating systems connect to the network can improve a security team’s ability to mitigate vulnerabilities and secure the network. This report assists security teams in identifying the operating systems that are present on the network so that security initiatives can be more focused.
Discovering mobile devices on a network is a growing challenge. Bring-Your-Own-Device (BYOD) and enterprise mobile device programs are becoming commonplace and the need to manage these devices is increasing with this trend. By integrating SecurityCenter with implemented MDM platforms, organizations can more effectively monitor the presence of mobile devices in their network.
For most organizations, the rate of log generation far exceeds the ability to of a security team adequately monitor it. Quickly identifying events of value through the noise is crucial to maintaining the integrity of a network. The Targeted Event Monitoring report assists security teams in identifying important events in their logs so that faster remediation is possible.
Log monitoring is a daunting task that many organizations have difficulty tackling efficiently. For most organizations, the rate of log generation far exceeds the ability to of a security team adequately monitor it. Quickly identifying events of value through the noise is crucial to maintaining the security of a network. The Targeted Event Monitoring dashboard assists security teams in identifying important events in their logs so that faster remediation is possible.
Vulnerability mitigation is a constantly moving target as new exploits are developed and new vulnerabilities are discovered. In order to effectively mitigate vulnerabilities on a network, a security team must be aware of what current vulnerabilities exist. The Exploits by Platform report assists security teams with the process of vulnerability mitigation by providing an enhanced view of the security of a network against specific exploit frameworks.
File integrity monitoring is a key component of any information security program. Changes to configurations, files, and file attributes across the network are common, but the few that impact file or configuration integrity can be hidden within a large volume of daily changes. These changes can also reduce security posture and in some cases may be leading indicators of a breach in progress. The File Integrity Monitoring dashboard assists security teams in tracking file integrity events on the network.
Identifying methods of ingress into the network via wireless access points is crucial to maintaining a successful security program. This includes monitoring the deployment and status of authorized wireless access points as well as maintaining security by identifying rogue or unauthorized wireless access points. The Wireless Detections Report utilizes both active and passive methods to identify wireless access points and vulnerabilities found within the environment.
The Social Network Activity Report provides high-level information about the use of social networking in an organization. A series of charts and tables illustrate the activity associated with popular social networking websites. This includes information about which subnets and IP addresses generate the most social network activity, the activity for different categories of social networking websites, hosts with extended periods of social network activity, and trend information about social network website access.
IRS Publication 1075 – “Tax Information Security Guidelines for Federal, State, and Local Agencies 2014 Edition”, provides thorough guidance for organizations that deal with Federal Taxpayer Information (FTI). Tenable’s Tenable.sc Continuous View (CV) assists organizations in discovering compliance and vulnerability concerns on the network, assessing their impact, reporting on the results, and taking action to remediate issues. Tenable.sc CV provides the tools that state and local government agencies can use to meet and demonstrate FTI compliance.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Buy Tenable Lumin
Contact a sales representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Request a demo of Tenable Security Center
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable OT Security
Get the Operational Technology security you need.
Reduce the risk you don’t.
Request a demo of Tenable Identity Exposure
Continuously detect and respond to Active Directory attacks. No agents. No
privileges.
On-prem and in the cloud.
Request a demo of Tenable Cloud Security
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
See Tenable One in action
Exposure management for the modern attack surface.
See Tenable Attack Surface Management in action
Know the exposure of every asset on any platform.
Get a demo of Tenable Enclave Security
Please fill out the form with your contact information and a sales representative will contact you shortly to schedule a demo.
Thank You
Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
NEW - Tenable Nessus Expert now available
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].