September 12, 2013
Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual Infrastructure
Tenable Network Security, the leader in real-time vulnerability management, today announced that its patented Passive Vulnerability Scanner™ (PVS™) 4.0 is now generally available as a standalone product. Already available as part of Tenable’s SecurityCenter continuous monitoring platform, PVS 4.0 can now be used by any company, security specialist or compliance auditor to monitor networks in real-time, in a non-intrusive manner.
"PVS goes beyond traditional scanning. We use it to find anomalous indicators after a breach. It also allows us to provide valuable prevention services to our clients," said Reg Harnish, Chief Security Strategist of GreyCastle Security, a security consulting firm who provides incident response, pen testing, and on-going professional services to enterprise clients. "The Tenable brand is a tremendous selling point for our customers, and that level of brand recognition has been important in building our business."
Using network sniffing technology, PVS 4.0 uniquely identifies and assesses transient systems—like mobile, virtual and cloud apps—that may not be present during scheduled scans, and pinpoints potential security and compliance risks. PVS 4.0 also monitors systems sensitive to disruption, uncovers inappropriate use and insider threats, and eliminates gaps between active scans. PVS scanners are invaluable as dedicated servers within your network and at customer sites deployed by consultants.
"By supplementing a Nessus active scan-based strategy with PVS 4.0, companies can significantly lower their overall security risk, increase compliance and avoid costly security breaches," said Ron Gula, CEO of Tenable Network Security." The new features available in PVS 4.0 include:
- Improved Interface: HTML5 Web-based Interface optimized for mobile
- Simplified Installation: Guided by an installation wizard
- Optimized to run on portable systems
- Web-based Data Export: Supported file formats include .csv, .nessus and .html
- Automatic snapshots: Network discovery and vulnerability data provides visibility into changes over time
Vulnerability scanning is a cornerstone of IT security and has become a regulatory compliance standard today. Over the last few years, scanning has risen in priority as confirmed by the first four controls in the SANS Top 20 Critical Controls.
For more information on Tenable Network Security products and solutions, please visit www.tenable.com.
About Tenable Network Security
Tenable Network Security transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail and energy. Transform security with Tenable, the creators of Nessus and leaders in continuous monitoring, by visiting tenable.com.