Vulnerability Management Platform

June 30, 2017
The latest release of the cloud-based Tenable.io platform from Tenable Network Security helps organizations understand and reduce cyber risk to both traditional and modern assets.

Powered by Nessus sensors and third party data collection technologies, the platform provides asset discovery and vulnerability identification across the entire elastic attack surface — IT, cloud, OT and IoT — within a single platform. It enables DevOps processes by providing visibility into the security of container images as they are created. Through integration with the container build process, it provides vulnerability assessment, malware detection and policy enforcement prior to container deployment. Nessus Network Monitor passively analyzes network traffic to provide continuous visibility into managed and unmanaged assets on the network, including IT, OT and IoT assets. It includes new capabilities for asset discovery and vulnerability identification on critical infrastructure and embedded systems, such as ICS and SCADA systems, which require a non-intrusive approach to vulnerability management, providing coverage for operational technologies in such safety-critical infrastructure industries as oil and gas, energy, utilities, public infrastructure, manufacturing, and medical/healthcare. Supported protocols include Bacnet, CIP, DNP3, Ethernet/IP, Modbus/TCP, Siemens S7, ICCP, IEC 60870-5-104, IEEE C37.118, OpenSCADA, and more. The platform includes pre-built scan templates for identifying systems exposed to all Shadow Brokers exploits, including WannaCry, EternalRocks and any new versions of these attacks, as well as a check for the recent Intel AMT vulnerability (INTEL-SA-00075). In addition, Web Application Scanning safely and automatically scans web applications to accurately identify vulnerabilities.

>>For more information on this product, click here
Tenable
www.tenable.com
410.872.0555

Sponsored Recommendations

Rock Quarry Implements Ignition to Improve Visibility, Safety & Decision-Making

George Reed, with the help of Factory Technologies, was looking to further automate the processes at its quarries and make Ignition an organization-wide standard.

Water Infrastructure Company Replaces Point-To-Point VPN With MQTT

Goodnight Midstream chose Ignition because it could fulfill several requirements: data mining and business intelligence work on the system backend; powerful Linux-based edge deployments...

The Purdue Model And Ignition

In the automation world, the Purdue Model (also known as the Purdue reference model, Purdue network model, ISA 95, or the Automation Pyramid) is a well-known architectural framework...

Creating A Digital Transformation Roadmap Using A Unified Namespace

Digital Transformation has become one of the most popular buzzwords in the automation industry, often used to describe any digital improvements to industrial technology. But what...