Josef Weiss is a Senior Software Engineer at Tenable, and expertly tracks vulnerabilities, threats, and cybersecurity risks and manages processes & dependencies around detecting such events. Josef is also responsible for identifying new or potentially new threats (for example vulnerabilities or malware) and monitoring levels of threat activity. The typical day includes researching and documenting vulnerabilities and cyber-attacks, including techniques being used by responsible parties. This cyber intelligence is used to ensure that Tenable Research reacts appropriately to any new or existing threats. Prior to joining Tenable, Josef’s experience spanned over 19 years in information security. He has worked as a security engineer and architect for the Big 4, several major universities, large healthcare organizations and the telecommunications industry. Josef, who holds many certifications, is a Certified Information Systems Security Professional (CISSP), and a Python programmer.
A common implementation of firewalls is to protect network devices by analyzing data moving in and out of the organization, restricting unauthorized access, and malicious traffic. Monitoring the organization’s firewall solution ensures that the implementation is running smoothly. The Fortinet dashboard allows security administrators to view a status summary of the Fortinet device. This includes indicators for events, performance alerts, and connection activity in a single location within SecurityCenter.
A common implementation of firewalls is to protect network devices by analyzing data moving in and out of the organization, restricting unauthorized access and malicious traffic.Monitoring the organizations firewall solution ensures that the implementation is running smoothly. The Palo Alto Firewall dashboard allows security administrators to view a status summary of the Palo Alto firewall. This includes indicators for events, configuration audits, and NetFlow statistical graphs in a single location, within Tenable.sc.
Monitoring, profiling, and analyzing host alerts within the network can assist in determining if problems exist, policies should be updated, or abnormal activity is present. Systems and users identified by the Daily_Host_Alert LCE event are presented to the analyst to provide information on what devices and users are logging in and when. This report can assist organizations to understand when connections to the network are most likely to occur, making it easier to spot and track anomalies for devices or user accounts.
Applications are critical to a user’s ability to perform their daily tasks. Ultimately, an organization may have a wide variety of applications installed across many departments. This report helps organizations keep track of installed applications .
Applications are critical to a user’s ability to perform their daily tasks. Ultimately, an organization may have a wide variety of applications installed across many departments. This report helps organizations keep track of installed applications .
This report presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files that are being shared without the owner's permission. The entertainment industry has made their intentions clear, through the DMCA, that organizations will be liable for the actions of their employees. Organizations must be aware of what their users are doing, and take measures to identify and act on complaints of copyright infringement.
Identifying methods of ingress into the network via wireless access points is crucial to maintaining a successful security program. This Wireless Detections collection utilizes both active and passive methods to identify wireless access points and vulnerabilities found within the environment.
The Certificate Expiry Report provides details on SSL certificates within the environment that are expired, expiring in 60 days or less, or have not yet reached their validity period. Many times, expired certificates cause a loss of confidence in the trustworthiness of an organization or website. Maintaining certificate expiry is essential in providing trust to end users.
The IPv4 Systems with IPv6/Teredo Detected collection leverages a variety of Nessus credentialed and uncredentialed checks to identify IPv6 addresses configured on audited IPv4 devices. Devices with Teredo enabled are also displayed. Proper deployment of IPv6 is critical to reduce abuse or malicious activity.
Managing a large number of user accounts is a challenge for most organizations. Unused and unnecessary accounts could potentially lead to user sprawl, exploitation, or misuse. This report presents data on accounts with no logins and disabled accounts, along with Local and Domain user information.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Buy Tenable Lumin
Contact a sales representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Request a demo of Tenable Security Center
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable OT Security
Get the Operational Technology security you need.
Reduce the risk you don’t.
Request a demo of Tenable Identity Exposure
Continuously detect and respond to Active Directory attacks. No agents. No
privileges.
On-prem and in the cloud.
Request a demo of Tenable Cloud Security
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
See Tenable One in action
Exposure management for the modern attack surface.
See Tenable Attack Surface Management in action
Know the exposure of every asset on any platform.
Get a demo of Tenable Enclave Security
Please fill out the form with your contact information and a sales representative will contact you shortly to schedule a demo.
Thank You
Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
NEW - Tenable Nessus Expert now available
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].