19.02.2015 Views

2014 Digital Yearbook of Homeland Security Awards

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

automated testing <strong>of</strong> a network’s defenses against a security<br />

policy is the best method to monitor the health and<br />

assurance <strong>of</strong> your network.<br />

NIST defines continuous network monitoring as “maintaining<br />

ongoing awareness <strong>of</strong> information security, vulnerabilities,<br />

and threats to support organizational risk management<br />

decisions.”<br />

Continuous network monitoring is one <strong>of</strong> the most<br />

promising developments in Next Generation Vulnerability<br />

Management (NGVM). Instead <strong>of</strong> scanning periodically,<br />

agencies can now implement real-time scanning to<br />

eliminate blind spots. A well-run network should include<br />

solutions that accurately measure security risks in real<br />

time and bring together the processes <strong>of</strong> asset discovery,<br />

vulnerability detection and configuration auditing.<br />

Tenable’s <strong>Security</strong>Center Continuous View (<strong>Security</strong>-<br />

Center CV) includes innovative continuous network<br />

monitoring tools, such<br />

as passive vulnerability<br />

scanning on devices<br />

that are not always<br />

connected to the<br />

network, log correlation<br />

and analysis, tight<br />

integrations with the<br />

security ecosystem, and<br />

advanced threat detection<br />

technologies. <strong>Security</strong>Center CV’s centralized console<br />

manages distributed Nessus vulnerability scanners for<br />

agency-wide security and compliance visibility. Sensors<br />

automatically discover and assess traditional IT systems,<br />

mobile users, virtual networks, and cloud-based applications.<br />

Advanced analytics, including extensive dashboards<br />

and customizable reports, aggregate scan data to help<br />

5<br />

you identify and remediate security and compliance<br />

issues.<br />

In today’s IT environment, an unknown risk can compromise<br />

your agency and put your executive management<br />

at the center <strong>of</strong> media attention. Continuous<br />

network monitoring provides peace <strong>of</strong> mind by reporting<br />

against any number <strong>of</strong> compliance standards and<br />

your own security policy. Only a well-run, carefully managed<br />

network can achieve security that is “obtainable<br />

and defendable,” which is the very meaning <strong>of</strong> the word<br />

tenable.<br />

About Tenable Network <strong>Security</strong><br />

Tenable Network <strong>Security</strong> provides continuous network<br />

monitoring to identify vulnerabilities, reduce risk and<br />

ensure compliance. Our family <strong>of</strong> products includes<br />

<strong>Security</strong>Center Continuous View, which provides the<br />

most comprehensive and integrated view <strong>of</strong> network<br />

health, and Nessus ® , the global standard in detecting<br />

and assessing network data. Tenable is relied upon by<br />

many <strong>of</strong> the world’s largest corporations, not-for-pr<strong>of</strong>it<br />

organizations and public sector agencies, including the<br />

entire U.S. Department <strong>of</strong> Defense. For more information,<br />

please visit tenable.com.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!