0% found this document useful (0 votes)
68 views2 pages

Data Sheet - Tenable - SC Continuous View

Uploaded by

Crystal Prueba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views2 pages

Data Sheet - Tenable - SC Continuous View

Uploaded by

Crystal Prueba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

“It’s a home-run with an all-in-one Tenable solution that enables me to

prioritize security risks and assess security posture of my enterprise TENABLE RESEARCH
based on business objectives at any time.”
The Tenable Research team provides frequent updates of
- Healthcare Service Provider vulnerability and threat intelligence, advanced analytics,
security/compliance policies and dashboards/reports to all Tenable.sc
VULNERATBILITY MANAGEMENT customers. This out-of-the box content is based on industry and
customer best practices gathered by Tenable, putting the power of our
MANAGED ON-PREM security research team at your disposal. This content is part of the
Tenable.sc subscription.
Changing IT landscapes and evolving cyber threats have made periodic
scanning and compliance audits insufficient to protect businesses
against modern cyberattacks. To keep your network safe, you need a KEY BENEFITS
vulnerability management solution that gives you complete visibility into
your attack surface so you can manage and measure your cyber risk.

Built on leading Nessus technology, Tenable.scTM Continuous View is a • Always know when new or changed assets alter your
market-leading Cyber Exposure platform, managed on-prem, that gives attack surface
you a comprehensive picture of your network. You get real-time,
continuous assessment of your security and compliance posture so you • Gain broad visibility across your IT infrastructure,
can discover unknown assets and vulnerabilities, monitor unexpected including endpoints, servers, databases, mobile
network changes and prioritize weaknesses to minimize your cyber risk devices, domain controllers, network devices, virtual
and prevent breaches. It is the only solution that brings together applications and the cloud
discovery of on premises and cloud-based assets, active and passive
vulnerability assessment, configuration auditing, change detection, • See what others miss with visibility into transient,
malware detection, threat intelligence, analysis of network and user difficult to reach and unsafe to scan systems
activity and vulnerability prioritization.
• Prioritize vulnerabilities with the greatest impact, and
understand the likelihood a given vulnerability will be
exploited in the next 28 days, using the Tenable
Vulnerability Priority Rating (VPR).

• Discover detailed insights with automated analysis of


vulnerability and configuration data that is enhanced with
patching status, known exploits, threat intelligence and
knowledge of suspicious network traffic and user behavior

• Focus on what matters by quickly identifying


exploitable weaknesses

• Communicate security posture using Assurance


Report Cards

• Document compliance with industry standards and


Highly customizable dashboards, reports, workflows and regulations
security policies to suit your specific business needs

Tenable.sc includes over 350 pre-built, highly customizable dashboards


and reports to give you immediate insight into your security compliance,
effectiveness and risk. You can continuously measure, analyze and
visualize the effectiveness of your security program, based on high-level
business objectives and underlying customizable policies that executives
care about.

COPYRIGHT 2018 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SEC URITYCENTER CONTINUOUS VIEW AND LOG CORRELATION ENGINE ARE REGISTERED
TRADEMARKS OF TENABLE, INC. TENABLE.SC, LUMIN, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE, INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
KEY FEATURES
• Assurance Report Cards: continuously measure the effectiveness of
customer-defined security and compliance policies based on business
THE TENABLE.SC
objectives to identify and close potential gaps.
ADVANTAGE
• Highly customizable dashboards/reports: HTML-5 based user
interface satisfies the specific needs of CISOs, security management, Customers choose Tenable.sc because it
analysts and practitioners/operators. helps them:

• Vulnerability Priority Rating (VPR): combines threat intelligence and • Eliminate blind spots resulting from unmanaged assets
machine learning to determine the likelihood a vulnerability will be and weaknesses that increase your risk profile and are
exploited in your unique environment. often the root of security issues.

• Broad asset coverage: assess servers, endpoints, network devices,


• Increase efficiency informed by complete context to
operating systems, databases and applications in physical, virtual and
quickly understand and prioritize weaknesses.
cloud infrastructures.

• Continuous asset discovery: discover all mobile devices, physical, • Assure security and prove compliance to all
virtual and cloud instances on the network, including unauthorized stakeholders using specific metrics that clearly
assets. communicate status.
• Dynamic asset classification: group assets based on policies that
meet specific criteria: e.g., Windows 7 assets with vulnerabilities > 30 • Speed remediation with the ability to prioritize
days old. vulnerabilities with the highest likelihood of impact to
your organization
• Vulnerability management: multiple scanning options, including
passive network monitoring, non-credentialed
and credentialed scanning for deep analysis and configuration auditing.

• Agent-based scanning: available for organizations to more easily scan


mobile and hard to reach assets.
TENABLE.SC EDITIONS
Tenable.sc
• Malware detection: leverage built-in threat intelligence feeds
Tenable.sc is an on-prem managed Cyber Exposure platform that
(malware indicators, blacklists) to identify advanced malware.
includes multiple Nessus® scanners, the world’s
• Assess network health: continuously monitor network traffic looking most widely deployed vulnerability scanner. It provides the most
for suspicious traffic to/from vulnerable systems/ services, unknown comprehensive visibility into the security posture of
devices, botnets, command/control servers. distributed and complex IT infrastructure.
• Anomaly detection: use statistical and anomalous
behavior analysis techniques on external log sources, Tenable.sc Continuous ViewTM
to automatically discover activity that deviates from Tenable.sc Continuous View is the market-leading Cyber Exposure
the baseline. platform for organizations who need to manage their data on-prem. It
integrates Tenable.sc along with multiple Nessus Network Monitor
• Advanced analytics/trending: provide contextual insight sensors and network traffic and event monitoring to provide
and actionable information to prioritize security issues associated
comprehensive continuous network monitoring.
with security posture of all enterprise assets.

• Notification: configurable alerts for administrators to take manual


actions via emails, notifications, trouble tickets or to take automated
actions via APIs. For More Information: Please visit tenable.com
Contact Us: Please email us at [email protected] or visit
• Streamlined compliance: pre-defined checks for industry standards tenable.com/contact
and regulatory mandates, such as CERT, DISA STIG, DHS CDM, FISMA,
PCI DSS, HIPAA/HITECH and more.

• Integrations: out-of-box integrations with patch management, MDM,


threat intelligence and other third-party products, or use Tenable.sc
APIs to develop custom integrations.

COPYRIGHT 2018 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SEC URITYCENTER CONTINUOUS VIEW AND LOG CORRELATION ENGINE ARE REGISTERED
TRADEMARKS OF TENABLE, INC. TENABLE.SC, LUMIN, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE, INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

You might also like