Tenable Network Security Unveils Verizon 2015 Data Breach Report Dashboards for SecurityCenter Continuous View

Tenable Network logo

Tenable Network Security®, Inc., announced five new SecurityCenter Continuous View™ dashboards based on Verizon’s 2015 Data Breach Investigations Report (DBIR).

The Verizon DBIR is one of the most anticipated reports each year because it analyses and highlights common attack patterns and identifies how often an attack vector results in a successful breach. Still, many organisations struggle to incorporate the DBIR findings into their security programs due to the overhead required to sift through volumes of data.

With the new Verizon DBIR dashboards in SecurityCenter Continuous View, Tenable removes the burden of manually collecting and filtering data and automates this process through preconfigured DBIR dashboards focused on five key areas of risk. SecurityCenter CV customers can now evaluate their networks against critical threats and top vulnerabilities, take action to prevent compromise, and incorporate best practices to improve the health of their networks.

“CISOs and their supporting teams need a way to make the Verizon DBIR information actionable,” said Ron Gula, CEO, Tenable Network Security. “Tenable’s DBIR dashboards take advantage of SecurityCenter CV’s unique sensors and ability to automate complex, time-consuming tasks. Customers get increased visibility into their security status and are able to put the DBIR’s key recommendations and best practices to use.”

Customers who practice continuous network monitoring will be able to quickly identify indicators of compromise (IOCs) via active scanning, non-intrusive network activity monitoring, and event correlation from log analysis.

Tenable’s new DBIR dashboards focus on the following five themes:

Indicators of Compromise:  Track IOCs such as virus signatures, specific traffic patterns, specific IP addresses, malware, specific URLs, or domains of known illicit activity using continuous network monitoring.

Account Weakness: Identify vulnerabilities related to accounts and credentials to thwart basic attacks and reduce the chance of a data breach by eliminating weak passwords, default accounts and outdated policies.

Vulnerabilities and Malware Collection: Missing patches with Common Vulnerabilities and Exposure (CVE) IDs accounted for a large number of exploits according to the DBIR. The vast majority of exploited vulnerabilities were compromised more than a year after the CVE was published.  This dashboard identifies such vulnerabilities so that patches can be quickly and efficiently applied.

Browser Vulnerabilities: Understand vulnerabilities in web browsers including Firefox, Chrome, IE, Opera, and more.  Using this dashboard, organisations can eliminate unauthorised web browsers, patch browser vulnerabilities and disable vulnerable plugins, thereby reducing the likelihood of a data breach.

Incident Pattern Monitoring: Organisations can reduce risk by monitoring for remote access, potential policy violations, anti-virus updates, data leakage, vulnerabilities, detected changes and suspicious activity.

Recent Articles

COVID-19 is writing a new world order

Posted on: April 6, 2020

Amidst the socio-economic disruptions caused by COVID-19, the common cause of finding a solution to the pandemic has brought together individuals, institutions, communities, governments and society at large. Looking at such collaborative initiatives, says CP Gurnani, MD and CEO, Tech Mahindra.

Read more

IoT ecosystem association adds connected health and wellness to key verticals in face of COVID-19

Posted on: April 3, 2020

The Internet of Things Consortium (IoTC), a business development association for the Internet of Things (IoT) ecosystem, announced it will add connected health and wellness to its key verticals of focus.

Read more