Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Megan Daudelin

Megan Daudelin's picture
Megan Daudelin is an Information Security Content Analyst at Tenable, developing research content for SecurityCenter. Megan specializes in content related to digital forensics and incident response. Prior to joining Tenable, Megan worked as a security analyst and digital forensic analyst. She is a GIAC Certified Forensic Analyst (GCFA) and GIAC Certified Intrusion Analyst (GCIA).
SC Dashboard
Monday, June 20, 2016

With the growing number of threats against network infrastructures, many organizations still do not have an adequate patch management system in place. This can leave critical systems unpatched and vulnerable for a significant period of time till the next patch cycle, or till a manual patch is applied. The ISO/IEC27000: Vulnerability Management dashboard provides valuable information on outstanding vulnerabilities, mitigation progress, and opportunities to reduce risk.

SC Report Template
Monday, June 20, 2016

As Governance, Risk, and Compliance (GRC) measures continue to be adopted by organizations, security teams will continue to face challenges in properly managing the complex requirements from multiple regulations and standards. Some organizations continue to rely on manual processes or inadequate tools that do not provide the real-time data needed to properly identify and mitigate existing risks. The chapters within this report can assist in managing and maintaining compliance throughout all aspects of a network by providing an accurate, real-time look at an organization’s risk and compliance status.

SC Dashboard
Monday, June 13, 2016

Organizations take a lot of time to ensure that vulnerability scans are set up and running. Analysts have the challenge of ensuring that scans are not only scanning the appropriate systems, but also that systems are re-scanned for remediated vulnerability checks. With this dashboard, analysts can ensure that vulnerability scans are providing value to the organization and that systems are re-scanned on a consistent basis.

SC Report Template
Thursday, June 9, 2016

PCI DSS helps entities understand and implement standards for security policies, technologies and ongoing processes that protect their payment systems from breaches and theft of cardholder data. Any organization that handles payment card information has to comply with the PCI DSS and must show compliance annually. The PCI Continuous Monitoring report presents extensive data about the vulnerability and configuration status of the network based on the available data.

SC Report Template
Tuesday, June 7, 2016

PCI DSS helps entities understand and implement standards for security policies, technologies and ongoing processes that protect their payment systems from breaches and theft of cardholder data. Any organization that handles payment card information has to comply with the PCI DSS and must show compliance annually. The PCI Configuration Audit report presents extensive data about the configuration status of the network based on the available data.

SC Report Template
Friday, June 3, 2016

PCI DSS helps entities understand and implement standards for security policies, technologies and ongoing processes that protect their payment systems from breaches and theft of cardholder data. Any organization that handles payment card information has to comply with the PCI DSS and must show compliance annually. The PCI Internal Vulnerability Scanning report presents extensive data about the vulnerability status of the network based on the available data.

SC Dashboard
Wednesday, May 18, 2016

The interconnectedness of web application complicates vulnerability remediation and patch management efforts. By exploiting web application vulnerabilities, attackers can gain a foothold on the network and continue to spread their attack from within. Based on the best practices described in the DBIR, the Web Application Vulnerabilities dashboard helps security teams identify and understand vulnerabilities related to web servers and applications in their environment.

SC Report Template
Friday, April 15, 2016

Malicious process detection is essential to effectively securing an organization. Malicious processes can be indicative of misuse, intrusion, or infection and should be investigated immediately. The Malicious Process Detection report assists security teams with identifying vulnerabilities related to malicious processes.

SC Dashboard
Wednesday, April 13, 2016

On April 12, 2016, Microsoft and the Samba Core Team disclosed details about the Badlock vulnerability. Badlock is a critical security bug affecting Windows and Samba, which exposes systems to man-in-the-middle and denial of service attacks. The Badlock Discovery dashboard can assist organizations with identifying hosts and vulnerabilities related to Microsoft Windows SMB and Samba.

SC Report Template
Monday, April 4, 2016

Securing an environment against botnet activity is essential to network integrity. If a host is being exploited by a botnet, other hosts and data in the same network are especially vulnerable. The Enhanced Botnet Detection report assists security teams with monitoring the network for activity related to botnets.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.