Passive Network Monitoring

PVS 4.0.2 is now available for download

by Sherry Quinn
April 2, 2014

This maintenance release addresses the following issues:

  • An expired PVS license or activation code sends the user to the Quick-Setup wizard to allow entry of the new license
  • Hosts with Internet facing vulnerabilities were missing the “External Access” tag
  • Filtering issue on the “Affected Host List” was fixed
  • Dependency issue causing some false positives was fixed
  • Improvements were also made including:

    Detecting Snowden - The Insider Threat

    by Paul Asadoorian
    February 12, 2014

    Tenable's scanning, sniffing, and logging products can comprehensively identify a variety of potentially malicious activity, including activity generated by malicious insiders like Edward Snowden. Tenable's SecurityCenter Continuous View solution can further automate the detection of events coming from scanners, intrusion detection systems, malware, compliance violations, and much more.

    Continuous Scanning, Better Vulnerability Metrics

    by Ron Gula
    November 12, 2013

    Active scanning, for the most part, is a snapshot-in-time view of vulnerabilities that exist in an organization’s environment. In a typical organization, scans occur on a quarterly or even monthly basis. However, the scans only tell you what happened in that moment, not what happened in the intervening days between scans. By scanning more frequently (and introducing real-time, passive scanning), organizations will have more accurate metrics that show how long an detected vulnerability was present and when it was mitigated.

    Hiding In Plain Sight: Discovering Legacy Applications Using PVS

    by Paul Asadoorian
    October 14, 2013

    Finding the pockets of your network that contain hidden systems or applications is an ongoing task for every IT security department. It seems no matter how well you know your network, there is frequently something that causes you to raise an eyebrow and investigate. There are a few contributing factors that lead to pockets of unmanaged systems and applications:

    Adding Passive Vulnerability Scanning To Your Security ToolKit

    by Ron Gula
    September 16, 2013

    The new PVS 4.0 annual subscription makes network monitoring available to a wide variety of security practitioners. This is a new type of product, and it has many highly-practical use cases. Read about several ways you can get your security work done quicker with PVS 4.0.

    Pages