Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Unveils Verizon 2015 Data Breach Report Dashboards for SecurityCenter Continuous View

July 21, 2015

Columbia, MD

Comprehensive dashboards help Tenable customers use Verizon DBIR insights to strengthen networks against cyber threats

Tenable Network Security®, Inc., the leader in continuous network monitoring, today announced five new SecurityCenter Continuous View™ dashboards based on Verizon’s 2015 Data Breach Investigations Report (DBIR).

The Verizon DBIR is one of the most anticipated reports each year because it analyzes and highlights common attack patterns and identifies how often an attack vector results in a successful breach. Still, many organizations struggle to incorporate the DBIR findings into their security programs due to the overhead required to sift through volumes of data.

With the new Verizon DBIR dashboards in SecurityCenter Continuous View, Tenable removes the burden of manually collecting and filtering data and automates this process through preconfigured DBIR dashboards focused on five key areas of risk. SecurityCenter CV customers can now evaluate their networks against critical threats and top vulnerabilities, take action to prevent compromise, and incorporate best practices to improve the health of their networks.

“CISOs and their supporting teams need a way to make the Verizon DBIR information actionable,” said Ron Gula, CEO, Tenable Network Security. “Tenable’s DBIR dashboards take advantage of SecurityCenter CV’s unique sensors and ability to automate complex, time-consuming tasks. Customers get increased visibility into their security status and are able to put the DBIR’s key recommendations and best practices to use.”

Customers who practice continuous network monitoring will be able to quickly identify indicators of compromise (IOCs) via active scanning, non-intrusive network activity monitoring, and event correlation from log analysis.

Tenable’s new DBIR dashboards focus on the following five themes:

Indicators of Compromise:  Track IOCs such as virus signatures, specific traffic patterns, specific IP addresses, malware, specific URLs, or domains of known illicit activity using continuous network monitoring.

Account Weakness: Identify vulnerabilities related to accounts and credentials to thwart basic attacks and reduce the chance of a data breach by eliminating weak passwords, default accounts and outdated policies.

Vulnerabilities and Malware Collection: Missing patches with Common Vulnerabilities and Exposure (CVE) IDs accounted for a large number of exploits according to the DBIR. The vast majority of exploited vulnerabilities were compromised more than a year after the CVE was published. This dashboard identifies such vulnerabilities so that patches can be quickly and efficiently applied.

Browser Vulnerabilities: Understand vulnerabilities in web browsers including Firefox, Chrome, IE, Opera, and more. Using this dashboard, organizations can eliminate unauthorized web browsers, patch browser vulnerabilities and disable vulnerable plugins, thereby reducing the likelihood of a data breach.

Incident Pattern Monitoring: Organizations can reduce risk by monitoring for remote access, potential policy violations, anti-virus updates, data leakage, vulnerabilities, detected changes and suspicious activity. 

“Data breach reports are interesting, but everyone wants to know what this means for their company and how their company compares,” said Christian A. Christiansen, program vice president of security products, IDC. “Tenable helps score those comparisons, identify the priorities, and suggests remediation. This is actionable guidance.”

For more information on each dashboard and how to use them, read the Tenable’s Continuous Network Monitoring and the Verizon DBIR whitepaper.

About Tenable

Tenable™, Inc. is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and mid-sized organizations across the private and public sectors. Learn more at tenable.com.

Contact Information:

Cayla Baker
[email protected]
(443) 539-6476