Tenable’s Unknown and Shadow Assets solution provides the continuous visibility and critical context CISOs need to find unknown and shadow IT
Columbia, Md. (PRWEB) February 29, 2016
Tenable Network Security, Inc., a global leader transforming security technology for the business needs of tomorrow, announced a new solution for Unknown and Shadow Assets at RSA Conference 2016. Through active scanning, intelligent connectors and continuous listening, Tenable’s solution helps organizations discover all assets in their environment, bringing unknown and shadow assets into their security program.
“Mobile devices, cloud services and virtualized infrastructure make it easy for employees to bring new devices or applications onto the network without the IT department ever noticing,” said Ron Gula, CEO, Tenable Network Security. “This exposes the organization to increased risk by creating blind spots in the security posture and potentially leaving critical systems open to compromise and breach. Tenable’s Unknown and Shadow Assets solution provides the continuous visibility and critical context CISOs need to find unknown and shadow IT, improving security posture across the entire enterprise.”
Unlike traditional security solutions that fall short on delivering complete visibility across all endpoints and infrastructure, Tenable’s Unknown and Shadow Assets solution leverages the unique capabilities in the award-winning SecurityCenter Continuous View™ (SecurityCenter CV™). Active scanning periodically examines assets to determine risk levels, intelligent connectors integrate security data from existing security investments to improve context, and continuous listening monitors all network traffic in real time for known and unknown assets, arming organizations to take decisive action against complex threats and achieve true security assurance — including mobile, on-premises and cloud.
“One of the biggest challenges associated with the increasingly distributed nature of corporate IT environments is the lack of visibility associated with off-network activities and SaaS traffic,” said Robert Westervelt, information security analyst, IDC. “IDC has found that organizations often underestimate the number of SaaS-based services introduced by employees and used as part of their daily workflow. Some of the riskiest cloud services hog valuable network resources and expose employees to phishing attacks, ransomware infections, and other threats. Sanctioned cloud services are also a challenge because CISOs increasingly don't have visibility into how corporate data flows from the network to multiple cloud resources. As companies gradually migrate resources to the cloud, identifying and monitoring these services is another critical piece of establishing and maintaining situational awareness.”
With ActiveSync and Mobile Device Management (MDM) integration, Tenable simplifies identification and security monitoring of transient devices, such as laptops, and mobile devices, like smartphones and tablets. Tenable’s passive traffic and event monitoring capabilities detect and profile all devices, services and applications in use. By determining the relationships among assets and assessing them for vulnerabilities in near-real time, Tenable provides the critical context to help organizations make informed decisions for effective and timely response.
"SecurityCenter has really helped us making better decisions about asset control and dealing with shadow IT," said James Kahl, CCNA and Network Administrator at Methodist Healthcare Ministries of South Texas, Inc., the largest, private funding source of healthcare services for the uninsured in South Texas. "It's easy to miss systems as you grow or as people leave if you're trying to track everything manually but with SecurityCenter, we automatically know as systems come and go from our network."
To schedule a demo or for more information on how to defend your network against unknown assets and shadow devices, visit tenable.com/solutions/shadow-assets.
About Tenable Network Security
Tenable Network Security transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail and energy. Transform security with Tenable, the creators of Nessus and leaders in continuous monitoring, by visiting tenable.com.
# # #
Tenable Network Security
aflick (at) tenable (dot) com
(410) 872-0555 x559