Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Stephanie Dunn

Stephanie Dunn's picture
Stephanie Dunn is an Information Security Content Analyst at Tenable, developing our Dashboards, Reports and Assurance Report Cards (ARC’s). She specializes in Windows and Linux Administration with a focus in virtualization, endpoint protection, disaster recovery and enterprise security management. Prior to joining Tenable, Stephanie served as a Network Administrator and Information Security Officer for a government organization. She hold several certifications, including Certified Information Systems Security Professional (CISSP), GIAC Security Essentials (GSEC), and Microsoft Certified Solutions Expert (MCSE).
Blog Post
Wednesday, August 23, 2017

W ith the adoption of more cloud, mobile, IoT, and SaaS solutions, organizations need an effective way to understand, manage and reduce their cyber risk. Many organizations rely on patch...

SC Dashboard
Tuesday, August 22, 2017

To mitigate risks within the enterprise, many organizations use a combination of manual and automated solutions to deploy patches. This issue can result in organizations falling behind in their patch cycle and leave critical systems at risk. This dashboard provides a high-level overview of current and mitigated vulnerabilities that will enable security teams to quickly assess security risks and prioritize patch management efforts.

Blog Post
Friday, July 28, 2017

H aving a background as a system administrator, I know first-hand many of the challenges you face. As every organization has a unique set of business requirements, system administrators work...

Blog Post
Thursday, July 20, 2017

We receive many questions from customers on how to configure scans to audit their patch management solutions. Whether you have a few hundred or several thousand systems, patch management solutions...

SC Dashboard
Thursday, July 20, 2017

Despite lacking basic security features, devices that belong to the Internet of Things (IoT) are becoming increasingly present in enterprise settings. Without careful monitoring, IoT devices could be exploited by...

SC Dashboard
Thursday, July 6, 2017

Many security solutions within the enterprise often use both whitelisting and blacklisting technologies to allow or deny applications and processes to run. With the number of advanced persistent threats continuing to grow, malware and other malicious processes are being designed to evade security solutions and remain undetected. This dashboard will assist security teams in detecting and mitigating unknown processes running within the enterprise.

Blog Post
Wednesday, June 28, 2017

A s malware attacks continue to make headlines, many organizations struggle to stay ahead of the complex, evolving threat landscape. Attackers use both old and new ways to deliver malware...

Blog Post
Thursday, June 15, 2017

C ontainers have transformed the way organizations are deploying applications and services within their environments. While containers are lightweight and more efficient alternatives to virtual machines, they usually exist for...

SC Dashboard
Tuesday, May 2, 2017

Maintaining data privacy and security is a critical aspect of any comprehensive security program. Some organizations may not be completely aware of the types of data stored on the network...

SC Report Template
Tuesday, April 25, 2017

USB-based devices are commonly used within organizations to store or transfer data, and often connect to other networks and systems outside of the organization. Without proper security controls in place, these devices have the potential to inject malware or exfiltrate confidential data. This report presents a high-level summary of USB device activity, information on attached devices and previously connected devices.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.