Multiple Solutions, One Integrated Platform
While each of our component products automates essential security assessment and compliance tasks, they combine to create a comprehensive vulnerability, threat and compliance intelligence platform that streamlines audits, incidents, and investigations across an entire IT organization.
Next Generation Vulnerability Management
Identifies vulnerabilities and compliance violations in real-time, capturing hidden attack paths, and evasive malicious behavior.
Advanced Malware Protection
Audits configuration of existing anti-malware investments, detects known and unknown malware and suspicious activity, finds botnets and inappropriate network relationships identifying gaps that allow malicious access bypassing existing security investments and process.
Configuration and Patch Auditing
Automatically compares scan data with patch and configuration manager data, ensuring operations teams can quickly improve their processes to reduce risk from unmanaged device access.
Incident Response and Forensic Analysis
Ours is the only platform that identifies assets that could be exploited, are being exploited or have already been exploited, enabling precise remediation to minimize damage, loss, and compliance violations.
Critical Infrastructure Protection
Patented passive monitoring technology enables us to protect critical infrastructure often sensitive to disruption with active scanning.
Mobile, Cloud and Virtual Infrastructure Auditing
While these technologies can represent 40% of IT assets or more, we are the only provider to capture 100% of these technologies in security, risk and compliance analytics.
Unique Underlying Architecture
Our unique underlying architecture enables this comprehensive set of solutions.
Active scan, passive network and log sensors gather system data, network intelligence and logs, essential for true 100% asset discovery, and enabling real-time analytics even across mobile, cloud and virtual infrastructure.
Standards libraries, research and threat intelligence feeds, directory integration, and infrastructure connectors, provide comprehensive context for precise identification and efficient mitigation of security exposures, and compliance violations.
The platform incorporates an advanced analytics engine that integrates sensor data, with threat intelligence, correlated with security information and event management (SIEM). Security and compliance dashboards and reports built on this engine, identify compliance violations, analyze the performance of technology and operations processes, and detection of advanced malware, suspicious user activity, and indicators of compromise.
Massive App Library
Our internationally recognized team of cybersecurity and complaince researchers and experts produce dashboards and reports, that are delivered to an integrated app store from our labs. Customers are able to leverage these apps, often out of the box, to meet a wide variety of security and compliance needs throughout the enterprise.
Dashboard and Report Designer
Reports, dashboards and workflows are easy to customize. Visual, historical and executive templates with available drilldown detail ensure corporate, business unit risk managers, security analysts, and compliance auditors get the information they need.
Four distinct products: Nessus®, Passive Vulnerability Scanner (PVS), Log Correlation Engine (LCE), and SecurityCenter snap together in this architecture. You can purchase components individually to address vulnerability assessment and compliance challenges from mobile, cloud and virtual infrastructure, or choose SecurityCenter CV, the only real-time forensic analysis and incident response platform for vulnerability, threat and compliance management, eliminating exposure to theft, misuse and compliance violations.
For programs designed to assess IT assets on a periodic basis, the Nessus vulnerability scanner leads the industry in in-depth checks, scan performance, prebuilt reports, and process automation.
By integrating with patch, configuration, mobile device management, and enterprise directories, SecurityCenter covers all the assets while eliminating days of interdepartmental validation and verification activities.
SecurityCenter Continuous View
Tenable SecurityCenter CV (SC CV) is the only comprehensive vulnerability, threat and compliance management platform that alleviates the arduous and time-consuming tasks of security forensic analysis, complex threat mitigation and compliance management. It does so by discovering 100% of assets in your environment, monitoring them 100% of the time, including mobile devices, virtual machines and cloud services. Tenable SC CV uniquely combines vulnerability scanning, network sniffing and event log correlation into a single comprehensive platform
Passive Vulnerability Scanner
PVS identifies hosts and services as they connect to the network and monitors the network continuously for vulnerabilities. It identifies network changes in real-time and tracks trends over time to identify threats, anomalies, and even sensitive data in motion.Learn More
SecurityCenter provides central administration, advanced analytics, reporting, and dashboards. Different editions of SecurityCenter integrate Tenable products to fit your vulnerability management program - from periodic scanning at scale to real time monitoring for advanced risk, threat, and compliance requirements.
Nessus Perimeter Service
For external scans complete with PCI validation, use the Tenable Nessus Perimeter Service. This service uses the same core Nessus technology for external industry validation - if you already use Nessus, you'll be prepared.
Log Correlation Engine
LCE is a component of Tenable SecurityCenter Continuous View providing incident response and forensics functionality with SIEM technology that aggregates, normalizes, correlates, and analyzes event log data from raw network traffic, NetFlow, IDS, system and application logs, and user activity.Learn More