Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

New Innovations From Tenable Automatically Discover And Assess Rogue Assets Across On-Prem And Cloud Environments

All From a Single Platform

by The Gurus
November 12, 2019
in Security News
Tenable Logo
Share on FacebookShare on Twitter

Tenable®, Inc., the Cyber Exposure company, today announced new product innovations in Tenable.sc ™ (formerly SecurityCenter) and Tenable.io® to continuously discover and assess known and unknown assets across on-premises and cloud environments from a single platform at no extra charge.

These innovations are based on Tenable’s industry-leading Nessus® Network Monitor (NNM) for passive network monitoring, which has been a pioneer in continuous monitoring for over 10 years with one of the industry’s broadest asset coverage. With today’s announcement, Tenable enables customers to not only automatically detect every asset across their computing environments, but also assess them for vulnerabilities and misconfigurations. This new functionality is available in the base Tenable.sc and Tenable.io products, eliminating the need for multiple applications and data silos.

Security teams often struggle to identify all assets in their purview given the dynamic and transient nature of technologies such as mobile devices, containers and cloud instances. This lack of visibility widens the Cyber Exposure gap, increasing the chances of a business-disrupting cyber event. Tenable has unveiled the following native capabilities to address the rogue asset challenge:

NNM Discovery Mode: Customers can use NNM within Tenable.io and Tenable.sc to continuously monitor their networks to discover rogue assets without the need to consume a product license. This capability will help security teams eliminate blindspots due to previously unknown assets or new assets added to the network between scans. This capability will be available in Tenable.sc and Tenable.io in 2019.

Rogue Asset Automatic Assessment: Customers can automatically assess rogue assets without manual intervention by enabling security teams to define their own policies for scanning newly-discovered assets. This will help organizations improve their overall security posture while decreasing operational costs of manual processes. Rogue Asset Automatic Assessment is generally available in Tenable.sc and will be available in Tenable.io in Q3 2019.

Tenable Cloud Connector Auto-Discovery: Tenable Cloud Connectors provide live visibility into AWS, Azure and GCP cloud workloads as they are continuously deployed and turned off. With Auto-Discovery, customers can automatically collect and track assets from all member accounts associated with the master account without any manual intervention to ensure full visibility across cloud environments. Auto-Discovery is now generally available in Tenable.io.

“A strategic Cyber Exposure program provides unified visibility into where all assets are located and to what extent they’re exposed, which is increasingly difficult to do with transient devices like cloud, mobile and IoT,” said Renaud Deraison, CTO, Tenable. “We are committed to helping customers on their Cyber Exposure journey to provide complete visibility across their attack surface, including both known and unknown assets, ultimately eliminating dangerous blind spots before they can be compromised.”

For more information about the latest capabilities, read our latest blog post.

About Tenable

Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at tenable.com.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

British Companies Are Failing At The Basics Of IT Security.

Next Post

Tenable Expands Partner Ecosystem To Span The Cyber Exposure Lifecycle.

Recent News

call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023
Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information