Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Protect Critical Infrastructure with Continuous Network Monitoring™

Organizations with Supervisory Control and Data Acquisition (SCADA) systems must protect themselves from an increasing number of threats from cyber-attacks and maintain compliance with strict regulatory requirements, including the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards.

Tenable's solutions help utilities ensure the safety of critical infrastructure by continuously monitoring for vulnerabilities, threats, and the compliance and security issues that their SCADA networks face.

Defend SCADA Networks with Continuous Network Monitoring

Scanning SCADA networks often runs the risk of impacting the stability of delicate controls systems. Tenable provides solutions, including SecurityCenter Continuous View™ (SecurityCenter CV™) and Nessus®, which monitor the state of these environments without the potential impact to the network.


Using Nessus, utilities have access to Digital Bond's Bandolier project, which has produced audit policies for Nessus and SecurityCenter™ users to test the configurations of many different types of Unix and Windows control system software.

Learn more

SecurityCenter Continuous View

Using SecurityCenter CV, utilities can:

  • Discover vulnerabilities, monitor traffic and watch events for indicators of compromise and unauthorized activity.
  • Audit operating systems, routers and application environments subject to NERC CIP, and gather the information in easy-to-read dashboards.
  • Utilize the Assurance Report Card™ to bridge the communication gap between business executives and security professionals by communicating the status of the most critical, automated security controls in an intuitive format.

As part of SecurityCenter CV, organizations can employ:

  • Passive Vulnerability Scanner™ (PVS™) to observe any IP-based control system network to monitor changes and trust relationships, discover assets and assess vulnerabilities without affecting network performance.
  • Log Correlation Engine™ (LCE™) to gather netflow, system logs, employee logins, intrusion detection events, file integrity information, and much more across enterprise networks and control system devices for aggregation, forensics, analysis, and correlation.

Learn more