Whitepapers

Real-Time Compliance Monitoring

Tenable Network Security, Inc. serves customers worldwide and each of our customers has a unique set of audit and compliance requirements. This paper provides insights gained from Tenable's customers on measuring and reporting compliance audit issues in a wide variety of industries.

Extending Vulnerability Management to Virtualized Infrastructure and Cloud Computing with Tenable

Technologies such as virtualization and cloud-delivered services offer the benefits of hardware consolidation and rapid provisioning and deployment. However, they also bring security and compliance challenges that break traditional vulnerability management solutions. The dynamic nature and rapid provisioning of virtual systems and cloud-delivered services leaves huge security gaps with periodic vulnerability scanning.

Controlling IT Risk in Financial Institutions

One of the challenges financial institutions face is an annual audit to demonstrate compliance to Federal Financial Institutions Examination Council (FFIEC) requirements. This can be difficult when there is a very large volume of data to analyze that comes from a rapidly increasing number of sources. Correlating data from all these sources, each with their own unique security threats, is necessary to accurately identify risks and demonstrate compliance.

Real-Time FISMA Compliance Monitoring

Tenable Network Security, Inc. serves customers worldwide and each of our customers has a unique set of audit and compliance requirements. This paper provides insights gained from Tenable's customers on measuring and reporting compliance audit issues in a wide variety of industries.

Network Infrastructure is Not Immune

Network devices including firewalls and routers are the gatekeepers to "endpoint" resources and increasingly rely on complex software components. These devices are often remotely accessible and whose configuration changes regularly, making them susceptible to vulnerabilities and misconfigurations. To add to this, network and security teams are often separate parts of an organization often leading to incomplete understanding of vulnerable infrastructure.

Real-Time Auditing for the 20 Critical Security Controls

Tenable Network Security, Inc. was founded on the belief that it is crucial to monitor for compliance in a manner as close to real-time as possible to ensure the organization does not drift out of compliance over time. The greater the gap between monitoring cycles, the more likely it is for compliance violations to occur undetected. Tenable’s solutions can be customized for a particular organization’s requirements and then automatically provide a unified view of the security status through a single management interface that is continually updated with the latest information.

Outcome Based Security Monitoring in a Continuous Monitoring World

Technology has advanced sufficiently enough such that vulnerability management can be performed in near real-time at large scale. Because of this, outcome based security monitoring for large enterprises is now possible with "big data" types of analytics. This paper goes into five detailed steps for achieving continuous monitoring.

SSL: A False Sense of Security?

The Secure Sockets Layer (SSL) protocol has become the backbone of secure network communications, protecting everything from employee remote access, email, file transfer, and systems administration traffic to all of an organization’s e-commerce transactions. But is the security SSL/TLS provides real, or just an illusion?

IPv6 Requires Fundamental Change to Vulnerability Management Programs

This paper addresses the need for today’s organizations to actively manage and secure their computing environments relative to IPv6 systems and traffic, regardless of whether they are actively implementing the protocol. In addition, we will demonstrate how Tenable’s SecurityCenter platform delivers unmatched situational awareness and security for IPv6-enabled resources and the network traffic they generate.

Pages