2
| DATA SHEET SecurityCenter™ Continuous View Integrated Vulnerability and Threat Management Understanding Everything in Your IT Environment SecurityCenter™ Continuous View (CV) brings real-time monitoring and integrated log analysis to vulnerability management allowing organizations to continuously monitor for vulnerabilities, threats and compliance violations. It provides a complete picture of security risk by identifying 100% of assets 100% of the time, immediately detecting their vulnerabilities, and continuously monitoring for changes that impact overall risk. It also integrates with existing network, security, and remediation systems for rich context and delivers the latest analytics and security applications via live feed for rapid incident response and remediation. Key Benefits • Identify 100% of IT assets by detecting systems, such as mobile devices, cloud and virtual systems, connecting to the network, discovering unscannable assets in complex network segments, and automatically assessing their risk to determine remediation efforts. • Real-time malware detection using statistical analysis allows tracking of botnets, malware outbreaks, unauthorized changes and anomalies with contextual intelligence from threatlists, such as Internet Identity and ReversingLabs, and indicators of compromise. • Respond to incidents faster by analyzing all user, configuration, asset, and authentication data and through audit logs of network devices, systems and applications detect hidden attackers, malicious software, and compromised systems. • Employs advanced analytics including an extensive repository of dashboards, out of the box and customizable reports, and data correlation techniques to help you identify and respond to security and compliance issues. • Proactively monitor compliance violations, alert on deviations, and continually track whether regulatory requirements are met to better prepare for audits. • Perform auditing and compliance reporting with coverage of industry standards and regulatory mandates, such as FISMA, PCI DSS, HIPAA/HITECH, DHS CDM, and DISA STIG, to achieve outcome-based security initiatives that align security and compliance. • Deliver role-specific reports, alerts, and actions to security, compliance, and operations teams using customized or published SC report templates. Managing IT threats is a complex and fragmented process, especially in today’s enterprise networks. Tenable SecurityCenter CV brings it all together in a centralized solution for hybrid IPv4/IPv6 asset discovery, vulnerability detection and configuration auditing. You can easily monitor, analyze and communicate security intelligence using SecurityCenter’s customizable dashboards and reports, advanced asset discovery, and report sharing that support various roles throughout the enterprise. SecurityCenter™ CV combines active scanning, passive network sniffing, and log analysis forming a real-time, continuous monitoring solution At-a-glance dashboards, such as the “Indicators of Compromise”, monitor many security parameters and quickly highlight the most critical ones.

DAT SEET SecurityCenter™ Continuous View · Continuous, real-time vulnerability analysis through patented passive monitoring Performs database monitoring and detects encrypted communications

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DAT SEET SecurityCenter™ Continuous View · Continuous, real-time vulnerability analysis through patented passive monitoring Performs database monitoring and detects encrypted communications

| DATA SHEET

SecurityCenter™ Continuous ViewIntegrated Vulnerability and Threat Management

Understanding Everything in Your IT Environment SecurityCenter™ Continuous View (CV) brings real-time monitoring and integrated log analysis to vulnerability management allowing organizations to continuously monitor for vulnerabilities, threats and compliance violations. It provides a complete picture of security risk by identifying 100% of assets 100% of the time, immediately detecting their vulnerabilities, and continuously monitoring for changes that impact overall risk. It also integrates with existing network, security, and remediation systems for rich context and delivers the latest analytics and security applications via live feed for rapid incident response and remediation.

Key Benefits• Identify 100% of IT assets by detecting systems, such as mobile devices, cloud and virtual

systems, connecting to the network, discovering unscannable assets in complex network segments, and automatically assessing their risk to determine remediation efforts.

• Real-time malware detection using statistical analysis allows tracking of botnets, malware outbreaks, unauthorized changes and anomalies with contextual intelligence from threatlists, such as Internet Identity and ReversingLabs, and indicators of compromise.

• Respond to incidents faster by analyzing all user, configuration, asset, and authentication data and through audit logs of network devices, systems and applications detect hidden attackers, malicious software, and compromised systems.

• Employs advanced analytics including an extensive repository of dashboards, out of the box and customizable reports, and data correlation techniques to help you identify and respond to security and compliance issues.

• Proactively monitor compliance violations, alert on deviations, and continually track whether regulatory requirements are met to better prepare for audits.

• Perform auditing and compliance reporting with coverage of industry standards and regulatory mandates, such as FISMA, PCI DSS, HIPAA/HITECH, DHS CDM, and DISA STIG, to achieve outcome-based security initiatives that align security and compliance.

• Deliver role-specific reports, alerts, and actions to security, compliance, and operations teams using customized or published SC report templates.

Managing IT threats is a complex and fragmented process, especially in today’s enterprise networks. Tenable SecurityCenter CV brings it all together in a centralized solution for hybrid IPv4/IPv6 asset discovery, vulnerability detection and configuration auditing. You can easily monitor, analyze and communicate security intelligence using SecurityCenter’s customizable dashboards and reports, advanced asset discovery, and report sharing that support various roles throughout the enterprise.

SecurityCenter™ CV combines active scanning, passive network sniffing, and log analysis forming a real-time, continuous monitoring solution

At-a-glance dashboards, such as the “Indicators of Compromise”, monitor many security parameters and quickly highlight the most critical ones.

Page 2: DAT SEET SecurityCenter™ Continuous View · Continuous, real-time vulnerability analysis through patented passive monitoring Performs database monitoring and detects encrypted communications

| DATA SHEET

2

Complete SolutionSecurityCenter CV centralizes asset discovery with complete and continuous vulnerability assessment by integrating data from the following components:

• Nessus®: The most widely deployed vulnerability scanner for broad and deep scans of networks, systems, data, and applications. Satisfies internal network scanning requirements for PCI.

• Nessus Perimeter Service™: Off-premise PCI approved ASV for network and web application vulnerability scanning service for Internet-facing IPs.

• Passive Vulnerability Scanner™: Monitors network traffic in real- time to detect new hosts, services, protocols, and applications for security and compliance violations.

• Log Correlation Engine™: Collects and aggregates data from network and security infrastructure, raw network traffic, and user activity to detect complex malware, isolate threats and compliance issues.

SecurityCenter™ EditionsSecurityCenter™For organizations that have deployed multiple Nessus scanners to meet periodic vulnerability scanning needs, SecurityCenter™ offers a centralized console to administer and speed up scanning, achieve enterprise-wide visibility, and obtain highly prioritized analytics on security events and compliance status.

SecurityCenter™ Continuous ViewSecurityCenter™ CV offers all the benefits of Nessus® periodic vulnerability scanning, but also compliments Nessus active scans through patented passive network monitoring to provide continuous evaluation of the network, and security information and event management (SIEM) to deliver a truly unique and real-time, continuous monitoring solution.

For complete details, visit Tenable.com.

For More Information

Copyright © 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. SecurityCenter and Passive Vulnerability Scanner are trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners. EN-MAY052014-V3

Product Features SecurityCenterSecurityCenter

Continuous View

Unlimited active scanners with Nessus

Industry’s largest vulnerability database, with plugins updated daily

Extensive compliance reporting and auditing

Granular, customizable dashboards and reports updated via live feed

Supports IPv6 address space

Integrates with Mobile Device Management (MDM) and Patch Management Systems

Third-party security and threat intelligence

Detects, classifies, and scans mobile devices (via Nessus) (continuous)

Real-time botnet and advanced malware detection.  Performs attack paths analysis. (via Nessus) (continuous)

Discovers 100% of IT assets for vulnerability assessment

Continuous, real-time vulnerability analysis through patented passive monitoring

Performs database monitoring and detects encrypted communications

Real-time detection and analysis of mobile, virtual systems, and cloud-services

Detects network anomalies and performs event correlation

Collects, stores, compresses, and correlates logs from thousands of network devices and applications

Aggregates and normalizes data from FWs, IDS/IPS, and DLP solutions, raw network traffic, NetFlow,

application logs, user activity, etc.