Monitor Intensively and Continuously
Are you concerned that you don’t know what is on your network? Do mobile devices and other transient systems elude your traditional security controls? Understand the risk by asking:
- Which systems are active?
- Which protocols do they communicate on?
- Which systems do they communicate with?
- Which applications do they run?
- And, most importantly, what vulnerabilities exist and pose the most risk?
The Tenable Passive Vulnerability Scanner continuously monitors network traffic and detects apps, services, protocols, hosts, etc. for a variety of security and compliance related information.
Discover Mobile Devices and Their Vulnerabilities
By continuously monitoring the network, the Passive Vulnerability Scanner can detect and monitor mobile devices simply from the network traffic they generate and can record their activities on your network.
Database Logging and Monitoring
Monitor network traffic and identify known and unknown SQL implementations and the vulnerabilities associated with them. The Passive Vulnerability Scanner can log this activity in real time to identify potential system compromise and data leakage.
Insider Threat Detection
When deployed on the interior of a network, the Passive Vulnerability Scanner offers advanced analysis of the Microsoft SMB protocol and can observe Active Directory network traffic to automatically learn:
- Each system’s hostname and workgroup name
- A list of all files shared on any folder
- Logins and file downloads from a network share in real time
Evaluate Passive Vulnerability Scanner for Your Organization
Start your free 15-day trial.Evaluate
Compare SecurityCenter Editions
See what version of SecurityCenter is right for you.Compare
Schedule an enterprise evaluation of SecurityCenter to see your security and compliance information in a new way.Contact Us