Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Cyber Resilience Zone HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 NetApp Digital Newsroom The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

Sponsored

Cyber Risk Report: Innovation at Tenable

Tenable products give security teams the ability to rate threats across their entire attack surface, from IT to OT to Active Directory. This shows them where the greatest threats lie, allowing them to allocate time and resources efficiently.

With technology evolving at breakneck speed, rapidly converging systems have created new pathways for attackers. Solution Providers need visibility over their entire attack surface. Tenable.ep brings multiple tools together in one place to give you the visibility you need.

“You need to know what is meaningful in your environment from a risk standpoint and what is not because not every vulnerability is the same,” says Nathan Wenzler, Chief Security Strategist at Tenable. “Tenable.ep brings … together a lot of the different sensors and assessment tools into a single platform so that you can manage them together.”

Another risk factor is the converging sectors of IT and OT. Marty Edwards, Vice President of Operational Technology at Tenable, says, “Over the years, what’s happened is we’ve intentionally brought these systems closer and closer and closer together, to the point where now it’s very difficult for companies to actually tell where does OT end and IT begin?”

Tenable.ot gives security teams the ability to map attack vectors against OT devices and systems and rate these threats alongside IT security threats. Marty explains, “The OT technology really shines in being able to go out, interrogate these devices in a safe and reliable manner, and get the information out of them that then can be passed up into other Tenable products for combined analysis with their IT counterparts.”

Another commonly overlooked entry point is Active Directory. A breach in an organization’s Active Directory can be devastating. Tenable’s Chief Technology & Security Strategist, Derek Melber, says, “The worst-case scenario is Active Directory is compromised, and no one knows. They can launch ransomware and, boom, you’re done. Tenable.ad, the very first thing that it does is it gathers the Active Directory database and analyzes it, to tell you ‘Hey, you have a hundred issues here that you need to address now.’

Tenable.ep, .ot, and .ad solutions work together to show security teams where the greatest threats lie, allowing them to allocate time and resources efficiently.

Back to Top

Video

     

    trending stories

    sponsored resources