Blog

Continuous Monitoring for the New IT Landscape

by Marcus J. Ranum on August 6, 2014

The landscape of IT security is changing and the rash of recent data breaches has targeted a fatal flaw in the way organizations have approached security over the last two decades. When it comes to security practices, organizations are going to have to adapt: older techniques simply won’t cut it anymore. Defensive technologies like firewalls, antivirus, patching systems and security event management have failed to prevent successful attacks because they are frequently not aligned with a unified security policy or business practice. Continuous monitoring manages the automated discovery and...

How Gaps in Pen Testing and Intrusion Detection Paved the Path to Continuous Monitoring

by Ron Gula on August 5, 2014

Last week I had my annual physical, with the goal of checking the big things—heart, cholesterol, blood pressure. I also had an ache in my foot that had caused me some trouble running, but which I had largely ignored. My doctor recommended a foot x-ray. The diagnosis--a bone fracture. Had I kept running, the fracture would have worsened, I would have stopped exercise altogether, which undoubtedly would have hurt my ability to protect the big things—heart, cholesterol, blood pressure. An annual trip to the doctor is my norm. But imagine a scenario where, rather than starting at a place of...

Tenable Integrates with Dell KACE Systems Management Solution

by Manish Patel on July 30, 2014

Nessus and SecurityCenter now integrate with the Dell KACE K1000 Systems Management appliances to identify missing patches on vulnerable systems, detect unmanaged systems, and extend scanning to cover systems that previously could not be scanned. This integration expands Tenable’s strategy to bridge the gap between vulnerability scanning and patching by allowing administrators to scan targets directly or query endpoint management platforms including Windows WSUS and SCCM, IBM Tivoli Endpoint Manager, Red Hat Network Satellite, and Dell KACE. Administrators are able to prioritize vulnerable...

Tenable Integrates with AirWatch

by Manish Patel on July 21, 2014

Organizations have adopted mobile devices as essential part of their business and rely on MDM solutions like AirWatch to track and manage them as well as certain applications that run on them. Both Nessus and SecurityCenter now integrate with the AirWatch Mobile Device Management (MDM) platform to pull in mobile device information and provide context to vulnerability data. This helps identify vulnerable mobile devices and prioritize the overall risk they pose to the organization. With this integration, Tenable now supports all major MDMs including Microsoft Exchange, Apple Profile Manager,...

Tenable and Amazon Web Services (AWS) Announce Nessus® Enterprise for AWS

by Manish Patel on July 15, 2014

Amazon Web Services (AWS) allows organizations to shift key compute, storage, and network resources from on-premise to the cloud, offering an on-demand delivery of IT resources with pay-as-you-go pricing. While organizations have deployed vulnerability and security solutions to protect their on-premise assets, they face challenges in monitoring and securing their AWS instances in the cloud. If you operate your company's business critical applications in the AWS (Amazon Web Services) cloud, you’re likely facing challenges such as: Inability to perform integrated scan of vulnerabilities,...

Installing and Using Nessus on Kali Linux

by Paul Asadoorian on July 10, 2014

If you are using Nessus for vulnerability scanning activities, consider installing Nessus on Kali Linux . Kali Linux is a fantastic distribution specifically designed for penetration testing. Nessus, Kali, and Penetration Testing Tenable provides Nessus on a wide variety of platforms to choose from. One of those choices is a Linux distribution designed for penetration testers called Kali Linux . Kali Linux, formerly known as "Backtrack", is a Debian-based Linux distribution containing hundreds of tools to perform penetration tests . The tools available in Kali Linux complement a Nessus...

Nessus Now Audits Huawei VRP Configurations

by Paul Asadoorian on July 8, 2014

As part of Tenable's Continuous Monitoring Solution , Nessus, Nessus Enterprise and Nessus Enterprise Cloud users can now perform configuration audits against Huawei devices running the Versatile Routing Platform (VRP). Huawei (pronounced "wah-way") is a manufacturer of several different types of networking and telecommunications hardware and software. Huawei products are more popular in Asia and Europe than in the U.S. This new plugin supports devices running Huawei Versatile Routing Platform VRP (R) software. The 'display version' command can be run on the target to obtain the release...

Announcing Singapore MAS Technology Risk Management Dashboard

by Dick Bussiere on July 1, 2014

Tenable is pleased to announce a dashboard designed to assist our Singapore Financial Services Industry customers to comply with the Monetary Authority of Singapore Technology Risk Management Guidelines. The Monetary Authority of Singapore (MAS) has published a refreshed set of Technology Risk Management (TRM) Guidelines. These TRM Guidelines have a strong regional and global impact, and now affect any organization that can be classified as a Financial Institution (FI), not just banks. Types of organizations impacted include: Finance Companies Insurance Companies Financial Advisers Securities...

Pages