Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Megan Daudelin

Megan Daudelin's picture
Megan Daudelin is an Information Security Content Analyst at Tenable, developing research content for SecurityCenter. Megan specializes in content related to digital forensics and incident response. Prior to joining Tenable, Megan worked as a security analyst and digital forensic analyst. She is a GIAC Certified Forensic Analyst (GCFA) and GIAC Certified Intrusion Analyst (GCIA).
SC Report Template
Thursday, October 27, 2016

Monitoring common office applications for vulnerabilities is essential to securing a network against exploitation. Office suite software is essential to organizations of all sizes, and as a result is a target for attackers. The Office Suite Vulnerability Summary report provides insight into vulnerabilities associated with common office product vendors that may expose an organization to increased risk of exploitation.

Blog Post
Wednesday, October 19, 2016

<div class="lightgray"> <p class="nom"><strong>Note:</strong> Tenable SecurityCenter is now Tenable.sc. To learn more about this application and its latest capabilities, visit the <a href=" https://www.tenable.com/products/tenable-sc">Tenable.sc</a> web page.</p> </div> <p></p> <p><span class="dropcap">P</span>rioritizing...

SC Dashboard
Monday, October 17, 2016

Perimeter defenses can no longer be solely relied upon to protect internal assets, as additional defensive measures must be in place to protect against attackers who have already breached the perimeter. This dashboard aligns with Section VI of the ANSSI 40 Essential Measures for a Healthy Network guide: Secure the Inside of the Network. Using this dashboard, the organization will be alerted to internal network product and protocol vulnerabilities, access control and least privilege issues, and wireless network concerns.

SC Dashboard
Tuesday, October 4, 2016

Monitoring common office applications for vulnerabilities is essential to securing a network against exploitation. Office suite software is essential to organizations of all sizes, and as a result is a target for attackers. The Office Suite Vulnerability Summary dashboard provides insight into vulnerabilities associated with common office product vendors that may expose an organization to increased risk of exploitation.

SC Dashboard
Wednesday, September 28, 2016

Uninterruptible power supplies (UPS) ensure that no data is lost on critical systems in the event of a power outage. As a part of an organization’s critical infrastructure, monitoring UPS systems for vulnerabilities and functionality is imperative. The UPS Management dashboard provides insight into vulnerabilities and events associated with UPS systems.

SC Report Template
Friday, September 23, 2016

Monitoring HP software for vulnerabilities is essential to securing a network against exploitation. HP software is becoming more commonplace in organizations, and as a result are more regularly targeted by attackers. The HP Vulnerabilities Summary report provides insight into vulnerabilities associated with HP software that may expose an organization to increased risk of exploitation.

SC Dashboard
Tuesday, September 20, 2016

Monitoring HP software for vulnerabilities is essential to securing a network against exploitation. HP software is becoming more commonplace in organizations, and as a result are more regularly targeted by attackers. The HP Vulnerabilities Summary dashboard provides insight into vulnerabilities associated with HP software that may expose an organization to increased risk of exploitation.

SC Report Template
Friday, September 16, 2016

Monitoring Apple software for vulnerabilities is essential to securing a network against exploitation. Apple software is becoming more commonplace in organizations, and as a result are more regularly targeted by attackers. The Apple Vulnerability Summary report provides insight into vulnerabilities associated with Apple software that may expose an organization to increased risk of exploitation.

SC Dashboard
Wednesday, September 14, 2016

Monitoring Apple software for vulnerabilities is essential to securing a network against exploitation. Apple software is becoming more commonplace in organizations, and as a result are more regularly targeted by attackers. The Apple Vulnerabilities Summary dashboard provides insight into vulnerabilities associated with Apple software that may expose an organization to increased risk of exploitation.

SC Report Template
Monday, September 12, 2016

Monitoring Apache web servers for vulnerabilities is essential to securing a network against exploitation. Apache HTTP servers are the one of the most used web server software worldwide, and as a result are a common target for attackers. The Apache Vulnerability Summary report provides insight into vulnerabilities associated with Apache software and services that may expose an organization to increased risk of exploitation.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.