Tenable Network Security Unveils Verizon 2015 Data Breach Report Dashboards for SecurityCenter Continuous View

Share Article

Comprehensive dashboards help Tenable customers use Verizon DBIR insights to strengthen networks against cyber threats.

News Image
Tenable’s DBIR dashboards take advantage of SecurityCenter CV’s unique sensors and ability to automate complex, time-consuming tasks.

Tenable Network Security®, Inc., the leader in continuous network monitoring, today announced five new SecurityCenter Continuous View™ dashboards based on Verizon’s 2015 Data Breach Investigations Report (DBIR).

The Verizon DBIR is one of the most anticipated reports each year because it analyzes and highlights common attack patterns and identifies how often an attack vector results in a successful breach. Still, many organizations struggle to incorporate the DBIR findings into their security programs due to the overhead required to sift through volumes of data.

With the new Verizon DBIR dashboards in SecurityCenter Continuous View, Tenable removes the burden of manually collecting and filtering data and automates this process through preconfigured DBIR dashboards focused on five key areas of risk. SecurityCenter CV customers can now evaluate their networks against critical threats and top vulnerabilities, take action to prevent compromise, and incorporate best practices to improve the health of their networks.

“CISOs and their supporting teams need a way to make the Verizon DBIR information actionable,” said Ron Gula, CEO, Tenable Network Security. “Tenable’s DBIR dashboards take advantage of SecurityCenter CV’s unique sensors and ability to automate complex, time-consuming tasks. Customers get increased visibility into their security status and are able to put the DBIR’s key recommendations and best practices to use.”

Customers who practice continuous network monitoring will be able to quickly identify IOCs from active scanning, non-intrusive network activity monitoring, as well as event correlation from log analysis.

Tenable’s new DBIR dashboards focus on the following five themes:

Indicators of Compromise (IOC): Track IOCs like virus signatures, specific traffic patterns, specific IP addresses, malware, specific URLs, or domains of known illicit activity using continuous network monitoring.

Account Weakness: Identify vulnerabilities related to accounts and credentials to thwart basic attacks and reduce the chance of a data breach by eliminating weak passwords, default accounts and outdated policies.

Vulnerabilities and Malware Collection: Missing patches with Common Vulnerabilities and Exposure (CVE) IDs accounted for a large number of exploits according to the DBIR. The vast majority of exploited vulnerabilities were compromised more than a year after the CVE was published. This dashboard identifies such vulnerabilities so that patches can be quickly and efficiently applied.

Browser Vulnerabilities: Understand vulnerabilities in major web browsers including Firefox, Chrome, IE, Opera, and more. Using this dashboard, organizations can eliminate unauthorized web browsers, patch browser vulnerabilities and disable vulnerable plugins, thereby reducing the likelihood of a data breach.

Incident Pattern Monitoring: Organizations can reduce risk by monitoring for remote access, potential policy violations, anti-virus updates, data leakage, vulnerabilities, detected changes and suspicious activity.

“Data breach reports are interesting, but everyone wants to know what this means for their company and how their company compares,” said Christian A. Christiansen, program vice president of security products, IDC. “Tenable helps score those comparisons, identify the priorities, and suggests remediation. This is actionable guidance.”

For more information on each dashboard and how to use them, read the Tenable’s Continuous Network Monitoring and the Verizon DBIR whitepaper.

About Tenable Network Security
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable is relied upon by many of the world’s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense. For more information, please visit tenable.com.

Contact Information:
Andrew Flick
Tenable Network Security
aflick(at)tenable(dot)com
(410) 872-0555, ext. 559

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Andrew Flick
Tenable Network Security
+1 410.872.0555 Ext: 559
Email >
Visit website