Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Vulnerability Top Ten Executive Report

by Andrew Freeborn
January 27, 2016

Organizations have commonly faced vulnerabilities present in user applications such as Java, Flash and Microsoft Office. Local software installations require time on a continual basis for analysts and administrators to remediate associated vulnerabilities. Operating system vulnerabilities will always be a focus of remediation efforts, but client-side vulnerabilities also continue to be a constant source of risk to the organization.

The landscape of a modern organization includes vulnerabilities from known sources such as operating systems and client-side software. However, mobile devices and hardware appliances are also potential sources of vulnerabilities. As organizations continue the path of routine remediation of operating system and client-side vulnerabilities, other threats may continue to linger in the organization. This report can assist analysts by giving executive-level information about the top vulnerabilities in the organization. Using this report, analysts and management can quickly see information relevant to the organization to help assist them identify and properly deal with vulnerabilities.

Different network segments can consist of different software and hardware, which can introduce unique opportunities for vulnerability remediation. This report contains information on how to help analysts identify networks with the most vulnerabilities. Analysts can use this information to work within the confines of the network segment to better address vulnerabilities specific to that network segment. In the past, a basic ranking of all vulnerabilities in the entire environment may have masked vulnerabilities affecting a specific network segment that may be more impactful to the organization if known.

This report can assist analysts in efforts of vulnerability remediation and risk mitigation. Analysts are able to get different snapshots of the vulnerability data in the organization that may not have been previously seen. Traditional vulnerability remediation efforts may have fixated analysts to routine and expected tasks. This report can be used to help analysts discover different threats in an ever-changing environment. Many networks continue to evolve and change to meet the goals of organizations.

This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. This report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are:

  • Tenable.sc 4.8.2
  • Nessus 8.6.0
  • NNM 5.9.0

Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Tenable's family of products includes Tenable.sc Continuous View (CV), Nessus and Nessus Network Monitor (NNM). Tenable.sc CV performs log normalization from hundreds of unique data sources. Nessus is the global standard in detecting and assessing network data. NNM provides deep packet inspection to continuously discover and track users, applications, cloud infrastructures, trust relationships, and vulnerabilities.

This report contains the following chapters:

  • Executive Summary: This chapter provides an overview of various vulnerabilities in the organization
  • Top 10 Remediations: This chapter presents a list of the top 10 remediations for the network
  • Top 10 Exploitable Vulnerabilities: This chapter displays the top 10 exploitable vulnerabilities on the network
  • Top 10 Mobile Vulnerabilities: This chapter displays the top 10 vulnerabilities of mobile devices on the network
  • Top 10 Data Leaks: This chapter displays the top 10 indications of possible data leakage on the network
Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.