Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
PVS will be available at the end of August as a standalone product
August 1, 2013
3 Min Read
LAS VEGAS--(BUSINESS WIRE)--Tenable Network Security, the leader in real-time vulnerability management, today announced at Black Hat USA 2013 that its Passive Vulnerability Scanner (PVS) will be available at the end of August as a standalone product. Previously available only to Tenable's SecurityCenter and SecurityCenter CV customers, PVS can now be used by any company, security specialist or compliance auditor that wants to monitor their networks in real-time, in a non-intrusive manner.
Using network sniffing technology, PVS is an ideal solution to monitor systems sensitive to disruption by traditional scanning, transient systems like mobile, virtual and cloud apps that may not be present during scheduled scans.
PVS complements Nessus active scanning by monitoring network traffic detecting apps, services, protocols, hosts that are not present or evade active scanning. By continuously monitoring the network, PVS provides visibility into both server and client-side vulnerabilities and identifies the flow of sensitive data and the use of common protocols and services.
"A hacker only needs one pathway into your network," said Ron Gula, CEO of Tenable. "Not knowing what an unmanaged device is doing on your network is a security blind spot. By offering PVS as a standalone product, we are opening up the availability of our products to thousands of security and compliance professionals, and are the only company that provides vulnerability protection to customers from unmanaged systems and applications."
Tenable Passive Vulnerability Scanner continuously monitors IPv4/IPv6 network traffic for a variety of security-related information including:
Keeping track of all client and server application vulnerabilities
Identifying when an application is compromised or subverted
Detecting and tracking new hosts that are added to a network
Discovering when an internal system begins to port scan other systems
Highlighting all interactive and encrypted network sessions
Tracking exactly which systems communicate with other internal systems
Spotting which ports are served and which ports are browsed for each individual system
Passively determining the operating system of each active host
To learn more about PVS click this link http://tenable.com/products/passive-vulnerability-scanner
Vulnerability scanning is a cornerstone of IT security and has become a regulatory compliance standard today. Over the last few years, scanning has risen in priority as confirmed by the first four controls in the SANS Top 20 Critical Controls. Any organization effectively implementing vulnerability and compliance monitoring will lower their risk, increase compliance and avoid costly breaches. To achieve this goal, the most comprehensive scanning solutions are needed.
"As innovations such as BYOD and virtualization gain traction within the organization, more and more transient devices are being brought into the organization and onto corporate networks," added Gula. "If a company is only scanning for these devices monthly, they do not have an accurate picture of their network weakness."
About Tenable Network Security
More than 17,000 organizations, including the entire U.S. Department of Defense and many of the world's largest companies and governments, rely upon Tenable Network Security to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Our Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements. For more information, please visit www.tenable.com.
You May Also Like
A screen displaying many different types of charts and graphs to show what data is being analyzed.Cybersecurity Analytics
Use the 2023 MITRE ATT&CK Evaluation Results for Turla to Inform EDR Buying Decisions
Strengthen Microsoft Defender with MDR
Building Cyber Resiliency: Key Strategies for Proactive Security Operations
Buyer's Guide: Choosing a True DevSecOps Solution for Your Apps on AWS
Understanding AI Models to Future-Proof Your AppSec Program