Nov 11 2024
Security

Product Spotlight: Tenable’s Vulnerability Platform Fixes Hidden Security Risks

Modern hybrid networks are complex. Tenable helps make them safer.

Even at the network level, computing used to be a lot less complex for most businesses. There were desktops and servers and maybe some outside connections for services such as email or web browsing, with the bulk of computing assets stored either on-premises or in data centers. Keeping track of vulnerabilities could be accomplished using fairly simple scans, then fixed with some quick patches made by small IT teams.

Today, things are vastly different. Hybrid computing environments include cloud assets mixed into public and private implementations. They exist alongside on-premises assets that now consist of laptops, desktops, smartphones and millions of Internet of Things devices. Software-based networking means that assets can spin up in the blink of an eye. All of that makes it functionally impossible for even many medium-sized businesses to keep track of all of their assets, much less the vulnerabilities they contain.

Click the banner below to get expert insights on simplifying cloud adoption.

 

Technically, basic vulnerability scanners could still work. It’s just that IT teams couldn’t possibly ever fix the thousands or even millions of vulnerabilities that they would discover these days. Enter the cloud-based Tenable Vulnerability Management platform, which not only finds those vulnerabilities but can also present the most logical way to fix critical problems before an adversary can exploit them.

In fact, the platform was designed with modern, complex environments in mind. To delve into these interconnected environments that exist in multiple places and sometimes with differing security levels, the platform uses a combination of active scanning agents, passive monitoring and cloud connectors to search for vulnerabilities. It’s always active, so users don’t ever need to trigger scans. Because of that, it can find brand-new vulnerabilities hidden inside, for example, a device connecting to a network for the first time, or a cloud instance being spun up to support some new project.

Tenable VMS

 

Manage Cyberthreats with Help From AI

Once armed with a list of potentially thousands of discovered vulnerabilities, the Tenable platform then applies machine learning, data science, active threat feeds and artificial intelligence to calculate which fixes need to be made immediately. It goes well beyond the typical Common Vulnerability Scoring System used by many vulnerability managers to ask additional risk-based questions.

Important factors in ranking vulnerabilities include whether critical assets are involved, how widely spread a vulnerability is across platforms or how easily an attacker could exploit the situation. The Tenable Vulnerability Management platform can even consider whether there are active threat campaigns targeting that particular flaw.

Cloud TOC

 

In my testing, we set up a large test bed with mostly cloud-based assets as well as some on-premises servers, client machines and devices. The Tenable Vulnerability Management platform found over 1,400 potential vulnerabilities and designated 32 as critical, specifically flagging 14 that needed immediate attention. It provided a description of every vulnerability it located, the danger each represented, and instructions and advice on mitigation tactics.

Even large IT teams can struggle to keep track of every new vulnerability in complex networks these days. The Tenable Vulnerability Management platform can offer help, finding and fixing issues long before attackers can discover and exploit them.

SPECIFICATIONS

Product Type: Vulnerability Management Platform
Size of Known Vulnerabilities Database: 130,000 and constantly expanding
User Interface: Web-based portal
Distribution: As a Service through the cloud
Software Engagement Type: License per seat or user

Gain Access to In-Depth Security Dashboards

Tenable is well known for creating some of the best-looking and most easily accessible security dashboards in the industry. The company brings that same level of expertise to its vulnerability management platform. Not only can the dashboard work automatically based on both preset preferences and what it discovers through machine learning, it can also be manipulated to provide details about almost any aspect of the vulnerability landscape.

Without any prompting or help, the platform will display an informative dashboard that colorfully lays out the vulnerabilities hiding within a network. It’s extremely accurate at listing critical vulnerabilities that need immediate attention, coloring them red and grouping them from left to right based on severity.

Based on that, IT teams can prioritize their limited resources toward fixing a few dozen most dangerous problems mingling in with thousands of other, less problematic vulnerabilities.

But the Tenable platform can do much more than that. Users can slice that data however they like by setting up queries via a series of drop-down menus. For example, if you need to know if there are any breaches inside your network that are in the news, it can show you that. Users can also select broad categories of potential vulnerabilities, such as those that could provide access to critical assets, or those that are easy for attackers to exploit. You can even search for specific vulnerabilities by name and bring those to the surface.

Not only are vulnerabilities easy to search and see on the Tenable dashboard, they can also be filtered into reports that can be forwarded to others. In this way, IT teams can share security information with company officials who may not be as technically skilled but who can easily understand such reports. You can even configure those reports to fire off on a regular basis, a perfect way to demonstrate consistent progress to bosses over time.

Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.