Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Vulnerability Trend Dashboard

by Sharon Everson
September 8, 2015

Vulnerability Trend Dashboard Screenshot

Vulnerability management is a key responsibility of any security team. By understanding the vulnerabilities a network faces, security teams can tailor mitigation and hardening strategies to be more effective. Nessus provides vulnerability scan information while the Nessus Network Monitor (NNM) continuously monitors network traffic for potential vulnerabilities. Tenable.sc Continuous View (CV) has the ability to monitor vulnerability information detected by Nessus and NNM.

The components in the Vulnerability Trend dashboard present trend data about new detected vulnerabilities on the network. This includes information such as 25-day trends of new vulnerabilities by severity, exploitability, CVSS score, and external network connections. Each of these trend charts calculates their data points every 24 hours to provide the most accurate data possible. Also displayed are matrices that track vulnerabilities by time range, operating system, severity, and exploitability. These components can help an organization understand the vulnerability status of their network and provide insight into areas that may require additional attention.

The Vulnerability Trend dashboard monitors detected vulnerabilities on an organization’s network. By increasing visibility into the vulnerability status of their network, security teams can focus mitigation strategies accordingly. The trend data informs security teams where to focus their efforts in order to better defend their network. By monitoring the change in detected vulnerabilities, security teams can adjust their efforts as needed in order to mitigate the greatest vulnerabilities.

This dashboard also provides a view of which exploit frameworks pose the greatest threat to the network. This information can provide insight into determining where and how to tailor mitigation efforts against these risks. This information is filtered based on the detected vulnerability having an exploit available in order to focus on the most significant threats. The trend data also provides a view on the effectiveness of mitigation efforts over time. Together, these components can be used to determine whether security efforts are working effectively and where improvements can be made.

The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable.sc Feed under the category Threat Detection & Vulnerability Assessments.

The dashboard requirements are:

  • Tenable.sc 4.8.2
  • NNM 5.9.0
  • Nessus 8.6.0
  • This dashboard requires “Full Text Search” to be enabled for each analyzed repository.

Tenable.sc CV provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. By integrating with Nessus and NNM, Tenable.sc CV provides the most comprehensive view of vulnerability data.

Listed below are the included components:

  • Vulnerability Trend - Severity Matrix: This component displays counts of vulnerabilities observed in the past 24 hours, 7 days, and 30 days. The columns display vulnerability counts by severity level and a percentage bar shows the ratio of exploitable vulnerabilities. This component provides insight into whether detected vulnerabilities are exploitable as well as whether mitigation efforts are effective over time.
  • Vulnerability Trend - Vulnerabilities by Operating System: This matrix presents counts of vulnerabilities by operating system. The rows filter on CPE and can be easily customized for any platforms in the network. The columns display vulnerability counts by severity and a percentage bar shows the ratio of exploitable vulnerabilities. This information is useful in understanding which operating systems present the greatest threat to network security so that hardening efforts can be focused as necessary.
  • Vulnerability Trend - New Vulnerabilities by Severity - Past 25 Days: This area chart illustrates the trend of vulnerabilities by severity level over the past 25 days. The data presented is based on vulnerabilities observed in a 24-hour span and these counts are updated daily. This trend data is useful in describing the vulnerability status of the network as well as whether security has been increasing or decreasing over time.
  • Vulnerability Trend - New Exploitable Vulnerabilities - Past 25 Days: This area chart shows the trend of exploitable vulnerabilities over the past 25 days. Trends for seven exploit frameworks are displayed, along with an overall exploitable trend. The data presented is based on vulnerabilities observed in a 24-hour span. This component helps analysts to understand which exploit frameworks their network is most susceptible to in addition to whether hardening efforts against various frameworks are effective over time.
  • Vulnerability Trend - New Vulnerabilities by CVSS Score - Past 25 Days: This area chart illustrates the trend of vulnerabilities by CVSS score over the past 25 days. The score ranges for medium, high, and critical severity vulnerabilities are displayed. This trend data provides another lens for describing the vulnerability status of the network as well as whether security has been increasing or decreasing over time.
  • Vulnerability Trend - New Internet-Facing Vulnerabilities - Past 25 Days: This area chart depicts newly detected vulnerabilities on devices that have external network connections. This detection is based on the "external access" tag in the plugin output that is generated when external network connections to an internal device are detected. These trends are displayed by severity over the past 25 days. The component helps depict the vulnerability status of devices that may be particularly susceptible to attack due to their external network connections.
tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Tenable.io Web Application Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web Application Scanning trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.cs Cloud Security.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable.io Container Security

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try Tenable Lumin

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable.io Vulnerability Management, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable.cs

Enjoy full access to detect and fix cloud infrastructure misconfigurations and view runtime vulnerabilities. Sign up for your free trial now.

Your Tenable.cs Cloud Security trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.io Web Application Scanning.

Contact a Sales Rep to Buy Tenable.cs

Contact a Sales Representative to learn more about Tenable.cs Cloud Security and see how easy it is to onboard your cloud accounts and get visibility into both cloud misconfigurations and vulnerabilities within minutes.

Try Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Promotional pricing extended until December 31st.
Buy a multi-year license and save more.

Add Support and Training