Stephanie Dunn is a Staff Cloud Security Engineer at Tenable, where she specializes in cloud security administration and architecture. She holds several certifications, including Certified Information Systems Security Professional (CISSP) and AWS Certified Security – Specialty certification.
Red Hat Enterprise Linux (RHEL) is a commercially supported and highly scalable Linux distribution that supports virtualization, open source software, and a variety of hardware platforms. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden RHEL operating systems. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Red Hat Benchmarks.
As infrastructure demands evolve to support cloud, mobile, and virtualization needs, many organizations continue to rely on Microsoft Windows servers to support business requirements. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden Windows Server operating systems. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Microsoft Windows Server Benchmarks.
Windows workstations remain one of the most popular client systems used within modern networks. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden Windows operating systems. Data presented within these report templates includes a high-level overview of results gathered from CIS compliance scans using the CIS Microsoft Workstation Benchmarks.
Vulnerabilities can be found in every part of an organization’s infrastructure including routers, servers, firewalls, firmware, and software. Many of these vulnerabilities can include exploits that can allow for attackers to gain control over critical systems and data, and pivot to other systems across the enterprise. This report provides a summary of the exploitable vulnerabilities passively detected by Nessus Network Monitor (NNM), which can be used to compare the effectiveness of patch management efforts, and whether existing security controls need to be modified.
As more organizations continue to move towards a cloud-based environment, many are utilizing Docker containers to deploy systems and applications quickly without additional overhead. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden operating systems and applications. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Docker Benchmarks.
As networks continue to become increasingly complex and interconnected, many organizations struggle to maintain a secure enterprise. The Center for Internet Security (CIS) is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden network devices and appliances. These report templates provide a high-level overview of results gathered from CIS compliance scans using the CIS Cisco Benchmarks.
Organizations will always have a certain number of vulnerabilities and risks present within their environment. Without having a clear and continuous view of existing vulnerabilities, organizations will struggle to identify and respond to threats in a timely manner. Information presented within this dashboard will provide organizations with the actionable intelligence needed to improve overall security posture and protect critical assets.
Network assets are always in a constant state of change, as systems traverse the network, and software is installed or updated. Changes can update critical devices or applications, allow for malicious devices or malware to connect to the network, or leave security gaps in devices that can easily be exploited.This dashboard covers key concepts within the NIST 800-53 guide that supports monitoring hardware and software asset changes, and the status of existing security controls.
Most organizations have security controls in place that focus on protecting the network perimeter, but do not adequately monitor what’s going on inside the network. Unfortunately, many fail to monitor devices that are being connected to the network, and what services are being used. Attackers will exploit vulnerabilities within devices and services to infiltrate the network. Information presented within this report provides a comprehensive look at devices and services in use, and highlights whether systems or security controls need to be hardened.
Assigning responsibility for patching systems can vary depending on the number of locations, industry type, and size of the organization. Without having an effective patch management process in place, organizations can easily lose track of who is responsible for managing and patching systems. This dashboard can assist an organization in tracking patch management responsibilities, and provide a clear understanding on how often systems are being patched.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
Fill out the form below to continue with a Nessus Pro trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].
Request a demo
Tenable Patch Management
Streamline security and IT collaboration and shorten the mean time to remediate with automation.