Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Vulnerabilities Over 30 Days Dashboard

by Andrew Freeborn
December 2, 2015

Many organizations have a difficult time keeping software completely up to date with patches due to the frequency in which they are released. Outstanding vulnerabilities can be exploited by attackers, which can result in business outages or loss of revenue. This dashboard identifies hosts in the organization with vulnerabilities published more than 30 days ago.

Despite best intentions, not all vulnerabilities are patched on a constant basis throughout the organization. For example, analysts may find vulnerabilities through active scanning or passive monitoring, but may not have the immediate resources or time to address the issues found. Vulnerabilities increase risk to the organization and could be responsible for business outages, data leakage, or loss of revenue without remediating the issues. Having this dashboard helps to keep analysts informed of vulnerabilities in the environment that have been published more than 30 days ago. Not only are vulnerabilities present in the organization listed, but analysts also get detailed information about the vulnerabilities and how to remediate the issues found. From this information, analysts can work with administrators to quickly remediate the vulnerabilities and reduce the risk in the organization.

As this dashboard can provide a comprehensive view of vulnerabilities on the network, information is provided in different views. A count of hosts with vulnerabilities is helpful, but may not help prioritize efforts for remediation. Analysts can quickly see the vulnerabilities that are exploitable, have a high CVSS rating, or affect a large number of hosts. Resources can be better utilized when they are effectively remediating hosts in the organization by using a risk-focused approach.

This dashboard combines active scanning capabilities provided by Nessus and passive monitoring capabilities provided by the Passive Vulnerability Scanner (PVS). Organizations may not be able to continually scan the complete environment with Nessus for reasons such as limited access to remote networks or internal scan policies. These scenarios may offer a way for Nessus Agents to assist in this regard by providing vulnerability information to SecurityCenter. Using Nessus Agents along with active scanning and passive monitoring can help organizations focus on remediating vulnerabilities regardless of the organizational structure.

The dashboard and its components are available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the SecurityCenter Feed under the category Threat Detection & Vulnerability Assessments. The dashboard requirements are:

  • SecurityCenter 4.8.2
  • Nessus 6.4.3
  • PVS 4.4.0

Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View (CV), Nessus and PVS. SecurityCenter CV performs log normalization from hundreds of unique data sources. Nessus is the global standard in detecting and assessing network data. PVS provides deep packet inspection to continuously discover and track users, applications, cloud infrastructures, trust relationships, and vulnerabilities.

This dashboard contains the following components:

  • Hosts With Vulnerabilities Published 30 Days Ago: The Hosts With Vulnerabilities Published 30 Days Ago component displays a list of hosts with detected vulnerabilities that have been published over 30 days ago
  • Severity Levels of Vulnerabilities Published 30 Days Ago: The Severity Levels of Vulnerabilities Published 30 Days Ago component provides an overview of both active and passive vulnerabilities detected in the environment
  • Top Exploitable Vulnerabilities Published 30 Days Ago: The Top Exploitable Vulnerabilities Published 30 Days Ago component displays a listing of vulnerabilities with publicly available exploits that have been published over 30 days ago
  • Trend of Exploitable Vulnerabilities Published 30 Days Ago: The Trend of Exploitable Vulnerabilities Published 30 Days Ago component displays vulnerabilities over the last 50 days that have a published date of over 30 days ago
  • CVSS Scores of Vulnerabilities Published 30 Days Ago: The CVSS Scores of Vulnerabilities Published 30 Days Ago component displays a matrix of both active and passive vulnerabilities grouped by CVSS score
  • Detected Vulnerabilities Published 30 Days Ago: The Detected Vulnerabilities Published 30 Days Ago component displays vulnerabilities that have a published date more than 30 days ago
Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.