Do you know that the rapid pace of innovation has created a rapidly changing attack surface, with DevOps teams in the driver’s seat and security as an afterthought? Modern computing and software development practices are driving the adoption of a new set of dynamic IT assets, including cloud, microservices and containers.
On the other end of the spectrum are Operational Technology (OT) assets, including industrial control systems (ICS) and supervisory control and data acquisition (SCADA). These safety-critical systems were designed for precision and reliability, not built with security in mind.
Find out more from Tenable Network Security, as it delivers the first vulnerability management platform to unify IT and OT security across the full range of traditional and modern assets
Tenable Delivers the First Vulnerability Management
Platform to Unify IT and OT Security Across the Full Range of Traditional and
Modern Assets
Platform to Unify IT and OT Security Across the Full Range of Traditional and
Modern Assets
Expanded Tenable.io platform incorporates Nessus
Network Monitor alongside new container and web application security products
for improved discovery and vulnerability management of operational technology
assets including ICS/SCADA
Network Monitor alongside new container and web application security products
for improved discovery and vulnerability management of operational technology
assets including ICS/SCADA
Singapore, June 29, 2017 — Tenable Network Security®, Inc., a global leader in cybersecurity, today announced the latest
release of its cloud-based Tenable.io™ platform, delivering new and enhanced
capabilities to empower organizations to understand and reduce their cyber risk
across the full range of traditional and modern assets.
release of its cloud-based Tenable.io™ platform, delivering new and enhanced
capabilities to empower organizations to understand and reduce their cyber risk
across the full range of traditional and modern assets.
Modern computing and
software development practices are driving the adoption of a new set of dynamic
IT assets, including cloud, microservices and containers. The rapid pace of
innovation has created a rapidly changing attack surface, with DevOps teams in
the driver’s seat and security as an afterthought. On the other end of the
spectrum are Operational Technology (OT) assets, including industrial control
systems (ICS) and supervisory control and data acquisition (SCADA). These
safety-critical systems were designed for precision and reliability, not built
with security in mind.
software development practices are driving the adoption of a new set of dynamic
IT assets, including cloud, microservices and containers. The rapid pace of
innovation has created a rapidly changing attack surface, with DevOps teams in
the driver’s seat and security as an afterthought. On the other end of the
spectrum are Operational Technology (OT) assets, including industrial control
systems (ICS) and supervisory control and data acquisition (SCADA). These
safety-critical systems were designed for precision and reliability, not built
with security in mind.
OT assets, coupled
with the rise of the internet of things (IoT) where everything from pacemakers
to automobiles are now connected devices, have exploded the attack surface to a
point beyond control. Organizations need a way to discover all of these assets
and manage vulnerabilities holistically, yet have been forced to use legacy
scanning and agent-based tools designed for the world of traditional IT. These
old approaches do not fit in the modern world of IT, or the world of OT and IoT
where a non-intrusive approach to asset discovery and vulnerability detection
is required.
with the rise of the internet of things (IoT) where everything from pacemakers
to automobiles are now connected devices, have exploded the attack surface to a
point beyond control. Organizations need a way to discover all of these assets
and manage vulnerabilities holistically, yet have been forced to use legacy
scanning and agent-based tools designed for the world of traditional IT. These
old approaches do not fit in the modern world of IT, or the world of OT and IoT
where a non-intrusive approach to asset discovery and vulnerability detection
is required.
“Massive shifts in
computing have left enterprises struggling to gain visibility into their
exposure areas. The rise of IoT and the convergence of IT and OT are only compounding
the issue,” said Dave Cole, chief product officer at Tenable. “The
vulnerability management tools of yesterday are falling short in providing
CISOs with a complete and reliable view of the entire modern attack surface so
they can take a proactive approach to managing the security challenges of today
andtomorrow.”
computing have left enterprises struggling to gain visibility into their
exposure areas. The rise of IoT and the convergence of IT and OT are only compounding
the issue,” said Dave Cole, chief product officer at Tenable. “The
vulnerability management tools of yesterday are falling short in providing
CISOs with a complete and reliable view of the entire modern attack surface so
they can take a proactive approach to managing the security challenges of today
andtomorrow.”
With Tenable.io, for
the first time organizations have complete and centralized visibility over the
full range of traditional and modern assets. Powered by Nessus sensors and
third party data collection technologies, Tenable.io provides the industry’s
greatest breadth and sophistication of asset discovery and vulnerability
identification across the entire elastic attack surface – spanning IT, cloud,
OT and IoT – all within a single platform. Only Tenable.io arms security teams
and chief information security officers (CISOs) with the visibility required to
understand cyber risk across the entire attack surface at the pace of
innovation and digital transformation.
the first time organizations have complete and centralized visibility over the
full range of traditional and modern assets. Powered by Nessus sensors and
third party data collection technologies, Tenable.io provides the industry’s
greatest breadth and sophistication of asset discovery and vulnerability
identification across the entire elastic attack surface – spanning IT, cloud,
OT and IoT – all within a single platform. Only Tenable.io arms security teams
and chief information security officers (CISOs) with the visibility required to
understand cyber risk across the entire attack surface at the pace of
innovation and digital transformation.
New and Enhanced
Capabilities of the Tenable.io Platform:
Capabilities of the Tenable.io Platform:
General Availability
of Tenable.io Container Security
of Tenable.io Container Security
Tenable.io Container
Security seamlessly and securely enables DevOps processes by providing
visibility into the security of container images as they are created. Through
integration with the container build process, it provides vulnerability
assessment, malware detection and policy enforcement prior to container
deployment — enabling security teams to turn a blind spot into a
strength. Request a free
trial of Tenable.io Container
Security.
Security seamlessly and securely enables DevOps processes by providing
visibility into the security of container images as they are created. Through
integration with the container build process, it provides vulnerability
assessment, malware detection and policy enforcement prior to container
deployment — enabling security teams to turn a blind spot into a
strength. Request a free
trial of Tenable.io Container
Security.
Nessus Network
Monitor Support for IT, OT and IoT Assets
Monitor Support for IT, OT and IoT Assets
Nessus Network
Monitor (formerly Passive Vulnerability Scanner or PVS) passively analyzes
network traffic to provide continuous visibility into managed and unmanaged
assets on the network, including IT, OT and IoT assets. It includes
new capabilities for asset discovery and vulnerability identification on
critical infrastructure and embedded systems, such as ICS and SCADA systems,
which require a non-intrusive approach to vulnerability management. Nessus
Network Monitor provides coverage for operational technologies in a variety of
safety-critical infrastructure industries, including oil and gas, energy,
utilities, public infrastructure, manufacturing, and medical/healthcare. Supported protocols
include Bacnet, CIP, DNP3, Ethernet/IP, Modbus/TCP, Siemens S7, ICCP, IEC
60870-5-104, IEEE C37.118, OpenSCADA, and more. Request a free trial of Nessus
Network Monitor.
Monitor (formerly Passive Vulnerability Scanner or PVS) passively analyzes
network traffic to provide continuous visibility into managed and unmanaged
assets on the network, including IT, OT and IoT assets. It includes
new capabilities for asset discovery and vulnerability identification on
critical infrastructure and embedded systems, such as ICS and SCADA systems,
which require a non-intrusive approach to vulnerability management. Nessus
Network Monitor provides coverage for operational technologies in a variety of
safety-critical infrastructure industries, including oil and gas, energy,
utilities, public infrastructure, manufacturing, and medical/healthcare. Supported protocols
include Bacnet, CIP, DNP3, Ethernet/IP, Modbus/TCP, Siemens S7, ICCP, IEC
60870-5-104, IEEE C37.118, OpenSCADA, and more. Request a free trial of Nessus
Network Monitor.
Shadow Brokers,
WannaCry and Intel AMT Scan Policy Templates
WannaCry and Intel AMT Scan Policy Templates
Tenable.io includes
pre-built scan templates for identifying systems exposed to all Shadow Brokers
exploits, including WannaCry, EternalRocks and any new versions of these
attacks, as well as a check for the recent Intel AMT vulnerability
(INTEL-SA-00075). Take control of your network and protect against these and
future threats with a free 60-day trial of Tenable.io Vulnerability Management
at https://www.tenable.com/products/tenable-io/vulnerability-management/evaluate.
pre-built scan templates for identifying systems exposed to all Shadow Brokers
exploits, including WannaCry, EternalRocks and any new versions of these
attacks, as well as a check for the recent Intel AMT vulnerability
(INTEL-SA-00075). Take control of your network and protect against these and
future threats with a free 60-day trial of Tenable.io Vulnerability Management
at https://www.tenable.com/products/tenable-io/vulnerability-management/evaluate.
Tenable.io Web
Application Scanning
Application Scanning
Tenable.io Web
Application Scanning, a new product within the Tenable.io platform that safely
and automatically scans web applications to accurately identify
vulnerabilities, will be generally available on July 14, 2017. To learn
more, visittenable.com/products/tenable-io/web-application-scanning.
Application Scanning, a new product within the Tenable.io platform that safely
and automatically scans web applications to accurately identify
vulnerabilities, will be generally available on July 14, 2017. To learn
more, visittenable.com/products/tenable-io/web-application-scanning.
For more
information, visit Tenable at Infosecurity Europe, booth F160, or Gartner
Security & Risk Management Summit, booth 203
information, visit Tenable at Infosecurity Europe, booth F160, or Gartner
Security & Risk Management Summit, booth 203
For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!