VULNERABILITY MANAGEMENT



Similar documents
WHITEPAPER. Nessus Exploit Integration

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

PCI DSS Reporting WHITEPAPER

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Speed Up Incident Response with Actionable Forensic Analytics

Eliminating Cybersecurity Blind Spots

April 11, (Revision 2)

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS

Tenable Enterprise Product Training

Continuous Network Monitoring

PCI DSS Top 10 Reports March 2011

NE T GENERATION CLOUD SECURITY PLATFORM

24/7 Visibility into Advanced Malware on Networks and Endpoints

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Vulnerability Management

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Bringing Continuous Security to the Global Enterprise

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

Tenable Addendum to VMware Product Applicability Guide. for. Payment Card Industry Data Security Standard (PCI DSS) version 3.0

Protecting Critical Infrastructure

Tenable Network Security Support Portal. January 12, 2015 (Revision 14)

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

IT Security & Compliance. On Time. On Budget. On Demand.

Patch Management Integration

The SIEM Evaluator s Guide

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Extreme Networks Security Analytics G2 Vulnerability Manager

Enterprise-Grade Security from the Cloud

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

Tenable Tools for Security Compliance The Antivirus Challenge

3D Tool 2.0 Quick Start Guide

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

Symantec Control Compliance Suite Standards Manager

encription IT Security and Forensic Services

Nessus Cloud User Registration

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Cisco Advanced Malware Protection for Endpoints

I D C A N A L Y S T C O N N E C T I O N

Cisco Advanced Malware Protection for Endpoints

Nessus Agents. October 2015

IBM Security IBM Corporation IBM Corporation

Sample Vulnerability Management Policy

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Cloud & Datacenter Monitoring with System Center Operations Manager

McAfee Database Security. Dan Sarel, VP Database Security Products

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

Virtual Patching: a Proven Cost Savings Strategy

Protect Root Abuse privilege on Hypervisor (Cloud Security)

IBM Security QRadar Vulnerability Manager

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose

Caretower s SIEM Managed Security Services

June 8, (Revision 1)

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

Tenable for CyberArk

CLOUD MANAGED SERVICES FRAMEWORK E-BOOK

Analysis of the Global Vulnerability Management Market Platform Convergence Intensifies Competition but Creates Opportunity in Growth Technology

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

The Importance of Cybersecurity Monitoring for Utilities

May 11, (Revision 10)

Ecom Infotech. Page 1 of 6

Rozwiązanie SaaS w zakresie bezpieczeństwa teleinformatycznego i ochrony danych dla przedsiębiorstw

2012 North American Managed Security Service Providers Growth Leadership Award

SANS Top 20 Critical Controls for Effective Cyber Defense

rating of 5 out 5 stars

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

PCI DSS Overview and Solutions. Anwar McEntee

IBM. Vulnerability scanning and best practices

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

INTRODUCING isheriff CLOUD SECURITY

10964C: Cloud & Datacenter Monitoring with System Center Operations Manager

End-to-End Application Security from the Cloud

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Transcription:

Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will fit in their overall vulnerability management process for data center, cloud and virtual environments. Secu recommends using Tenable, as they offer a complete platform for vulnerability management, attack detection and mitigation, compliance monitoring, and IT risk management. The products portfolio includes best-of-breed active vulnerability scanning, the industry s only passive network vulnerability scanner and log correlation tools.

KEY FEATURES Scanning Capabilities Accurate, high-speed asset discovery Control systems auditing: SCADA systems, devices, and applications Reporting and Monitoring Flexible reporting: Customize reports to sort by vulnerability or host, create an executive summary, or compare scan reports to highlight changes Targeted e-mail notifications of scan results, remediation recommendations and scan improvements Deployment and Management Configuration and management via Nessus GUI Agentless scanner for easy deployment and maintenance

PRODUCT OVERVIEW Nessus Nessus is one of the most trusted asset with a widely deployed vulnerability, configuration, patch, and audit scanner. Nessus Enterprise Cloud Nessus Enterprise Cloud is a PCI-Certified Approved Scanning Vendor (ASV) solution. This cloud-based service enables remote, cloud-based management, sharing of multiple scanners, scan schedules, scan policies, and scan results. Passive Vulnerability Scanner The Passive Vulnerability Scanner (PVS) is the only continuous vulnerability scanner, essential in discovering risks from mobile and virtual devices and risks of cloud-based applications. SecurityCenter SecurityCenter provides a single console to administer Nessus policies, alerts, reports, and plugin updates across the enterprise.

NESSUS The latest version of Nessus introduces multi-scanner support and the ability to control internal and external scans from the cloud, as well as several enhancements to the vulnerability output. You can use your own Nessus server to act as the primary, or you can configure your Nessus Perimeter Service scanner in the cloud to be the primary. The results of scans being run on secondary servers are all displayed on the primary server. The server which ran the scan is designated in the results. With the Enterprise version you can share the results of multiple scanners between multiple users. NESSUS ENTERPRISE CLOUD This cloud-based service has the world s largest and a continuously-updated library of vulnerability and configuration checks. The Nessus Enterprise Cloud includes a centralized administration of multiple Nessus scanners with a multi-scanner support to provide access of Nessus scanners on premise. Furthermore resources like scanners, policies, schedules and reports are shared among multiple users across groups. Enterprise Cloud provides quarterly external network scans to fulfill PCI external scanning requirements for all merchants and service providers.

PASSIVE VULNERABILITY SCANNER The Tenable Passive Vulnerability Scanner (PVS) is an analysis tool that delivers continuous real-time network profiling and monitoring in a non-intrusive manner, at the packet layer to determine topology, services and vulnerabilities. Passive Vulnerability Scanner offers extensive web and FTP activity monitoring through direct analysis of the packet stream. Passive Vulnerability Scanner also can look at network traffic and identify SQL devices, vulnerabilities associated with them and log this activity in real-time. SECURITYCENTER For organizations with large and complex networks, SecurityCenter combines the power of Nessus scanning with an enterprise-class vulnerability management platform. The SecurityCenter accelerates and simplifies vulnerability and compliance management, with a single console managing distributed Nessus scans and providing advanced analytics and dashboards. A unique combination of active Nessus scanning, passive PVS detection, and log analysis that discovers and classifies IT assets across the enterprise.

SECU SERVICES Starter Package One external scan and/or One internal scan A report is delivered and the data is reviewed and evaluated Basic Package Implementation, configuration and setting up features Configuration of email reporting 12 months of system upgrades (license required) Managed Package Basic package Experienced security consultants evaluate the scan results on a regular basis and provide prioritized remedation s (cleanups) Call us to get a demo of the Tenable product portfolio on +45 36 44 99 11

ABOUT TENABLE The Tenable platform has evolved into today s most powerful vulnerability and threat detection technology. Tenable SecurityCenter is the trusted cybersecurity platform in use throughout the U.S. Department of Defense, and by many of the Fortune 500 s. These institutions trust Tenable to alert them to threats that could bring down their networks. Nessus, the heart of Tenable s platform, has more than one million users protecting almost every major enterprise network in the world. ABOUT SECU Secu is a dedicated IT security company providing secure and highly available IT security solutions. We work closely with our clients, and assist them throughout the whole process from planning, implementation, operation over evaluation of the provided service. We thrive when things get complicated, and our ambition is to make security look easy for you. Our mission is to create, operate and optimize best-of-breed IT security solutions, while contributing with knowledge that supports our customers business areas. We have the experience and skills needed to take responsibility for implementing and designing, even the largest and most complex installations. Our customers covers all segments, sizes and complexities. Secu A/S A. P. Møllers Allé 17, 1. DK-2791 Dragør +45 36 44 99 11 www.secu.dk