Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Virtual Computing Summary

by Megan Daudelin
August 1, 2016

Virtual Computing Summary Dashboard Screenshot

Monitoring virtual computing technologies for vulnerabilities is essential to securing a network against exploitation. The pervasive implementation of virtual computing technologies complicates vulnerability management and remediation efforts. By leveraging vulnerability data gathered by Tenable Nessus, Tenable SecurityCenter is able to provide detailed insight into vulnerabilities related to virtual computing technologies deployed in an environment.

The Virtual Computing Summary dashboard provides insight into vulnerabilities associated with various virtual computing technologies that may expose an organization to increased risk of exploitation. Vulnerabilities related to common virtual computing technology vendors and software are specifically tracked. Virtual computing technologies are being increasingly deployed in place of physical devices, and as a result can be targeted for exploitation. By monitoring the network specifically for vulnerabilities in virtual computing technologies, security teams can more effectively secure the network against exploitation and intrusion.

The components in this dashboard leverage data gathered by active vulnerability scanning with Nessus and can also use passive vulnerability detection with Tenable Passive Vulnerability Scanner (PVS). The data collected is filtered to provide insight into the vulnerabilities related to virtual computing technologies in the environment. Vulnerabilities are tracked by time, severity, and exploitability in order to provide a more complete view of the security status of the network. Security teams can use all of the components in this dashboard to assist in identifying, monitoring, and remediating virtual computing technology vulnerabilities that may expose their organization to risk.

This dashboard is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboard can be easily located in the SecurityCenter Feed under the category Threat Detection & Vulnerability Assessments. The dashboard requirements are:

  • SecurityCenter 5.3.1
  • Nessus 6.6.2

Tenable SecurityCenter provides extensive network monitoring by leveraging a unique combination of detection, reporting, and pattern recognition utilizing industry recognized algorithms and models. SecurityCenter is continuously updated to detect advanced threats and vulnerabilities. Tenable constantly analyzes information from our unique sensors, delivering continuous visibility and critical context and enabling decisive action that transforms the security program from reactive to proactive. Continuous vulnerability analysis enables security teams to more effectively tailor remediation efforts. Monitoring the network to ensure that all systems are secured against vulnerabilities is essential to ongoing security efforts. Tenable’s extensive network monitoring capabilities can verify that systems are successfully scanned regularly and secured against vulnerabilities, enabling ongoing improvements to an organization’s security posture.

The following components are included in this dashboard:

  • Virtual Computing Status at a Glance: This matrix displays the counts of vulnerabilities related to virtual computing technologies by severity and discovery date.
  • Virtual Computing Trend (Last 90 Days): This trend chart depicts the detection of vulnerabilities related to specific virtual computing technologies over the last 90 days.
  • Virtual Computing Criticals at a Glance: This table lists the critical vulnerabilities related to virtual computing technologies detected in the environment.
  • Virtual Computing Vulnerability Summary: This matrix displays information about the systems and vulnerabilities detected on the network, listed by virtual computing technology.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now