Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Michael Willison

Information Security Content Analyst

SC Report Template
Thursday, March 12, 2015

Often a Sophos analyst would like to know what type of Sophos events are occurring on the network. SecurityCenter can query the Log Correlation Engine (LCE) to discover which Sophos events were detected on the network. By performing these queries, an analyst can determine the type of activity that Sophos services are seeing on the network.

SC Dashboard
Thursday, February 19, 2015

Applications running on Windows systems that continuously crash or hang can be difficult to identity. Hangs and crashes can be the result of hardware, software, or malware issues. SecurityCenter Continuous View (CV) can monitor and report termination, hang, fault, and failure process events.

SC Report Template
Thursday, February 12, 2015

In many cases, malware, virus, and adware activities on the network can be detected by an endpoint solution. Understanding the virus threat attack surface on the network will help an analyst determine what threats are attempting to attack systems. SecurityCenter Continuous View (CV), in conjunction with the Log Correlation Engine (LCE), can provide a report for the types of viruses, malware, and/or adware detected by Sophos Endpoint security protection.

SC Dashboard
Thursday, February 5, 2015

What viruses, spyware, and/or adware are being detected by Sophos Endpoint security protection? Understanding the virus threat landscape on the network will help an analyst determine what threats are attempting to attack systems. SecurityCenter Continuous View (CV), in conjunction with the Log Correlation Engine (LCE), provides a single location to display virus event activities detected by Sophos.

SC Dashboard
Friday, December 19, 2014

Often a Sophos analyst would like to know what type of Sophos events are occurring on the network. SecurityCenter can query the Log Correlation Engine (LCE) to discover which Sophos events were detected on the network. By performing these queries, an analyst can determine the type of activity that Sophos services are seeing on the network.

SC Dashboard
Friday, November 7, 2014

The Criminal Justice Information System (CJIS) Security Policy was created by the Federal Bureau of Investigation (FBI) to provide guidance to organizations dealing with Criminal Justice Information (CJI). Tenable’s SecurityCenter Continuous View (CV) assists organizations in discovering compliance and vulnerability concerns on the network, assessing their impact, reporting on the results, and taking action to remediate issues. SecurityCenter CV provides proactive continuous monitoring across the organization to assist in responding to existing CJIS compliance requirements, as well as preparing for any changes to requirements that may arise in the future.

SC Dashboard
Friday, September 26, 2014

Governance, Risk Management, and Compliance (GRC) is a substantial part of any information assurance program. A GRC requires information systems to be audited, regardless of the standard to which the audit is performed. These dashboards provide the audit results for Check Point GAiA, FireEye, Fortigate, Palo Alto, and SonicWALL.

SC Report Template
Friday, September 12, 2014

This report provides information on how encryption is used on the wire and at rest. There are six chapters for this report: Executive Summary, Encryption Session Tunnels, Data Leakage Alarms, Encryption on the Wire, Encryption at Rest, and Encryption on Port Traffic.

SC Report Template
Friday, September 5, 2014

Governance, Risk Management, and Compliance is a substantial part of any information assurance program. The GRC requires information systems to be audited, regardless of the standard to which the audit is performed. These reports provide the audit results for NetApp Data ONTAP and Brocade FabricOS.

SC Report Template
Friday, August 29, 2014

Governance, Risk Management, and Compliance is a substantial part of any information assurance program. The GRC requires information systems to be audited, regardless of the standard to which the audit is performed. These report provide the audit results for Unix, Unix File Contents, and SCAP Audits for Linux.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.