Data Sheet - Tenable - SC Continuous View
Data Sheet - Tenable - SC Continuous View
prioritize security risks and assess security posture of my enterprise TENABLE RESEARCH
based on business objectives at any time.”
The Tenable Research team provides frequent updates of
- Healthcare Service Provider vulnerability and threat intelligence, advanced analytics,
security/compliance policies and dashboards/reports to all Tenable.sc
VULNERATBILITY MANAGEMENT customers. This out-of-the box content is based on industry and
customer best practices gathered by Tenable, putting the power of our
MANAGED ON-PREM security research team at your disposal. This content is part of the
Tenable.sc subscription.
Changing IT landscapes and evolving cyber threats have made periodic
scanning and compliance audits insufficient to protect businesses
against modern cyberattacks. To keep your network safe, you need a KEY BENEFITS
vulnerability management solution that gives you complete visibility into
your attack surface so you can manage and measure your cyber risk.
Built on leading Nessus technology, Tenable.scTM Continuous View is a • Always know when new or changed assets alter your
market-leading Cyber Exposure platform, managed on-prem, that gives attack surface
you a comprehensive picture of your network. You get real-time,
continuous assessment of your security and compliance posture so you • Gain broad visibility across your IT infrastructure,
can discover unknown assets and vulnerabilities, monitor unexpected including endpoints, servers, databases, mobile
network changes and prioritize weaknesses to minimize your cyber risk devices, domain controllers, network devices, virtual
and prevent breaches. It is the only solution that brings together applications and the cloud
discovery of on premises and cloud-based assets, active and passive
vulnerability assessment, configuration auditing, change detection, • See what others miss with visibility into transient,
malware detection, threat intelligence, analysis of network and user difficult to reach and unsafe to scan systems
activity and vulnerability prioritization.
• Prioritize vulnerabilities with the greatest impact, and
understand the likelihood a given vulnerability will be
exploited in the next 28 days, using the Tenable
Vulnerability Priority Rating (VPR).
COPYRIGHT 2018 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SEC URITYCENTER CONTINUOUS VIEW AND LOG CORRELATION ENGINE ARE REGISTERED
TRADEMARKS OF TENABLE, INC. TENABLE.SC, LUMIN, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE, INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
KEY FEATURES
• Assurance Report Cards: continuously measure the effectiveness of
customer-defined security and compliance policies based on business
THE TENABLE.SC
objectives to identify and close potential gaps.
ADVANTAGE
• Highly customizable dashboards/reports: HTML-5 based user
interface satisfies the specific needs of CISOs, security management, Customers choose Tenable.sc because it
analysts and practitioners/operators. helps them:
• Vulnerability Priority Rating (VPR): combines threat intelligence and • Eliminate blind spots resulting from unmanaged assets
machine learning to determine the likelihood a vulnerability will be and weaknesses that increase your risk profile and are
exploited in your unique environment. often the root of security issues.
• Continuous asset discovery: discover all mobile devices, physical, • Assure security and prove compliance to all
virtual and cloud instances on the network, including unauthorized stakeholders using specific metrics that clearly
assets. communicate status.
• Dynamic asset classification: group assets based on policies that
meet specific criteria: e.g., Windows 7 assets with vulnerabilities > 30 • Speed remediation with the ability to prioritize
days old. vulnerabilities with the highest likelihood of impact to
your organization
• Vulnerability management: multiple scanning options, including
passive network monitoring, non-credentialed
and credentialed scanning for deep analysis and configuration auditing.
COPYRIGHT 2018 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SEC URITYCENTER CONTINUOUS VIEW AND LOG CORRELATION ENGINE ARE REGISTERED
TRADEMARKS OF TENABLE, INC. TENABLE.SC, LUMIN, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE, INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.