Stephanie Dunn is a Staff Cloud Security Engineer at Tenable, where she specializes in cloud security administration and architecture. She holds several certifications, including Certified Information Systems Security Professional (CISSP) and AWS Certified Security – Specialty certification.
Along with traditional assets, dynamic assets such as mobile devices, containers, and cloud-based solutions are changing the way organizations deal with vulnerability management. To manage these effectively, you need a streamlined way to assess your organization’s existing security posture.
Organizations use patch management systems to monitor systems, install software, and patch systems on a network. Failure to account for vulnerabilities on devices and systems missed by patch management solutions can lead to increased risks for the organization. This dashboard presents a summary of vulnerabilities reported by Symantec Altiris, which can be used to determine whether vulnerabilities are being patched effectively.
Red Hat Enterprise Linux (RHEL) is a commercially supported and highly scalable Linux distribution that supports virtualization, open source software, and a variety of hardware platforms. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden RHEL operating systems. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Red Hat Benchmarks.
As infrastructure demands evolve to support cloud, mobile, and virtualization needs, many organizations continue to rely on Microsoft Windows servers to support business requirements. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden Windows Server operating systems. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Microsoft Windows Server Benchmarks.
Windows workstations remain one of the most popular client systems used within modern networks. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden Windows operating systems. Data presented within these report templates includes a high-level overview of results gathered from CIS compliance scans using the CIS Microsoft Workstation Benchmarks.
Vulnerabilities can be found in every part of an organization’s infrastructure including routers, servers, firewalls, firmware, and software. Many of these vulnerabilities can include exploits that can allow for attackers to gain control over critical systems and data, and pivot to other systems across the enterprise. This report provides a summary of the exploitable vulnerabilities passively detected by Nessus Network Monitor (NNM), which can be used to compare the effectiveness of patch management efforts, and whether existing security controls need to be modified.
As the threat landscapes continue to evolve, many organizations struggle to adapt and respond to these threats in a timely manner. Unfortunately, these changes have also introduced additional security risks that many organizations have failed to properly account for. Failing to monitor changes in network assets, security policies and controls, and user account privileges will lead to an increase risk of critical systems and data being compromised.
As organizations continue to adapt to the demands of a mobile workforce, controls need to be in place to provide a secure way to remotely access, connect, and exchange information without compromising network security. These devices are usually running outdated operating systems, and contain vulnerabilities that can spread malware, leak confidential data, and infect other network assets. This dashboard aligns NIST 800-53 guide that will assist analysts in managing mobile devices, tracking portable devices, and monitoring usage of cloud-based services.
As more organizations continue to move towards a cloud-based environment, many are utilizing Docker containers to deploy systems and applications quickly without additional overhead. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden operating systems and applications. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Docker Benchmarks.
As networks continue to become increasingly complex and interconnected, many organizations struggle to maintain a secure enterprise. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden network devices and appliances. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Cisco Benchmarks.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Buy Tenable Lumin
Contact a sales representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Request a demo of Tenable Security Center
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable OT Security
Get the Operational Technology security you need.
Reduce the risk you don’t.
Request a demo of Tenable Identity Exposure
Continuously detect and respond to Active Directory attacks. No agents. No
privileges.
On-prem and in the cloud.
Request a demo of Tenable Cloud Security
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
See Tenable One in action
Exposure management for the modern attack surface.
See Tenable Attack Surface Management in action
Know the exposure of every asset on any platform.
Get a demo of Tenable Enclave Security
Please fill out the form with your contact information and a sales representative will contact you shortly to schedule a demo.
Thank You
Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
NEW - Tenable Nessus Expert now available
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].