Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Stephanie Dunn

SC Report Template
Tuesday, February 21, 2017

Red Hat Enterprise Linux (RHEL) is a commercially supported and highly scalable Linux distribution that supports virtualization, open source software, and a variety of hardware platforms. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden RHEL operating systems. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Red Hat Benchmarks.

SC Report Template
Thursday, February 16, 2017

As infrastructure demands evolve to support cloud, mobile, and virtualization needs, many organizations continue to rely on Microsoft Windows servers to support business requirements. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden Windows Server operating systems. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Microsoft Windows Server Benchmarks.

SC Report Template
Thursday, February 9, 2017

Windows workstations remain one of the most popular client systems used within modern networks. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden Windows operating systems. Data presented within these report templates includes a high-level overview of results gathered from CIS compliance scans using the CIS Microsoft Workstation Benchmarks.

SC Report Template
Tuesday, February 7, 2017

Vulnerabilities can be found in every part of an organization’s infrastructure including routers, servers, firewalls, firmware, and software. Many of these vulnerabilities can include exploits that can allow for attackers to gain control over critical systems and data, and pivot to other systems across the enterprise. This report provides a summary of the exploitable vulnerabilities passively detected by Nessus Network Monitor (NNM), which can be used to compare the effectiveness of patch management efforts, and whether existing security controls need to be modified.

SC Report Template
Thursday, February 2, 2017

As the threat landscapes continue to evolve, many organizations struggle to adapt and respond to these threats in a timely manner. Unfortunately, these changes have also introduced additional security risks that many organizations have failed to properly account for. Failing to monitor changes in network assets, security policies and controls, and user account privileges will lead to an increase risk of critical systems and data being compromised.

SC Dashboard
Tuesday, January 31, 2017

As organizations continue to adapt to the demands of a mobile workforce, controls need to be in place to provide a secure way to remotely access, connect, and exchange information without compromising network security. These devices are usually running outdated operating systems, and contain vulnerabilities that can spread malware, leak confidential data, and infect other network assets. This dashboard aligns NIST 800-53 guide that will assist analysts in managing mobile devices, tracking portable devices, and monitoring usage of cloud-based services.

SC Report Template
Monday, January 30, 2017

As more organizations continue to move towards a cloud-based environment, many are utilizing Docker containers to deploy systems and applications quickly without additional overhead. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden operating systems and applications. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Docker Benchmarks.

SC Report Template
Friday, January 27, 2017

As networks continue to become increasingly complex and interconnected, many organizations struggle to maintain a secure enterprise. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden network devices and appliances. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Cisco Benchmarks.

SC Dashboard
Thursday, January 26, 2017

Organizations will always have a certain number of vulnerabilities and risks present within their environment. Without having a clear and continuous view of existing vulnerabilities, organizations will struggle to identify and respond to threats in a timely manner. Information presented within this dashboard will provide organizations with the actionable intelligence needed to improve overall security posture and protect critical assets.

SC Dashboard
Tuesday, January 24, 2017

One of the primary reasons why organizations are breached is due to the lack of proper access controls in place. Failure to monitor these changes can result in a large number of accounts with excessive privileges that can provide both attackers or malicious insiders access to critical systems and data. This dashboard aligns with the NIST 800-53 controls that support enforcing access controls, managing user and group changes, and ensuring least privileges.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.