Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Megan Daudelin

Megan Daudelin's picture
Megan Daudelin is an Information Security Content Analyst at Tenable, developing research content for SecurityCenter. Megan specializes in content related to digital forensics and incident response. Prior to joining Tenable, Megan worked as a security analyst and digital forensic analyst. She is a GIAC Certified Forensic Analyst (GCFA) and GIAC Certified Intrusion Analyst (GCIA).
SC Report Template
Wednesday, July 27, 2016

Monitoring web technologies for vulnerabilities is essential to securing a network against exploitation. The interconnectedness of web technologies complicates vulnerability management and remediation efforts. The Web Technologies Summary report provides insight into vulnerabilities associated with various web technologies that may expose an organization to increased risk of exploitation.

SC Dashboard
Monday, July 25, 2016

Monitoring web technologies for vulnerabilities is essential to securing a network against exploitation. The interconnectedness of web technologies complicates vulnerability management and remediation efforts. The Web Technologies Summary dashboard provides insight into vulnerabilities associated with various web technologies that may expose an organization to increased risk of exploitation.

SC Dashboard
Monday, June 27, 2016

User accounts are necessary to allow users to perform their assigned duties. Analysts need to be able to monitor and protect user accounts for not only the needs of the organization but to also adhere with PCI security requirements. This dashboard can assist security teams with monitoring access control measures and adhering to PCI requirements.

SC Report Template
Wednesday, June 22, 2016

Monitoring Unix and Linux hosts for vulnerabilities is an essential piece of securing a network. Various distributions can be susceptible to different vulnerabilities, so understanding which Unix or Linux distributions are used in the environment is important. The Unix and Linux Distribution Vulnerabilities report assists security teams with monitoring Unix and Linux hosts within their network.

SC Dashboard
Monday, June 20, 2016

As changes to devices, policies, files, and folders occur on a daily basis, many organizations often lose track of changes that can leave a network vulnerable to attack. The smallest change can lead to system outages, data loss, and can add unwanted security risks and increased costs for an organization. The ISO/IEC27000 Change Control Management dashboard can assist the organization in monitoring device, software, and network change control events.

SC Report Template
Monday, June 20, 2016

As Governance, Risk, and Compliance (GRC) measures continue to be adopted by organizations, security teams will continue to face challenges in properly managing the complex requirements from multiple regulations and standards. Some organizations continue to rely on manual processes or inadequate tools that do not provide the real-time data needed to properly identify and mitigate existing risks. The chapters within this report can assist in managing and maintaining compliance throughout all aspects of a network by providing an accurate, real-time look at an organization’s risk and compliance status.

SC Dashboard
Monday, June 13, 2016

Organizations take a lot of time to ensure that vulnerability scans are set up and running. Analysts have the challenge of ensuring that scans are not only scanning the appropriate systems, but also that systems are re-scanned for remediated vulnerability checks. With this dashboard, analysts can ensure that vulnerability scans are providing value to the organization and that systems are re-scanned on a consistent basis.

SC Report Template
Friday, June 3, 2016

PCI DSS helps entities understand and implement standards for security policies, technologies and ongoing processes that protect their payment systems from breaches and theft of cardholder data. Any organization that handles payment card information has to comply with the PCI DSS and must show compliance annually. The PCI Internal Vulnerability Scanning report presents extensive data about the vulnerability status of the network based on the available data.

SC Dashboard
Wednesday, May 18, 2016

The interconnectedness of web application complicates vulnerability remediation and patch management efforts. By exploiting web application vulnerabilities, attackers can gain a foothold on the network and continue to spread their attack from within. Based on the best practices described in the DBIR, the Web Application Vulnerabilities dashboard helps security teams identify and understand vulnerabilities related to web servers and applications in their environment.

SC Report Template
Friday, April 15, 2016

Malicious process detection is essential to effectively securing an organization. Malicious processes can be indicative of misuse, intrusion, or infection and should be investigated immediately. The Malicious Process Detection report assists security teams with identifying vulnerabilities related to malicious processes.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.