Analytics
9/25/2012
11:05 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Tenable Network Security Secures Strategic Partnership And Technology Development Agreement From IQT

Partnership focuses on streamlining secure audit and remediation capabilities within the intelligence community

Columbia, MD, Sept. 24, 2012- Tenable Network Security, Inc., the leader in Unified Security Monitoring (USM), announced today it has entered into a strategic partnership with In-Q-Tel (IQT), the independent strategic investment firm that identifies innovative technology products to support the missions of the U.S. Intelligence Community. The agreement will enable Tenable to develop robust information security solutions that will assist the U.S. Intelligence Community in continuously staying ahead of emerging cyber threats.

"Tenable is a proven leader and innovator in the information security industry and the company's technology capabilities are well aligned with needs we see in both the government and commercial markets," said Peter Kuper, Partner on IQT's Investments team. "Our partnership with Tenable will provide our Intelligence Community customers with a unique opportunity to utilize and build upon Tenable's innovative vulnerability management technology."

With over 1 million users and 15,000 organizations, Tenable Network Security's Nessus® and SecurityCenterT solutions are seen as the industry standard by IT security, compliance, and risk managers worldwide. The company's technology is the cornerstone for information security in many of the world's largest healthcare, financial, retail, and educational organizations and is currently being deployed across the entire Department of Defense and select federal intelligence agencies. Tenable's USM platform incorporates the world's most accurate vulnerability sensors - the award-winning Nessus vulnerability scanner and the Passive Vulnerability Scanner - with the industry's largest database of vulnerabilities, threats, and compliance data, delivering real-time network vulnerability intelligence and threat correlation.

"The U.S. Intelligence Community houses some of the most sensitive, mission critical information in the world," said Ron Gula, CEO of Tenable Network Security. "We are proud of our partnership with IQT and look forward to opportunities to provide the U.S. Intelligence Community with the tools to continuously monitor security threats, vulnerabilities, and compliance regulations in real-time, around the clock."

###

About Tenable Network Security

Tenable Network Security is relied on by security and compliance professionals at many of the world's largest companies and governments, including the entire U.S. Department of Defense, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements. http://www.tenable.com

About IQT

In-Q-Tel is the not-for-profit, strategic investment firm that works to identify, adapt, and deliver innovative technology solutions to support the missions of the U.S. Intelligence Community. Launched in 1999 as a private, independent organization, IQT's mission is to identify and partner with companies developing cutting-edge technologies that serve the national security interests of the United States. For more information, visit www.iqt.org.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web