Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Comprehensive dashboards help Tenable customers use Verizon DBIR insights to strengthen networks against cyber threats

by The Gurus
July 22, 2015
in Editor's News
Share on FacebookShare on Twitter

Tenable Network Security®, Inc., the leader in continuous network monitoring, today announced five new SecurityCenter Continuous View™ dashboards based on Verizon’s 2015 Data Breach Investigations Report (DBIR).
The Verizon DBIR is one of the most anticipated reports each year because it analyzes and highlights common attack patterns and identifies how often an attack vector results in a successful breach. Still, many organizations struggle to incorporate the DBIR findings into their security programs due to the overhead required to sift through volumes of data.  
With the new Verizon DBIR dashboards in SecurityCenter Continuous View, Tenable removes the burden of manually collecting and filtering data and automates this process through preconfigured DBIR dashboards focused on five key areas of risk. SecurityCenter CV customers can now evaluate their networks against critical threats and top vulnerabilities, take action to prevent compromise, and incorporate best practices to improve the health of their networks.
“CISOs and their supporting teams need a way to make the Verizon DBIR information actionable,” said Ron Gula, CEO, Tenable Network Security. “Tenable’s DBIR dashboards take advantage of SecurityCenter CV’s unique sensors and ability to automate complex, time-consuming tasks. Customers get increased visibility into their security status and are able to put the DBIR’s key recommendations and best practices to use.”
Customers who practice continuous network monitoring will be able to quickly identify indicators of compromise (IOCs) via active scanning, non-intrusive network activity monitoring, and event correlation from log analysis.
Tenable’s new DBIR dashboards focus on the following five themes:
Indicators of Compromise:  Track IOCs such as virus signatures, specific traffic patterns, specific IP addresses, malware, specific URLs, or domains of known illicit activity using continuous network monitoring.
Account Weakness: Identify vulnerabilities related to accounts and credentials to thwart basic attacks and reduce the chance of a data breach by eliminating weak passwords, default accounts and outdated policies.
Vulnerabilities and Malware Collection: Missing patches with Common Vulnerabilities and Exposure (CVE) IDs accounted for a large number of exploits according to the DBIR. The vast majority of exploited vulnerabilities were compromised more than a year after the CVE was published.  This dashboard identifies such vulnerabilities so that patches can be quickly and efficiently applied.
Browser Vulnerabilities: Understand vulnerabilities in web browsers including Firefox, Chrome, IE, Opera, and more.  Using this dashboard, organizations can eliminate unauthorized web browsers, patch browser vulnerabilities and disable vulnerable plugins, thereby reducing the likelihood of a data breach.
Incident Pattern Monitoring: Organizations can reduce risk by monitoring for remote access, potential policy violations, anti-virus updates, data leakage, vulnerabilities, detected changes and suspicious activity. 
“Data breach reports are interesting, but everyone wants to know what this means for their company and how their company compares,” said Christian A. Christiansen, program vice president of security products, IDC. “Tenable helps score those comparisons, identify the priorities, and suggests remediation. This is actionable guidance.”
For more information on each dashboard and how to use them, read the Tenable’s Continuous Network Monitoring and the Verizon DBIR whitepaper.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Baby, you can hack my car: researchers take over a Jeep from 10 miles away

Next Post

New Lieberman Software survey reveals that despite companies employing more IT security staff than ever before, the hackers are still winning

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information