Tenable Product Usage

Tenable Network Security Validated for PCI DSS 3.0 for VMware

by Manish Patel on June 10, 2014

Today, we announced that all Tenable solutions have been validated by Coalfire for use in VMware environments for Payment Card Industry Data Security Standard (PCI DSS) version 3.0, the latest version of the standard. You may be wondering – Well, what does it mean to me? Any organization that transmits, processes, or stores payment card data must comply with PCI DSS 3.0 requirements by Jan 1, 2015. However, PCI guidance is written to be vendor agnostic and organizations must interpret the requirements and map these requirements to vendor solutions. Virtualization software adds further...

Adding Passive Vulnerability Scanning To Your Security ToolKit

by Ron Gula on September 16, 2013

The new PVS 4.0 annual subscription makes network monitoring available to a wide variety of security practitioners. This is a new type of product, and it has many highly-practical use cases. Read about several ways you can get your security work done quicker with PVS 4.0.

Upping the Ante: Tenable’s Log Correlation Engine Now Standard in SecurityCenter Continuous View

by Allan Carey on April 18, 2013

After a very successful launch of SecurityCenter Continuous View (CV) last year, Tenable has further enhanced the analytical power and value of SecurityCenter CV with the addition of Tenable’s Log Correlation Engine (LCE) as a standard component of the solution. Today’s announcement highlights the addition of LCE to SecurityCenter CV which brings together vulnerability management, compliance reporting, and security information and event management (SIEM) into a single, integrated security and compliance intelligence platform. LCE provides the ability to import logs from hundreds of devices...

Searching for Custom Malicious File Hashes with Nessus

by Ron Gula on March 15, 2013

The Nessus malicious process detection plugins were recently enhanced to allow for searching with custom file hash lists. This allows organizations to add their own sources of malicious file hashes into Tenable's set of cloud-based hashes and botnet checks.

Predicting Attack Paths

by Ron Gula on April 2, 2012

Tenable has published a technical paper titled “ Predicting Attack Paths ” that describes how to leverage active and passive vulnerability discovery technology to identify in real-time Internet facing services, systems and clients on your network that can be exploited in a variety of scenarios.

Enhanced Botnet Detection with Nessus

by Ron Gula on March 22, 2012

Tenable’s Research team recently added the ability for Nessus to evaluate audited hosts to see if they are connected to or configured with a known botnet IP address. In this blog entry, we will review all of the features available within Nessus for botnet and malware detection, as well as the types of features that are available in other Tenable products.

Active and Passive Auditing of DNS Servers in Use – Finding DNSChanger Malware

by Ron Gula on March 5, 2012

Tenable’s Research team recently shipped a variety of Nessus plugins and Passive Vulnerability Scanner (PVS) PASL scripts that audit and detect the DNS servers in use on (and off) your network. These plugins and scripts are leveraged to find systems affected by DNSChanger malware, but they can also be used for a broader audit of DNS servers actively in use. This blog entry describes the new plugins and PASL scripts and how they can be used to audit active DNS servers in use.

Three Types of Client-side Exploits

by Ron Gula on February 28, 2012

We often hear about vulnerabilities in client software, such as web browsers and email applications, that can be exploited by malicious content. The repeated stories about botnets, infected web sites, and viruses which infect us with malicious documents, movies, and other content have ingrained the concept of an exploitable client in our minds. Unfortunately, client software can also be targeted with attacks from compromised servers accessed by the clients, and some client software actually listens for connections. In this blog entry, we will discuss auditing client software for vulnerabilities and describe the three different types of client-side exploits and how they can impact the risk of your network.

Using Nessus 5 to Raise the Value of Penetration Testing

by Ron Gula on February 23, 2012

Cross referencing the results of your vulnerability scans with the list of public exploits helps identify likely targets for authorized penetration testing teams. Removing these vulnerabilities significantly raises the value of a penetration test since the team will have to work much harder to find issues that aren’t found through automation. There are many subtle issues to consider when correlating available exploits with vulnerabilities. In this blog entry, we’ll highlight these issues by considering exploit correlation with attacks available from the Metasploit project, Core, and Immunity with the results of a very large Nessus scan of several thousand web servers.

Pages