Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/29/2013
05:53 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tenable Launches Security “App Store” For SecurityCenter 4.7

SecurityCenter 4.7 will provide searchable catalog of apps that can be used to customize the dashboard

August 29, 2013--Tenable Network Security, the leader in real-time vulnerability management, today announced SecurityCenter 4.7&trade. With this release, Tenable introduces a first-of-its-kind security "app store" – a catalog of hundreds of apps created by Tenable researchers that provide the latest intelligence for identifying advanced threats and compliance violations.

"Tenable's advanced analytics have allowed us to extend SecurityCenter as both a solution for security assessments and one for data center maintenance and operations. We are looking forward to the 'security apps' in 4.7," said Russell Butturini, Senior Enterprise Security Architect at Healthways, a global disease management and well-being provider and ranked #8 on Information Week 500.

These analytics are directly accessible from within the SecurityCenter console and offer extensive visibility for multiple teams – network, security, operations, and compliance. The apps dramatically cut time and resources required to identify and respond to vulnerabilities, advanced threats, and compliance violations without the need to write complex scripts or rely on 3rd party tools.

Key capabilities of SecurityCenter 4.7 include:

New and simpler framework for creating and updating dashboards, dynamic asset lists, and reports.

Extended mobile device coverage to track mobile device types, users, and vulnerabilities through active, passive scanning and MDM integration.

Remediation report summarizing vulnerabilities, most effective remediation, as well as time to remediate.

Support for SCAP 1.2. Users can upload and download SCAP files for use in scan jobs.

Allows user to accept and recast risk rules to adjust priority based on customer specific requirements.

"Tenable's mandate is to protect its clients 24/7, so we realize that our solutions' capabilities need to be as dynamic as the current threat landscape," said Ron Gula, CEO of Tenable. "We provide customers with the only real-time vulnerability management platform with built-in scan, log, and network analysis technology to assess IT infrastructure risk. With this release, we're making SecurityCenter even more strategic for our customers by providing direct access to the latest security and compliance intelligence as identified by our world class researchers."

For more information on Tenable Network Security products and solutions, please visit www.tenable.com.

About Tenable Network Security

Tenable Network Security is relied upon by more than 17,000 organizations, including the entire U.S. Department of Defense and many of the world's largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements. For more information, please visit www.tenable.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.