Tenable Network Security Unveils Verizon 2015 Data Breach Report Dashboards for SecurityCenter Continuous View
July 21, 2015
Comprehensive dashboards help Tenable customers use Verizon DBIR insights to strengthen networks against cyber threats
Tenable Network Security®, Inc., the leader in continuous network monitoring, today announced five new SecurityCenter Continuous View™ dashboards based on Verizon’s 2015 Data Breach Investigations Report (DBIR).
The Verizon DBIR is one of the most anticipated reports each year because it analyzes and highlights common attack patterns and identifies how often an attack vector results in a successful breach. Still, many organizations struggle to incorporate the DBIR findings into their security programs due to the overhead required to sift through volumes of data.
With the new Verizon DBIR dashboards in SecurityCenter Continuous View, Tenable removes the burden of manually collecting and filtering data and automates this process through preconfigured DBIR dashboards focused on five key areas of risk. SecurityCenter CV customers can now evaluate their networks against critical threats and top vulnerabilities, take action to prevent compromise, and incorporate best practices to improve the health of their networks.
“CISOs and their supporting teams need a way to make the Verizon DBIR information actionable,” said Ron Gula, CEO, Tenable Network Security. “Tenable’s DBIR dashboards take advantage of SecurityCenter CV’s unique sensors and ability to automate complex, time-consuming tasks. Customers get increased visibility into their security status and are able to put the DBIR’s key recommendations and best practices to use.”
Customers who practice continuous network monitoring will be able to quickly identify indicators of compromise (IOCs) via active scanning, non-intrusive network activity monitoring, and event correlation from log analysis.
Tenable’s new DBIR dashboards focus on the following five themes:
Indicators of Compromise: Track IOCs such as virus signatures, specific traffic patterns, specific IP addresses, malware, specific URLs, or domains of known illicit activity using continuous network monitoring.
Account Weakness: Identify vulnerabilities related to accounts and credentials to thwart basic attacks and reduce the chance of a data breach by eliminating weak passwords, default accounts and outdated policies.
Vulnerabilities and Malware Collection: Missing patches with Common Vulnerabilities and Exposure (CVE) IDs accounted for a large number of exploits according to the DBIR. The vast majority of exploited vulnerabilities were compromised more than a year after the CVE was published. This dashboard identifies such vulnerabilities so that patches can be quickly and efficiently applied.
Browser Vulnerabilities: Understand vulnerabilities in web browsers including Firefox, Chrome, IE, Opera, and more. Using this dashboard, organizations can eliminate unauthorized web browsers, patch browser vulnerabilities and disable vulnerable plugins, thereby reducing the likelihood of a data breach.
Incident Pattern Monitoring: Organizations can reduce risk by monitoring for remote access, potential policy violations, anti-virus updates, data leakage, vulnerabilities, detected changes and suspicious activity.
“Data breach reports are interesting, but everyone wants to know what this means for their company and how their company compares,” said Christian A. Christiansen, program vice president of security products, IDC. “Tenable helps score those comparisons, identify the priorities, and suggests remediation. This is actionable guidance.”
For more information on each dashboard and how to use them, read the Tenable’s Continuous Network Monitoring and the Verizon DBIR whitepaper.
Stay up to date!
Subscribe to our email alerts for new press releases.