Stephanie Dunn is a Staff Cloud Security Engineer at Tenable, where she specializes in cloud security administration and architecture. She holds several certifications, including Certified Information Systems Security Professional (CISSP) and AWS Certified Security – Specialty certification.
Most organizations today utilize removable devices for convenience and productivity, however many may not be controlling portable device use or even be aware of what devices are being used. Any type of relaxed, insecure, or nonexistent security policies that an organization has will increase the potential for data leakage, along with the number of threats and attacks against a network. This dashboard provides valuable information on connected Windows based removable devices, removable device history, and audit checks on removable media.
Data leakage happens when organizations lose track of where sensitive data is stored, the flow of sensitive data traversing the network, and who had access to that data. Incidents can increase the risk of identity theft, stolen account information, and leakage of sensitive internal data, which can be costly and damaging to an organization’s reputation and business. This dashboard aligns with the NIST Cybersecurity Framework (CSF) PR.DS-1, PR.DS-2 and PR.DS-5 subcategories that allow an organization to monitor its network for data leakage, as well as detect vulnerabilities and activity on the network that could lead to data leakage.
Compliance and regulatory changes can be challenging for any organization to manage effectively. Not only do organizations have to keep systems updated with the latest patches, systems also need to be hardened to reduce the attack surface.
This dashboard aligns with the NIST Cybersecurity Framework (CSF) PR.IP-1, PR.IP-7 and ID.GV-3 subcategories, which provide a series of system configuration, compliance, and device hardening checks, along with specific industry standards and regulation checks.
As the popularity of Apple products continues to grow within organizations, so has the adoption of the Apple Mac OS X systems into enterprise environments. This has also been fueled by changes in the mobile workforce, and the need for a flexible and mobile environment for employees has become essential. Many mobile workers access corporate resources from remote networks, which can potentially introduce viruses and malware into a corporate network. Macs are just as vulnerable to malware as any other platform, and the need for an organization to proactively monitor systems for vulnerabilities and protect against malware infections is vital. The Mac OS X Security dashboard provides details on installed Mac-based software, identifies Mac OS X versions, and detects OS X and software vulnerabilities.
Patch management is one of the most important and essential components in protecting a network from vulnerabilities. Network assets that have unpatched or outdated software can leave critical systems vulnerable, which can result in stolen confidential data, compromised personally identifiable information (PII), and seized control of critical systems. Government agencies have an added responsibility in protecting the integrity of critical network infrastructures. Attackers have used increasingly sophisticated methods to gain unauthorized entry into government networks that can severely impact government operational and/or mission readiness
In a constantly changing threat landscape, risk will always be present. Many organizations employ a variety of devices and technologies to identify potential threats, but fall short in identifying the potential risks. Risk is the potential that a threat will exploit a vulnerability to cause harm to an organization. Risk management involves determining those risks with the greatest impact and greatest probability of occurring, and handling those first. The Understanding Risk report can assist an organization in understanding and managing their risk by identifying vulnerabilities on the network, and presenting details to assist the organization in understanding the risks the vulnerabilities might present.
Patches are released on a daily basis, and organizations need to ensure the timely patching of vulnerabilities in order to maintain confidentiality, integrity and availability of network systems. Management is also responsible for monitoring remediation efforts and keeping abreast of current and mitigated vulnerabilities. This report presents data on patch management rates, and provides trend analysis across various time frames on a network.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Thank you for your interest in Tenable Web App Scanning. A representative will be in touch soon.
Request a demo of Tenable Security Center
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable OT Security
Get the Operational Technology security you need.
Reduce the risk you don’t.
Request a demo
Don’t wait for an attack--eliminate risks before they’re exploited.
Uncover hidden weaknesses
Stop threats before they strike
Simplify security
Secure hybrid environments
Request a demo of Tenable Cloud Security
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
See Tenable One in action
Exposure management for the modern attack surface.
See Tenable Attack Surface Management in action
Know the exposure of every asset on any platform.
Get a demo of Tenable Enclave Security
Please fill out the form with your contact information and a sales representative will contact you shortly to schedule a demo.
Thank You
Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
NEW - Tenable Nessus Expert now available
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].
Get a demo of Tenable Patch Management
Interested in streamlining security and IT collaboration and shortening the mean time to remediate with automation? Try Tenable Patch Management.