Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Delivers New Solution for Unknown and Shadow Assets Solution to Eliminate Blind Spots Across Complex IT Environments

February 29, 2016

Columbia, MD

With advanced asset discovery capabilities, companies can now discover and secure known and unknown assets – whether mobile, on-premise or in the cloud

Tenable Network Security, Inc., a global leader transforming security technology for the business needs of tomorrow, announced a new solution for Unknown and Shadow Assets at RSA Conference 2016. Through active scanning, intelligent connectors and continuous listening, Tenable’s solution helps organizations discover all assets in their environment, bringing unknown and shadow assets into their security program.

“Mobile devices, cloud services and virtualized infrastructure make it easy for employees to bring new devices or applications onto the network without the IT department ever noticing,” said Ron Gula, CEO, Tenable Network Security. “This exposes the organization to increased risk by creating blind spots in the security posture and potentially leaving critical systems open to compromise and breach. Tenable’s Unknown and Shadow Assets solution provides the continuous visibility and critical context CISOs need to find unknown and shadow IT , improving security posture across the entire enterprise.”

Unlike traditional security solutions that fall short on delivering complete visibility across all endpoints and infrastructure, Tenable’s Unknown and Shadow Assets solution leverages the unique capabilities in the award-winning SecurityCenter Continuous View™ (SecurityCenter CV™). Active scanning periodically examines assets to determine risk levels, intelligent connectors integrate security data from existing security investments to improve context, and continuous listening monitors all network traffic in real time for known and unknown assets, arming organizations to take decisive action against complex threats and achieve true security assurance — including mobile, on-premises and cloud.

“One of the biggest challenges associated with the increasingly distributed nature of corporate IT environments is the lack of visibility associated with off-network activities and SaaS traffic,” said Robert Westervelt, information security analyst, IDC. “IDC has found that organizations often underestimate the number of SaaS-based services introduced by employees and used as part of their daily workflow. Some of the riskiest cloud services hog valuable network resources and expose employees to phishing attacks, ransomware infections, and other threats. Sanctioned cloud services are also a challenge because CISOs increasingly don't have visibility into how corporate data flows from the network to multiple cloud resources. As companies gradually migrate resources to the cloud, identifying and monitoring these services is another critical piece of establishing and maintaining situational awareness.”

With ActiveSync and Mobile Device Management (MDM) integration, Tenable simplifies identification and security monitoring of transient devices, such as laptops, and mobile devices, like smartphones and tablets. Tenable’s passive traffic and event monitoring capabilities detect and profile all devices, services and applications in use. By determining the relationships among assets and assessing them for vulnerabilities in near-real time, Tenable provides the critical context to help organizations make informed decisions for effective and timely response.

"SecurityCenter has really helped us making better decisions about asset control and dealing with shadow IT," said James Kahl, CCNA and Network Administrator at Methodist Healthcare Ministries of South Texas, Inc., the largest, private funding source of healthcare services for the uninsured in South Texas. "It's easy to miss systems as you grow or as people leave if you're trying to track everything manually but with SecurityCenter, we automatically know as systems come and go from our network."

To schedule a demo or for more information on how to defend your network against unknown assets and shadow devices, visit tenable.com/solutions/shadow-assets.

 

Stay up to date!

Subscribe to our email alerts for new press releases.

Subscribe for press release updates

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.