Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

9/25/2012
11:05 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tenable Network Security Secures Strategic Partnership And Technology Development Agreement From IQT

Partnership focuses on streamlining secure audit and remediation capabilities within the intelligence community

Columbia, MD, Sept. 24, 2012- Tenable Network Security, Inc., the leader in Unified Security Monitoring (USM), announced today it has entered into a strategic partnership with In-Q-Tel (IQT), the independent strategic investment firm that identifies innovative technology products to support the missions of the U.S. Intelligence Community. The agreement will enable Tenable to develop robust information security solutions that will assist the U.S. Intelligence Community in continuously staying ahead of emerging cyber threats.

"Tenable is a proven leader and innovator in the information security industry and the company's technology capabilities are well aligned with needs we see in both the government and commercial markets," said Peter Kuper, Partner on IQT's Investments team. "Our partnership with Tenable will provide our Intelligence Community customers with a unique opportunity to utilize and build upon Tenable's innovative vulnerability management technology."

With over 1 million users and 15,000 organizations, Tenable Network Security's Nessus® and SecurityCenterT solutions are seen as the industry standard by IT security, compliance, and risk managers worldwide. The company's technology is the cornerstone for information security in many of the world's largest healthcare, financial, retail, and educational organizations and is currently being deployed across the entire Department of Defense and select federal intelligence agencies. Tenable's USM platform incorporates the world's most accurate vulnerability sensors - the award-winning Nessus vulnerability scanner and the Passive Vulnerability Scanner - with the industry's largest database of vulnerabilities, threats, and compliance data, delivering real-time network vulnerability intelligence and threat correlation.

"The U.S. Intelligence Community houses some of the most sensitive, mission critical information in the world," said Ron Gula, CEO of Tenable Network Security. "We are proud of our partnership with IQT and look forward to opportunities to provide the U.S. Intelligence Community with the tools to continuously monitor security threats, vulnerabilities, and compliance regulations in real-time, around the clock."

###

About Tenable Network Security

Tenable Network Security is relied on by security and compliance professionals at many of the world's largest companies and governments, including the entire U.S. Department of Defense, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements. http://www.tenable.com

About IQT

In-Q-Tel is the not-for-profit, strategic investment firm that works to identify, adapt, and deliver innovative technology solutions to support the missions of the U.S. Intelligence Community. Launched in 1999 as a private, independent organization, IQT's mission is to identify and partner with companies developing cutting-edge technologies that serve the national security interests of the United States. For more information, visit www.iqt.org.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.