Vous êtes sur la page 1sur 2

| DATA SHEET

SecurityCenter Continuous View


Integrated Vulnerability and Threat Management

Understanding Everything in Your IT Environment


SecurityCenter Continuous View (CV) brings real-time monitoring and integrated log analysis
to vulnerability management allowing organizations to continuously monitor for vulnerabilities,
threats and compliance violations. It provides a complete picture of security risk by identifying
100% of assets 100% of the time, immediately detecting their vulnerabilities, and continuously
monitoring for changes that impact overall risk. It also integrates with existing network,
security, and remediation systems for rich context and delivers the latest analytics and security
applications via live feed for rapid incident response and remediation.

At-a-glance dashboards, such as the Indicators of Compromise, monitor many security


parameters and quickly highlight the most critical ones.

Key Benefits
Identify 100% of IT assets by detecting systems, such as mobile devices, cloud and virtual
systems, connecting to the network, discovering unscannable assets in complex network
segments, and automatically assessing their risk to determine remediation efforts.
Real-time malware detection using statistical analysis allows tracking of botnets,
malware outbreaks, unauthorized changes and anomalies with contextual intelligence from
threatlists, such as Internet Identity and ReversingLabs, and indicators of compromise.
Respond to incidents faster by analyzing all user, configuration, asset, and
authentication data and through audit logs of network devices, systems and applications
detect hidden attackers, malicious software, and compromised systems.
Employs advanced analytics including an extensive repository of dashboards, out of the
box and customizable reports, and data correlation techniques to help you identify and
respond to security and compliance issues.
Proactively monitor compliance violations, alert on deviations, and continually track
whether regulatory requirements are met to better prepare for audits.
Perform auditing and compliance reporting with coverage of industry standards and
regulatory mandates, such as FISMA, PCI DSS, HIPAA/HITECH, DHS CDM, and DISA
STIG, to achieve outcome-based security initiatives that align security and compliance.
Deliver role-specific reports, alerts, and actions to security, compliance, and operations
teams using customized or published SC report templates.

SecurityCenter CV combines
active scanning, passive network
sniffing, and log analysis forming
a real-time, continuous monitoring
solution

Managing IT threats is a complex and


fragmented process, especially in todays
enterprise networks. Tenable SecurityCenter
CV brings it all together in a centralized
solution for hybrid IPv4/IPv6 asset discovery,
vulnerability detection and configuration
auditing. You can easily monitor, analyze
and communicate security intelligence using
SecurityCenters customizable dashboards
and reports, advanced asset discovery, and
report sharing that support various roles
throughout the enterprise.

| DATA SHEET

Complete Solution

SecurityCenter Editions

SecurityCenter CV centralizes asset discovery with complete and


continuous vulnerability assessment by integrating data from the
following components:

SecurityCenter
For organizations that have deployed multiple Nessus scanners to
meet periodic vulnerability scanning needs, SecurityCenter offers
a centralized console to administer and speed up scanning, achieve
enterprise-wide visibility, and obtain highly prioritized analytics on
security events and compliance status.

Nessus: The most widely deployed vulnerability scanner for broad


and deep scans of networks, systems, data, and applications.
Satisfies internal network scanning requirements for PCI.
Nessus Perimeter Service: Off-premise PCI approved ASV for
network and web application vulnerability scanning service for
Internet-facing IPs.
Passive Vulnerability Scanner: Monitors network traffic in realtime to detect new hosts, services, protocols, and applications for
security and compliance violations.
Log Correlation Engine: Collects and aggregates data from
network and security infrastructure, raw network traffic, and
user activity to detect complex malware, isolate threats and
compliance issues.

SecurityCenter Continuous View


SecurityCenter CV offers all the benefits of Nessus periodic
vulnerability scanning, but also compliments Nessus active scans
through patented passive network monitoring to provide continuous
evaluation of the network, and security information and event
management (SIEM) to deliver a truly unique and real-time, continuous
monitoring solution.
For complete details, visit Tenable.com.

Product Features

SecurityCenter

SecurityCenter
Continuous View

Unlimited active scanners with Nessus


Industrys largest vulnerability database, with plugins updated daily
Extensive compliance reporting and auditing
Granular, customizable dashboards and reports updated via live feed
Supports IPv6 address space
Integrates with Mobile Device Management (MDM) and Patch Management Systems
Third-party security and threat intelligence
Detects, classifies, and scans mobile devices

(via Nessus)

(continuous)

Real-time botnet and advanced malware detection. Performs attack paths analysis.

(via Nessus)

(continuous)

Discovers 100% of IT assets for vulnerability assessment


Continuous, real-time vulnerability analysis through patented passive monitoring
Performs database monitoring and detects encrypted communications
Real-time detection and analysis of mobile, virtual systems, and cloud-services
Detects network anomalies and performs event correlation
Collects, stores, compresses, and correlates logs from thousands of network devices and applications
Aggregates and normalizes data from FWs, IDS/IPS, and DLP solutions, raw network traffic, NetFlow,
application logs, user activity, etc.

For More Information

Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered
trademarks of Tenable Network Security, Inc. SecurityCenter and Passive Vulnerability Scanner are trademarks of Tenable Network
Security, Inc. All other products or services are trademarks of their respective owners. EN-MAY052014-V3

Vous aimerez peut-être aussi