Home Security Tenable combines IT and OT security

Tenable combines IT and OT security

A new release of the Tenable.io cloud-based security platform provides vulnerability management for traditional and modern IT assets as well as OT systems such as SCADA and medical equipment.

”Security teams using legacy vulnerability management tools are not equipped to handle the converging world of IT and OT because when it comes to modern assets like containers, they’re completely blind,” said Tenable chief product officer Dave Cole (pictured).

“Massive shifts in computing coupled with today’s elastic attack surface have left enterprises struggling to gain visibility into their exposure areas. Increasing network diversity due to the rise of IoT and the convergence of IT and OT are only compounding the issue.

"CISOs need a complete and reliable view of the entire modern computing environment so they can take a proactive approach to managing the security challenges of today and tomorrow.”

According to the company, Tenable.io is the first platform to provide complete and centralised visibility of all traditional and modern assets including OT.

Multiple components can be used to provide broad asset discovery and vulnerability identification at a pace that matches the tempo of today's DevOps-led environments.

Tenable.io

Tenable.io Container Security claims to provide visibility within container images as they are created, with vulnerability assessment, malware detection and policy enforcement prior to deployment.

Nessus Network Monitor passively analyses network traffic, giving continuous visibility of managed and unmanaged IT and OT assets on the network. New capabilities include asset discovery and vulnerability identification on critical infrastructure and embedded systems, such as SCADA systems. Supported protocols include Bacnet, CIP, DNP3, Ethernet/IP, Modbus/TCP, Siemens S7, ICCP, IEC 60870-5- 104, IEEE C37.118, and OpenSCADA.

Tenable.io now includes pre-built scan templates for identifying systems exposed to all Shadow Brokers exploits, including WannaCry, EternalRocks and any new versions of these attacks, plus a check for the recent Intel AMT vulnerability (INTEL-SA- 00075).

Tenable.io Web Application Scanning is a new product within the platform to automatically identify vulnerabilities in web applications. It will be generally available on 14 July.

LEARN HOW TO BE A SUCCESSFUL MVNO

Did you know: 1 in 10 mobile services in Australia use an MVNO, as more consumers are turning away from the big 3 providers?

The Australian mobile landscape is changing, and you can take advantage of it.

Any business can grow its brand (and revenue) by adding mobile services to their product range.

From telcos to supermarkets, see who’s found success and learn how they did it in the free report ‘Rise of the MVNOs’.

This free report shows you how to become a successful MVNO:

· Track recent MVNO market trends
· See who’s found success with mobile
· Find out the secret to how they did it
· Learn how to launch your own MVNO service

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.