Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Delivers New Solution for Unknown and Shadow Assets Solution to Eliminate Blind Spots Across Complex IT Environments

February 29, 2016

Columbia, MD

With advanced asset discovery capabilities, companies can now discover and secure known and unknown assets – whether mobile, on-premise or in the cloud

Tenable Network Security, Inc., a global leader transforming security technology for the business needs of tomorrow, announced a new solution for Unknown and Shadow Assets at RSA Conference 2016. Through active scanning, intelligent connectors and continuous listening, Tenable’s solution helps organizations discover all assets in their environment, bringing unknown and shadow assets into their security program.

“Mobile devices, cloud services and virtualized infrastructure make it easy for employees to bring new devices or applications onto the network without the IT department ever noticing,” said Ron Gula, CEO, Tenable Network Security. “This exposes the organization to increased risk by creating blind spots in the security posture and potentially leaving critical systems open to compromise and breach. Tenable’s Unknown and Shadow Assets solution provides the continuous visibility and critical context CISOs need to find unknown and shadow IT , improving security posture across the entire enterprise.”

Unlike traditional security solutions that fall short on delivering complete visibility across all endpoints and infrastructure, Tenable’s Unknown and Shadow Assets solution leverages the unique capabilities in the award-winning SecurityCenter Continuous View™ (SecurityCenter CV™). Active scanning periodically examines assets to determine risk levels, intelligent connectors integrate security data from existing security investments to improve context, and continuous listening monitors all network traffic in real time for known and unknown assets, arming organizations to take decisive action against complex threats and achieve true security assurance — including mobile, on-premises and cloud.

“One of the biggest challenges associated with the increasingly distributed nature of corporate IT environments is the lack of visibility associated with off-network activities and SaaS traffic,” said Robert Westervelt, information security analyst, IDC. “IDC has found that organizations often underestimate the number of SaaS-based services introduced by employees and used as part of their daily workflow. Some of the riskiest cloud services hog valuable network resources and expose employees to phishing attacks, ransomware infections, and other threats. Sanctioned cloud services are also a challenge because CISOs increasingly don't have visibility into how corporate data flows from the network to multiple cloud resources. As companies gradually migrate resources to the cloud, identifying and monitoring these services is another critical piece of establishing and maintaining situational awareness.”

With ActiveSync and Mobile Device Management (MDM) integration, Tenable simplifies identification and security monitoring of transient devices, such as laptops, and mobile devices, like smartphones and tablets. Tenable’s passive traffic and event monitoring capabilities detect and profile all devices, services and applications in use. By determining the relationships among assets and assessing them for vulnerabilities in near-real time, Tenable provides the critical context to help organizations make informed decisions for effective and timely response.

"SecurityCenter has really helped us making better decisions about asset control and dealing with shadow IT," said James Kahl, CCNA and Network Administrator at Methodist Healthcare Ministries of South Texas, Inc., the largest, private funding source of healthcare services for the uninsured in South Texas. "It's easy to miss systems as you grow or as people leave if you're trying to track everything manually but with SecurityCenter, we automatically know as systems come and go from our network."

To schedule a demo or for more information on how to defend your network against unknown assets and shadow devices, visit tenable.com/solutions/shadow-assets.


About Tenable

Tenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 20 percent of the Global 2000 and large government agencies. Learn more at tenable.com.

Contact Information:

Cayla Baker
[email protected]
(443) 539-6476

Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.