February 18, 2014
Organizations Turning to Continuous Monitoring to Close the Gaps Left by Traditional Vulnerability Management
Tenable Network Security®, Inc., the leader in real-time vulnerability and threat management, today announced the results of a February 2014 commissioned study conducted by Forrester Consulting on behalf of Tenable entitled "Close the Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring." Surveying top security professionals at leading organizations, the study found that traditional vulnerability management solutions are unnecessarily exposing most to security threats that could be mitigated through continuous monitoring (CM).
Continuous Monitoring Plugs the Gaps
Continuous monitoring, whose roots lie with the U.S. government, addresses many of the challenges faced by traditional vulnerability management solutions and offers CISOs and security leaders across sectors a near real-time view into the security posture of their respective institutions. The survey found that organizations that implemented continuous monitoring are more than twice as likely to be satisfied with their vulnerability management approach compared to those who use periodic scanning. Additionally, Forrester asked the 45 percent of respondents who had adopted CM to explain the benefits. They said that continuous monitoring:
- Benefits all stages of vulnerability management
- Benefits all verticals
- Better equips organizations to deal with a mobile workforce
- Benefits those with a risk focused VM program the most
- Satisfies the CISO more than any other role
The Threat Landscape Overwhelms Traditional Vulnerability Management
Consumerization, mobility, and cloud are the hallmarks of the extended enterprise and periodic snapshot vulnerability scanning cannot effectively address the dynamic nature of today's extended enterprise environments. While this has catapulted vulnerability management as one of the top concerns for organizations – 86 percent of respondents rate it as their second highest IT security priority for the next 12 months – they remain concerned with effectively lowering their organization's risk of compromise. Specifically, organizations struggle to establish effective vulnerability management practices, leaving them exposed to attacks. The study found that:
- Nearly 74 percent of the surveyed respondents experienced challenges with their overall VM program
- 79 percent claimed they were more likely to miss critical vulnerabilities due to insufficient data to narrow down appropriate endpoints for scanning
- 70 percent scan monthly or less
"The survey shows that although organizations use periodic vulnerability scans, it's simply not enough," explained Ron Gula, CEO and CTO of Tenable Network Security. "In today's environment of mobile, cloud and BYOD, the extended enterprise poses particular challenges, and organizations are finding it difficult to make traditional vulnerability management work for them. The need for security that covers 100 percent of assets all the time has never been more apparent than with the recent series of successful breaches."
Organizations Struggle to Establish Effective Vulnerability Management Practices
Maintaining a consistent and effective vulnerability management workflow emerged as a major concern with 77 percent of respondents having concerns about accurate asset discovery. The explosion of transient endpoints compounds the difficulties of discovering all an organization's assets and greatly increases the likelihood of an effective breach if unknown assets are not identified and assessed properly. Furthermore, 66 percent stated they were not confident in conducting proper vulnerability remediation. Once scans returned the data, they did not feel they had a clear picture of the risks in order to accurately prioritize and take action.
"Periodic vulnerability scans have failed the modern-day CISO," said Gula. "Breaches are still occurring at an alarming rate, and the threat landscape is ever-evolving. The goal for any CISO is to remain ahead of the threat curve, and the only way to do this is through adopting a continuous monitoring platform. This enables users to rapidly deploy patches to shut down these threats in hours not months, so that dangerous windows of opportunity get shut before business-critical data is compromised."
Webinar on Findings
To learn more about the February 2014 commissioned study conducted by Forrester Consulting on behalf of Tenable entitled "Close the Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring," join Ron Gula, CEO of Tenable Network Security, and guest Rick Holland, principal analyst with Forrester Research. Inc. on Wednesday, February 19, at 11:00 a.m. PST / 2:00 EST. For more information on the webinar and to register, please visit this URL.
The Forrester Consulting Study sponsored by Tenable Network Security is available at: http://www.tenable.com/whitepapers/close-the-gaps-left-by-traditional-vulnerability-management-through-continuous.
Tenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 20 percent of the Global 2000 and large government agencies. Learn more at tenable.com.