2014 Digital Yearbook of Homeland Security Awards
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
automated testing <strong>of</strong> a network’s defenses against a security<br />
policy is the best method to monitor the health and<br />
assurance <strong>of</strong> your network.<br />
NIST defines continuous network monitoring as “maintaining<br />
ongoing awareness <strong>of</strong> information security, vulnerabilities,<br />
and threats to support organizational risk management<br />
decisions.”<br />
Continuous network monitoring is one <strong>of</strong> the most<br />
promising developments in Next Generation Vulnerability<br />
Management (NGVM). Instead <strong>of</strong> scanning periodically,<br />
agencies can now implement real-time scanning to<br />
eliminate blind spots. A well-run network should include<br />
solutions that accurately measure security risks in real<br />
time and bring together the processes <strong>of</strong> asset discovery,<br />
vulnerability detection and configuration auditing.<br />
Tenable’s <strong>Security</strong>Center Continuous View (<strong>Security</strong>-<br />
Center CV) includes innovative continuous network<br />
monitoring tools, such<br />
as passive vulnerability<br />
scanning on devices<br />
that are not always<br />
connected to the<br />
network, log correlation<br />
and analysis, tight<br />
integrations with the<br />
security ecosystem, and<br />
advanced threat detection<br />
technologies. <strong>Security</strong>Center CV’s centralized console<br />
manages distributed Nessus vulnerability scanners for<br />
agency-wide security and compliance visibility. Sensors<br />
automatically discover and assess traditional IT systems,<br />
mobile users, virtual networks, and cloud-based applications.<br />
Advanced analytics, including extensive dashboards<br />
and customizable reports, aggregate scan data to help<br />
5<br />
you identify and remediate security and compliance<br />
issues.<br />
In today’s IT environment, an unknown risk can compromise<br />
your agency and put your executive management<br />
at the center <strong>of</strong> media attention. Continuous<br />
network monitoring provides peace <strong>of</strong> mind by reporting<br />
against any number <strong>of</strong> compliance standards and<br />
your own security policy. Only a well-run, carefully managed<br />
network can achieve security that is “obtainable<br />
and defendable,” which is the very meaning <strong>of</strong> the word<br />
tenable.<br />
About Tenable Network <strong>Security</strong><br />
Tenable Network <strong>Security</strong> provides continuous network<br />
monitoring to identify vulnerabilities, reduce risk and<br />
ensure compliance. Our family <strong>of</strong> products includes<br />
<strong>Security</strong>Center Continuous View, which provides the<br />
most comprehensive and integrated view <strong>of</strong> network<br />
health, and Nessus ® , the global standard in detecting<br />
and assessing network data. Tenable is relied upon by<br />
many <strong>of</strong> the world’s largest corporations, not-for-pr<strong>of</strong>it<br />
organizations and public sector agencies, including the<br />
entire U.S. Department <strong>of</strong> Defense. For more information,<br />
please visit tenable.com.