Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Megan Daudelin

Megan Daudelin's picture
Megan Daudelin is an Information Security Content Analyst at Tenable, developing research content for SecurityCenter. Megan specializes in content related to digital forensics and incident response. Prior to joining Tenable, Megan worked as a security analyst and digital forensic analyst. She is a GIAC Certified Forensic Analyst (GCFA) and GIAC Certified Intrusion Analyst (GCIA).
SC Dashboard
Friday, September 9, 2016

Monitoring Apache web servers for vulnerabilities is essential to securing a network against exploitation. Apache HTTP servers are the one of the most used web server software worldwide, and as a result are a common target for attackers. The Apache Vulnerability Summary dashboard provides insight into vulnerabilities associated with Apache software and services that may expose an organization to increased risk of exploitation.

SC Report Template
Thursday, September 8, 2016

Monitoring enterprise management tools for vulnerabilities is essential to securing a network against exploitation. Enterprise management software is an essential part of managing and maintaining a secure network, but vulnerabilities in the tools can be catastrophic if exploited. The Enterprise Management Summary report provides insight into vulnerabilities associated with common enterprise management tools that may expose an organization to increased risk of exploitation.

SC Dashboard
Tuesday, September 6, 2016

Monitoring enterprise management tools for vulnerabilities is essential to securing a network against exploitation. Enterprise management software is an essential part of managing and maintaining a secure network, but vulnerabilities in the tools can be catastrophic if exploited. The Enterprise Management Summary dashboard provides insight into vulnerabilities associated with common enterprise management tools that may expose an organization to increased risk of exploitation.

SC Report Template
Wednesday, August 31, 2016

Monitoring desktop applications for vulnerabilities is essential to securing a network against exploitation. Desktop applications are essential to many computing tasks, and as a result are a common target for attackers. The Desktop Applications Summary report provides insight into vulnerabilities associated with common desktop applications that may expose an organization to increased risk of exploitation.

SC Dashboard
Tuesday, August 30, 2016

Monitoring desktop applications for vulnerabilities is essential to securing a network against exploitation. Desktop applications are essential to many computing tasks, and as a result are a common target for attackers. The Desktop Applications Summary dashboard provides insight into vulnerabilities associated with common desktop applications that may expose an organization to increased risk of exploitation.

SC Report Template
Tuesday, August 16, 2016

Many organizations do not have adequate incident response plans in place to deal with compromised machines and network devices. In order to perform incident response procedures, extensive information about the network and specific hosts impacted by the incident must be readily available. The Incident Response Support report provides access to extensive details about hosts on the network in order to effectively prepare security teams in case of an incident.

SC Dashboard
Friday, August 12, 2016

Many organizations do not have adequate incident response plans in place to deal with compromised machines and network devices. In order to perform incident response procedures, extensive information about the network and specific hosts impacted by the incident must be readily available. The Incident Response Support dashboard provides access to extensive details about hosts on the network in order to effectively prepare security teams in case of an incident.

SC Dashboard
Tuesday, August 9, 2016

Monitoring Adobe software for vulnerabilities is essential to securing a network against exploitation. Adobe software is essential to many computing tasks, and as a result is a common target for attackers. The Adobe Summary dashboard provides insight into vulnerabilities associated with Adobe software that may expose an organization to increased risk of exploitation.

SC Report Template
Thursday, August 4, 2016

Monitoring virtual computing technologies for vulnerabilities is essential to securing a network against exploitation. The pervasive implementation of virtual computing technologies complicates vulnerability management and remediation efforts. The Virtual Computing Summary report provides insight into vulnerabilities associated with various virtual computing technologies that may expose an organization to increased risk of exploitation.

SC Dashboard
Monday, August 1, 2016

Monitoring virtual computing technologies for vulnerabilities is essential to securing a network against exploitation. The pervasive implementation of virtual computing technologies complicates vulnerability management and remediation efforts. The Virtual Computing Summary dashboard provides insight into vulnerabilities associated with various virtual computing technologies that may expose an organization to increased risk of exploitation.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.