Analytics
9/25/2012
11:05 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Tenable Network Security Secures Strategic Partnership And Technology Development Agreement From IQT

Partnership focuses on streamlining secure audit and remediation capabilities within the intelligence community

Columbia, MD, Sept. 24, 2012- Tenable Network Security, Inc., the leader in Unified Security Monitoring (USM), announced today it has entered into a strategic partnership with In-Q-Tel (IQT), the independent strategic investment firm that identifies innovative technology products to support the missions of the U.S. Intelligence Community. The agreement will enable Tenable to develop robust information security solutions that will assist the U.S. Intelligence Community in continuously staying ahead of emerging cyber threats.

"Tenable is a proven leader and innovator in the information security industry and the company's technology capabilities are well aligned with needs we see in both the government and commercial markets," said Peter Kuper, Partner on IQT's Investments team. "Our partnership with Tenable will provide our Intelligence Community customers with a unique opportunity to utilize and build upon Tenable's innovative vulnerability management technology."

With over 1 million users and 15,000 organizations, Tenable Network Security's Nessus® and SecurityCenterT solutions are seen as the industry standard by IT security, compliance, and risk managers worldwide. The company's technology is the cornerstone for information security in many of the world's largest healthcare, financial, retail, and educational organizations and is currently being deployed across the entire Department of Defense and select federal intelligence agencies. Tenable's USM platform incorporates the world's most accurate vulnerability sensors - the award-winning Nessus vulnerability scanner and the Passive Vulnerability Scanner - with the industry's largest database of vulnerabilities, threats, and compliance data, delivering real-time network vulnerability intelligence and threat correlation.

"The U.S. Intelligence Community houses some of the most sensitive, mission critical information in the world," said Ron Gula, CEO of Tenable Network Security. "We are proud of our partnership with IQT and look forward to opportunities to provide the U.S. Intelligence Community with the tools to continuously monitor security threats, vulnerabilities, and compliance regulations in real-time, around the clock."

###

About Tenable Network Security

Tenable Network Security is relied on by security and compliance professionals at many of the world's largest companies and governments, including the entire U.S. Department of Defense, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements. http://www.tenable.com

About IQT

In-Q-Tel is the not-for-profit, strategic investment firm that works to identify, adapt, and deliver innovative technology solutions to support the missions of the U.S. Intelligence Community. Launched in 1999 as a private, independent organization, IQT's mission is to identify and partner with companies developing cutting-edge technologies that serve the national security interests of the United States. For more information, visit www.iqt.org.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.