Home Security Tenable combines IT and OT security

A new release of the Tenable.io cloud-based security platform provides vulnerability management for traditional and modern IT assets as well as OT systems such as SCADA and medical equipment.

”Security teams using legacy vulnerability management tools are not equipped to handle the converging world of IT and OT because when it comes to modern assets like containers, they’re completely blind,” said Tenable chief product officer Dave Cole (pictured).

“Massive shifts in computing coupled with today’s elastic attack surface have left enterprises struggling to gain visibility into their exposure areas. Increasing network diversity due to the rise of IoT and the convergence of IT and OT are only compounding the issue.

"CISOs need a complete and reliable view of the entire modern computing environment so they can take a proactive approach to managing the security challenges of today and tomorrow.”

According to the company, Tenable.io is the first platform to provide complete and centralised visibility of all traditional and modern assets including OT.

Multiple components can be used to provide broad asset discovery and vulnerability identification at a pace that matches the tempo of today's DevOps-led environments.

Tenable.io

Tenable.io Container Security claims to provide visibility within container images as they are created, with vulnerability assessment, malware detection and policy enforcement prior to deployment.

Nessus Network Monitor passively analyses network traffic, giving continuous visibility of managed and unmanaged IT and OT assets on the network. New capabilities include asset discovery and vulnerability identification on critical infrastructure and embedded systems, such as SCADA systems. Supported protocols include Bacnet, CIP, DNP3, Ethernet/IP, Modbus/TCP, Siemens S7, ICCP, IEC 60870-5- 104, IEEE C37.118, and OpenSCADA.

Tenable.io now includes pre-built scan templates for identifying systems exposed to all Shadow Brokers exploits, including WannaCry, EternalRocks and any new versions of these attacks, plus a check for the recent Intel AMT vulnerability (INTEL-SA- 00075).

Tenable.io Web Application Scanning is a new product within the platform to automatically identify vulnerabilities in web applications. It will be generally available on 14 July.

REASON TO CHOOSE TENDA MESH WIFI

Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.

· Best valued product
· Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
· Aesthetically pleasing and light weigh (blend into any room deco)
· Wireline backhauls supported
· Product units are pre-paired and easy to setup
· Not requiring phone number or email address to set up
· Wall penetration (better than other similar brands)
· Seamless WiFi roaming
· User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more

CLICK FOR MORE INFO!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect