Carole Fennelly got her first Unix login in 1980 on a PDP 11/70 running PWB Unix, moved on to testing phone switches at Bell Labs and for the next 10 years was a Unix Systems Administrator on various Unix distros before moving on to consulting as a systems and security administrator in the Manhattan Financial sector for the next 15 years. In 2006, Ron Gula convinced her to join his little start-up, Tenable, to help build out technical content that aligned with Tenable products. During this time, she also authored some of the Center for Internet Security (CIS) Solaris and Red Hat benchmarks, which are used globally as configuration standards to secure IT systems. As a CISO advisor, Carole provided strategic guidance and executive level support and services for Fortune 500 clients in the financial sector before rejoining Tenable as a Senior Security Content Engineer to leverage her skills to provide the CISO perspective to Tenable content. [email protected] https://www.linkedin.com/in/cfennelly/ @carole_fennelly
The Tenable Cyber Insurance Report provides measurements for the foundation of a cyber risk management program for organizations. Organizations applying for cyber insurance are required to provide underwriters supporting evidence data that demonstrates the strength of their cybersecurity and risk management programs. Tenable.io provides organizations the ability to demonstrate risk management maturity with insurance companies.
On November 3rd, 2021, CISA issued Binding Operational Directive (BOD) 22-01, Reducing the Significant Risk of Known Exploited Vulnerabilities which requires federal agencies to identify and remediate a CISA managed catalog of known exploited vulnerabilities on their information systems. This dashboard showcases mitigation of these vulnerabilities to ensure a reduced attack surface in the organization.
The proliferation of unsupported and end-of-life (EOL) products is a common security problem experienced across all organizations. As applications and operating systems reach EOL, vendors stop offering support, causing security and stability to decrease over time. This dashboard provides organizations with a clear and simplified method to identify EOL software and enables security managers to predict where risk will increase to develop a mitigation plan.
Organizations are typically overwhelmed with data that must be analyzed to determine the organization’s risk exposure. This dashboard helps prioritize remediation efforts by presenting lists of top hosts in various categories. The widgets on this dashboard leverage vulnerability scan information from Tenable.io Vulnerability Management (Nessus, NNM), Tenable Web Application Security (WAS), and Tenable.cs.
A compromised processor is one of the most serious attack vectors on any platform. The hardware bugs known as Spectre and Meltdown affect modern processors by accessing information found in the system's memory. The Spectre and Meltdown dashboard provides insight into which systems are affected by these hardware bugs.
Common exploit frameworks are easy to obtain and are used by security researchers and malicious attackers. Security analysts can effectively reduce risk to the organization by analyzing an exploit’s source tool and the most common targets.
Information Security Managers often face a difficult choice of what problem to solve first. With operational commitments conflicting with security risks from software vulnerabilities, do they apply the patch or take some focus on operations? This dashboard helps managers understand prioritize vulnerabilities remediation.
Addressing vulnerable services is a key step in reducing network risk. Vulnerable services may allow malicious actors to infiltrate the network, compromise assets, and exfiltrate information. This dashboard presents vulnerability information by common TCP ports and services identify potentially vulnerable services.
New digital platforms and development shifts have rapidly moved from concept to capability. Tracking updates for the constantly changing landscape of assets is important to identify legacy code and asset footprint. This dashboard focuses on legacy patches and assets to reduce management effort and reactive firefighting.
Identifying both the current vulnerabilities and the vulnerabilities that have been mitigated provides IT managers an accurate picture of the health of their organization's network. Tenable.io uses the “Vulnerability State” attribute to track vulnerabilities at various stages, such as new vulnerabilities and vulnerabilities that have been fixed. This dashboard provides summary information of mitigation efforts.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Buy Tenable Lumin
Contact a sales representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Request a demo of Tenable Security Center
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable OT Security
Get the Operational Technology security you need.
Reduce the risk you don’t.
Request a demo of Tenable Identity Exposure
Continuously detect and respond to Active Directory attacks. No agents. No
privileges.
On-prem and in the cloud.
Request a demo of Tenable Cloud Security
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
See Tenable One in action
Exposure management for the modern attack surface.
See Tenable Attack Surface Management in action
Know the exposure of every asset on any platform.
Get a demo of Tenable Enclave Security
Please fill out the form with your contact information and a sales representative will contact you shortly to schedule a demo.
Thank You
Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
NEW - Tenable Nessus Expert now available
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].