Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Vulnerability Detail Report

by Josef Weiss
November 3, 2017

Vulnerability scanning and reporting are essential steps in evaluating and improving the security of a network. This report presents extensive data about detected vulnerabilities, their origin, and mitigation solutions required to remove them. Tenable.io can use this data to help security teams coordinate their risk mitigation efforts more effectively. By providing live discovery and continuous visibility of assets, Tenable.io helps teams accurately represent and communicate cyber risk to the business.

The information in this report is first summarized by host and severity to give a condensed snapshot of an organization’s attack surface. This glance at the current state of assets provides a solid overview for mitigation planning. Knowing which assets pose the greatest risk enables the establishment of vulnerability mitigation efforts to efficiently reduce that risk.

Understanding vulnerabilities in exact detail is important for both knowing how to mitigate risk and understanding how assets can be exploited. The detailed list presented in this report gives exact detail on vulnerabilities including how they were discovered, what about them is publicly known, and how to mitigate them. Each asset can be assessed and addressed using this detailed vulnerability information when planning risk mitigation.

Cyber Exposure helps analysts drive a new level of dialogue with the business. By knowing which areas of the business are secure or exposed, analysts can effectively measure the organization's cyber risk. Analysts can use the metrics provided by Tenable.io to determine how much and where to invest in order to reduce risk to an acceptable amount. Tenable.io is the first Cyber Exposure solution that provides key risk metrics that organizations need to measure risk exposure.

Chapters

Executive Summary - This chapter offers a look at the assets that pose the greatest risk, and a look at the number of assets with severe vulnerabilities. This information can be used as a starting point when identifying areas of risk by displaying the assets that require the most attention. Assets presented at the top of this summary have the greatest impact on risk reduction.

Vulnerabilities by Host - This chapter provides a detailed by-asset list that contains all of the information for every vulnerability on those assets. This data explains how a vulnerability was discovered during a scan, how that vulnerability can be used to attack an asset, and what solution is required to mitigate the risk. Administrators can refer to all of this information when performing their mitigation steps and consequently easily reduce environmental risk.

Category: 
Fix
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security