Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Megan Daudelin

Megan Daudelin's picture
Megan Daudelin is an Information Security Content Analyst at Tenable, developing research content for SecurityCenter. Megan specializes in content related to digital forensics and incident response. Prior to joining Tenable, Megan worked as a security analyst and digital forensic analyst. She is a GIAC Certified Forensic Analyst (GCFA) and GIAC Certified Intrusion Analyst (GCIA).
SC Dashboard
Tuesday, October 13, 2015

Detecting and monitoring the vulnerability of mobile devices on a network is a constantly growing challenge. There is an increasing acceptance of employees bringing their personal mobile devices into the...

SC Report Template
Tuesday, October 6, 2015

Detecting the various operating systems on a network can be a daunting task. Understanding which operating systems connect to the network can improve a security team’s ability to mitigate vulnerabilities and secure the network. This report assists security teams in identifying the operating systems that are present on the network so that security initiatives can be more focused.

SC Dashboard
Tuesday, September 29, 2015

Discovering mobile devices on a network is a growing challenge. Bring-Your-Own-Device (BYOD) and enterprise mobile device programs are becoming commonplace and the need to manage these devices is increasing with this trend. By integrating SecurityCenter with implemented MDM platforms, organizations can more effectively monitor the presence of mobile devices in their network.

SC Report Template
Tuesday, September 22, 2015

Log monitoring is a daunting task that many organizations have difficulty tackling efficiently. For most organizations, the rate of log generation far exceeds the ability to of a security team...

SC Dashboard
Thursday, September 17, 2015

Log monitoring is a daunting task that many organizations have difficulty tackling efficiently. For most organizations, the rate of log generation far exceeds the ability to of a security team...

SC Report Template
Thursday, September 10, 2015

Vulnerability mitigation is a constantly moving target as new exploits are developed and new vulnerabilities are discovered. In order to effectively mitigate vulnerabilities on a network, a security team must...

SC Dashboard
Wednesday, September 9, 2015

File integrity monitoring is a key component of any information security program. Changes to configurations, files, and file attributes across the network are common, but the few that impact file...

SC Report Template
Thursday, September 3, 2015

Identifying methods of ingress into the network via wireless access points is crucial to maintaining a successful security program. This includes monitoring the deployment and status of authorized wireless access points as well as maintaining security by identifying rogue or unauthorized wireless access points. The Wireless Detections Report utilizes both active and passive methods to identify wireless access points and vulnerabilities found within the environment.

SC Report Template
Wednesday, September 2, 2015

The Social Network Activity Report provides high-level information about the use of social networking in an organization. A series of charts and tables illustrate the activity associated with popular social networking websites. This includes information about which subnets and IP addresses generate the most social network activity, the activity for different categories of social networking websites, hosts with extended periods of social network activity, and trend information about social network website access.

SC Report Template
Tuesday, August 25, 2015

IRS Publication 1075 – “Tax Information Security Guidelines for Federal, State, and Local Agencies 2014 Edition”, provides thorough guidance for organizations that deal with Federal Taxpayer Information (FTI). Tenable’s Tenable.sc Continuous View (CV) assists organizations in discovering compliance and vulnerability concerns on the network, assessing their impact, reporting on the results, and taking action to remediate issues. Tenable.sc CV provides the tools that state and local government agencies can use to meet and demonstrate FTI compliance.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.