FORGOT YOUR DETAILS?

Tenable

Unified Security Monitoring - Vulnerability Management - SIEM/Log Management - Compliance Management

Founded in 2002, Tenable is a privately held company and well-known across for a Unified Security Monitoring approach based on the award-winning Nessus scanner for securing enterprise networks world-wide. Nessus vulnerability scanner is the most widely distributed and utilized vulnerability scanner in the world. Tenable's Unified Security Monitoring solution consists of four fully integrated software applications: 1.Tenable SecurityCenter, 2.Nessus scanner, 3.Passive Vulnerability Scanner,4.Log Correlation Engine.

Tenable has pioneered and continues to innovate a unique Unified Security Monitoring approach as the systems functions to revolutionizing the way enterprises are monitoring (i.e: gathering, evaluating, communicating and reporting) security and compliance information. Tenable's award-winning products are agentless enterprise-class solutions and designed for the continuously monitoring of vulnerabilities, configurations, data leakage, log management and compromise detection which are used by thousands of organizations both large and small around the world. https://goo.gl/aGTLrb

E-SPIN and Tenable

E-SPIN is actively promoting Tenable full range of products and technologies as part of the company Vulnerability Management and Security Management solution portfolio - for vulnerability assessment, unified security monitoring (USM) - intergrated vulnerability management, SIEM, Compliance Management. E-SPIN also provides consulting, supplying, training and maintaining Tenable Network Security products for the enterprise, government and military customers (or distribute and resell as part of the complete package) to other regions.

The enterprise ranges from university, government and enterprise IT security professionals on the vulnerability assessment, penetration testing, or IT security company on the security audit and security operation center (SOC) for SIEM, Compliance Management to Unified Security Monitoring or cyber security / cyber warfare / military security defense operation center unified security and operation monitoring.

Please feel free to contact E-SPIN for your inquiry and requirement, so we can assist you on the exact requirement in the packaged solutions that you may required for your operation or project needs.

Tenable Product Overview

Nessus® is the world’s most widely-deployed vulnerability assessment scanner, chosen by more than 1.6 million users across the globe. Available as a single scanning solution as Nessus Professional or for multi-user teams as Nessus Manager, Nessus quickly and accurately identifies vulnerabilities, configuration and compliance issues, and malware in physical, virtual and cloud environments.

Tenable.io™ is the first Cyber Exposure platform to provide visibility into any asset on any computing platform. It enables security teams and executives to manage vulnerabilities and risks across the entire attack surface with confidence. Built on the leading Nessus technology from Tenable, Tenable.io delivers a modern approach that supports dynamic assets like cloud and containers.

The SecurityCenter® family manages and analyzes vulnerability data across the organization, prioritizes security risks and provides automated frameworks and compliance reporting. With continuous monitoring, security teams can measure and visualize the effectiveness of the security program using SecurityCenter’s pre-built, highly customizable dashboards and reports and the industry’s only Assurance Report Cards®.





 

 

Nessus® is the world’s most widely-deployed vulnerability assessment scanner, chosen by more than 1.6 million users across the globe. Available as a single scanning solution as Nessus Professional or for multi-user teams as Nessus Manager, Nessus quickly and accurately identifies vulnerabilities, configuration and compliance issues, and malware in physical, virtual and cloud environments.

Share Scan Resources
Share resources including scanners, schedules, policies and results to reduce the time and cost of security scanning and compliance auditing.

Constant Coverage
Protect against new vulnerabilities with the Nessus plugin feed that is constantly updated by the Tenable research team.

Multiple Scanning Modes
Nessus Manager offers both agent-less and agent-based scanning, enabling organizations to easily increase their scan coverage.

Broad Asset Coverage

Supports the widest range of network devices, operating systems, databases and applications in physical, virtual and cloud infrastructures.

Tight Integration & API Extensibility
Integrates with patch management, Mobile Device Management (MDM) and password vault solutions that complement a vulnerability management program.

Dashboards & Reports
Extensive interface for viewing scan results and generating reports, as well as dashboards to quickly view vulnerability counts and more.

 

Nessus Pro Product Overview

Perform assessments with the industry’s most widely deployed vulnerability scanner
Identify the vulnerabilities, policy-violating configurations and malware that attackers could use to penetrate your network.

Multiple Assessment Types
Protect your IT environment by running vulnerability scans, configuration and compliance checks, malware detection, web application scanning and more.

Rich Assessment Capabilities
Nessus includes a deep set of assessment capabilities, agent-less scanning and agent-based (available in Nessus Manager).

Ongoing Management
Nessus makes it easy to manage both the product and users, with automatic updates and a constant feed of new information from Tenable.

Connect With Core Systems
Integrate Nessus Manager with patch management, mobile device management and credential management systems.

Reporting
Run reports, easily filter data and share results with others in a variety of formats to help others in the organization understand and address vulnerabilities.

Tenable.io Product Overview

Cloud-Based Vulnerability Management Platform

Gain actionable insight into your security risks and where to focus with Tenable.io™ – the first vulnerability management platform built for today’s dynamic IT assets, including cloud, containers and web applications.

Bring clarity to your security and compliance posture with Tenable.io, the first vulnerability management platform created for today’s dynamic assets. Built on the leading Nessus technology, Tenable.io delivers a fresh, asset-based approach that accurately tracks resources, while supporting dynamic assets like cloud, mobile and virtual. Tenable.io delivers visibility and insight through an open and elastic platform, effectively prioritizing vulnerabilities while integrating seamlessly into your environment.

Tenable.io provides maximum coverage for your evolving assets through Nessus Sensors, which include active and agent scanning, as well as passive traffic listening – all provided at no extra cost. Its dashboards and reports accurately prioritize vulnerabilities, and a robust and fully documented API and SDKs facilitate integration. Tenable.io delivers a streamlined and intuitive user experience that delivers value quickly and helps your team acheive more. And Tenable.io offers the industry’s only elastic licensing approach, based on assets instead of IP addresses.

With Tenable.io, you’ll gain the information and context you need to secure your elastic attack surface -- and protect what matters most.

Features:

  • Integrated applications
  • Comprehensive scan options
  • Asset tracking
  • Documented API and integrated SDKs
  • Customer-friendly, elastic asset licensing
  • Receive 1 full year of product software updates, vulnerability updates
  • Phone/email/chat support as well as access to the Tenable Support Portal and knowledge base

Application Tenable.io

Integrated Applications

Tenable.io delivers multiple applications to solve your toughest security challenges, such as vulnerability management, container security, web application scanning and more to come. Applications are built on a common platform, leverage the Nessus® Sensors, API and SDK, and are accessed through a single interface, making it easy to activate new applications and become productive immediately.

Container Security

As the only vulnerability management solution to offer integrated container security capabilities, Tenable.io continuously monitors container images for vulnerabilities, malware and enterprise policy compliance. By bringing security into the container build process up front, organizations can gain visibility into the hidden risks in containers, remediate them before they reach production and ensure container images comply with enterprise IT security policies without slowing innovation cycles.

Comprehensive Scan Options

Included Nessus Sensors maximize scan coverage and reduce vulnerability blind spots. Active and agent scanning, as well as passive traffic listening are included at no extra cost. Active scanning provides the broadest coverage of assets and vulnerabilities, and agent-based scanning and passive traffic listening covers hard-to-scan assets, such as transient devices, and sensitive hosts, such as medical or industrial control devices.

Asset Tracking

Using an advanced asset identification algorithm, Tenable.io pinpoints the true identity of each resource in your environment – even dynamic assets like laptops, virtual machines and cloud instances. This algorithm uses an extensive set of attributes to accurately track changes to assets, regardless of how they roam or how long they last.

Documented API and Integrated SDK

Easily integrate and automate the sharing of capabilities and vulnerability data, or build on the Tenable.io platform, leveraging a fully documented API set and SDK. There is no extra cost to use these tools to maximize the value of your vulnerability data.

SLA With Uptime Guarantee

Tenable provides the vulnerability management industry’s first uptime guarantee through a robust service level agreement (SLA) for Tenable.io. Service credits are offered if the SLA is not met, just like leading cloud vendors, such as Amazon Web Services.

Tenable.io Vulnerability Management Product Overview

Bring clarity to your security posture through a fresh, asset-based approach that provides maximum coverage of your evolving assets and vulnerabilities in ever-changing environments.

Comprehensive Assessment Options

Nessus Sensors maximize scan coverage and reduce blind spots. Based on our popular Nessus technology, active scanning delivers the broadest coverage of assets and vulnerabilities. Agent-based scanning and passive traffic listening enable you to tackle troublesome assets, such as transient devices, and sensitive hosts, such as medical or industrial control devices.

Simplified Integrations

Tenable.io Vulnerability Management includes pre-built integrations with complementary systems, like password vault, patch management and Mobile Device Management (MDM) solutions. Leverage these integrations to quickly and easily streamline your vulnerability management program.

Asset Tracking

Using an advanced asset identification algorithm, Tenable.io pinpoints the true identity of each resource in your environment – even dynamic IT assets like laptops, virtual machines and cloud instances. This algorithm uses an extensive set of attributes to accurately track changes to assets, regardless of how they roam or how long they last.

Elastic Asset Licensing

With Tenable.io Vulnerability Management, you benefit from the industry’s only elastic licensing approach based on assets, instead of IP addresses. This makes it easier to custom- fit a vulnerability management solution to your unique environment.

Streamlined User Interface

With a modern interface and guided in-application messaging, Tenable.io Vulnerability Management makes common tasks, such as running an assessment, easier than ever. Pre-defined templates and configuration audit checks that follow best practices frameworks, such as CIS and DISA STIG, help you protect your organization with a fraction of the effort needed otherwise.

Fast and Accurate Scanning

Tenable.io Vulnerability Management scanning is built on the leading Nessus technology from Tenable, which delivers fast and accurate scanning with the industry's broadest asset and vulnerability coverage.

Tenable.io Container Security Product Overview

 

Provides comprehensive visibility into the security posture of container images as they are developed, enabling vulnerability assessment, malware detection, policy enforcement and remediation prior to container deployment.

Get Visibility Into Container Security Risks

As the only container security offering integrated into a vulnerability management platform, Tenable.io™ Container Security continuously monitors container images for vulnerabilities, malware and enterprise policy compliance. By bringing security into the container build process up front, organizations can gain visibility into the hidden risks in containers, remediate them before they reach production and ensure container images comply with enterprise IT security policies without slowing innovation cycles.

The Tenable.io Container Security Solution

Tenable.io Container Security stores container images and scans them as they’re built, before they can reach production. It provides vulnerability and malware detection, along with continuous monitoring of container images. By integrating with the continuous integration and continuous deployment (CI/CD) systems that build container images, Tenable.io Container Security ensures every container reaching production is secure and compliant with enterprise policy.

Tenable.io Container Security is aware of which containers are running on each host, as well as what’s inside each container. Tenable.io Container Security also understands the individual layers of the container and if a discovered vulnerability truly poses a threat.

Tenable.io Container Security complements previously released capabilities in Nessus® and Tenable.io Vulnerability Management that enable security teams to detect running Docker hosts and enumerate the containers running on them. Discovering and securing Docker hosts is an important first step in the container security journey. Tenable.io Vulnerability Management can also audit Docker hosts against the CIS Docker v1.12+ benchmark, helping you properly harden your container hosts.

The Security Challenge

Containers enable faster application delivery, increased IT efficiency and accelerated innovation. However, container adoption has outpaced security.

A key strength of containers – their ability to start up and power down almost instantly – has become a challenge to effective security practice.

Because containers may live for just hours or days, they’re unlikely to be seen by weekly or monthly vulnerability scans, allowing vulnerabilities to persist and remain hidden to your security team.

Tenable.io Container Security Product Overview

Tenable.io Web Application Security safely, accurately and automatically scans your web applications, providing deep visibility into vulnerabilities and valuable context to prioritize remediation.

PREVENT WEB APPLICATION BLIND SPOTS WITH CONFIDENCE

Application security leaders are under pressure to keep up with the pace and change of their business. Web applications are becoming increasingly complex with update frequencies now measured in weeks, not months. You need assurance that the vulnerabilities your developers are remediating are those with the highest priority to the organization.

AUTOMATED AND ACCURATE WEB APPLICATION SCANNING

Tenable.io Web Application Scanning delivers safe and automated vulnerability scanning that covers your entire online portfolio. Through comprehensive and accurate web application scanning as part of a complete vulnerability management solution, you can see and manage your security exposure across all types of assets and fully protect your organization.

KEY FEATURES

Enterprise Visibility

  • Understand the sitemap and layout of your web applications so you can see and assess your web applications globally.

Scan Safely

  • Define parts of critical web applications that are safe to scan, and define other parts that should never be scanned, in order to prevent performance latency and disruptions.

Automate Scans

  • Enable highly automated, no-touch scans for continuous protection. Easily define the frequency and timing parameters for automatic testing.

Protect Dynamic Apps

  • Scan your HTML5 and AJAX web applications, along with traditional HTML apps. Provide broad coverage to help you get the job done and avoid blind spots.

Unified View

  • Eliminate gaps and inconsistencies that come with managing multiple, siloed solutions. See and manage the results in one place to get a continuously updated view of all assets and vulnerabilities to fully protect your organization.

BENEFITS FOR SECURITY TEAMS
Reduce administration costs
  • Understand your security risk without the manual effort and time otherwise needed.
Certainty for fast developer remediation
  • Deliver highly accurate, actionable scan results with minimal false positives and negatives.
Reduce product sprawl
  • Understand your true risk across all types of assets without complexity or product sprawl.

Contact E-SPIN

Feel free to contact E-SPIN for various web application security requirement, from development, QA/QC, production and modern application lifecycle development and application security from dynamic, interactive, static and mobile application.

SecurityCenter Product Overview

SecurityCenter® consolidates and evaluates vulnerability data across your organization, prioritizing security risks and providing a clear view of your security posture. With SecurityCenter’s pre-built, highly customizable dashboards and reports, and the industry’s only Assurance Report Cards® (ARCs), you can visualize, measure and analyze the effectiveness of your security program.

Advanced Analytics

Consolidate and analyze all vulnerability data gathered from multiple Nessus® scanners distributed across your enterprise. Use Assurance Report Cards (ARCs) to measure, analyze and visualize your security program and evaluate program effectiveness.

Reporting and Dashboards

Leverage pre-built, highly customizable HTML5-based dashboards and reports. Quickly give CISOs, security managers, analysts and practitioners the visibility and context they need to take decisive action to reduce exposure and risk.

Alerts and Notifications

Utilize customizable alerts, notifications and actions to enable rapid response. Quickly alert administrators to high-priority security events, speed up incident response and vulnerability remediation, and reduce overall risk.

Asset Grouping and Assessment

Dynamically group assets based on policies to obtain a near real-time view into overall risk when new vulnerabilities are discovered. Speed mitigation by identifying how many assets are affected by new vulnerabilities in minutes instead of days, and easily see remediation progress.

Compliance

Use pre-defined checks against industry standards and regulatory mandates, such as CIS benchmarks, DISA STIG, FISMA, PCI DSS, HIPAA/HITECH, SCAP and more. Get the visibility and context you need to easily demonstrate adherence to multiple compliance initiatives.

Integrations

Utilize intelligent connectors to integrate with leading solutions in patch management, mobile device management, threat intelligence, cloud and more. Integrations leverage existing security investments to provide additional data and improve visibility, context and analysis.

SecurityCenter ContinuousView (SCCV) Product Overview

True Continuous Monitoring

SecurityCenter Continuous View® delivers a real-time, holistic view of all IT assets, network activity and events so you can find exploits and fix vulnerabilities faster.

Eliminate Critical Blind Spots

Continuously monitor in real time to discover assets and detect anomalous activity with SecurityCenter CV's Nessus® Network Monitor.

Find Actionable Context in Your Data

Get centralized log analysis and event monitoring with SecurityCenter CV's Log Correlation Engine®.

Asset Discovery

Actively search your network, passively monitor traffic and gather information from third-party IT systems and network devices to discover all hardware, services and web applications on your network.

Vulnerability Assessment

Actively and passively assesses systems, networks and applications to gain unmatched depth and continuous visibility of weaknesses that threaten your security posture.

Compliance

Use pre-defined checks against industry standards and regulatory mandates, such as CIS benchmarks, DISA STIG, FISMA, PCI DSS, HIPAA/HITECH, SCAP and more. Get the visibility and context you need to easily demonstrate adherence to multiple compliance initiatives.

Frameworks

Automate effective conformance to security frameworks such as NIST, CIS and ISO/IEC. Effectively measure, visualize and communicate the technical security controls that help you manage risk.

Malware Detection

Gain critical context with built-in threat intelligence that detects malware and identifies suspicious traffic to blacklisted external sites.

Integrations

Utilize intelligent connectors to integrate with leading solutions in patch management, mobile device management, threat intelligence, cloud and more. Integrations leverage existing security investments to provide additional data and improve visibility, context and analysis.

Vulnerability Analytics

Consolidate and analyze all vulnerability data gathered by SecurityCenter CV across your enterprise. Use Assurance Report Cards® (ARCs) to measure, analyze and visualize your security program and evaluate program effectiveness.

Assurance Report Cards

Communicate with the business by measuring, analyzing and visualizing the security posture of your IT enterprise at any time, and reporting results in an intuitive report card format.

E-SPIN and Tenable

E-SPIN and Tenable

Tenable Unified Security Monitoring – Vulnerability Management – SIEM/Log Management – Compliance Management Founded in 2002, Tenable is a privately held company and well-known across for a Unified Security Monitoring approach based on the award-winning Nessus scanner for securing enterprise networks world-wide. Nessus vulnerability scanner is the most widely distributed and utilized vulnerability scanner in
Tagged under: , ,
Rise of Docker and Application Container Security Platform - App Container vs VM
Rise of Docker and Application Container Security Platform – App Container vs VM Application Container Security, or more proper term Docker Security and Container Security Platform. When it comes to security, anything new is usually bad news, since you and your organization is not well prepare for it and legacy infrastructure and protection technology not
Compare Tenable SecurityCenter with SecurityCenter ContinuousView (SCCV) Still confusing for Tenable SecurityCenter and SecurityCenter ContinuousView (SCCV) what the main feature in common and differences? See the following comparison table. Asset Discovery SecurityCenter Continuous View SecurityCenter Active Discovery Multiple active discovery methods ✓ ✓ MDM Integration Query Mobile Device Management systems to augment asset attributes ✓
Common mistakes organizations make when adopting DevOps DevOps is the mega trend, if you had yet implemented it, like it or not, you can not avoid it to prevent your organization lose in the adoption and lag far behind compare with the competitors who adopt it before yours. This topic focus on common mistakes organizations
This video is about E-SPIN & Tenable Network Security: CyberSecurity Transformation Challenges and Solutions event cover the event opening, guest speaker talks, socialize and networking session summary and highlight.  
Tagged under: ,
This video is about E-SPIN SecurityCenter Continuous View Product Overview For those who can not join us for the full day Training session, please see the summary and highlight clip for the event. For further information, please contact us or visit to our website on http://www.e-spincorp.com
E-SPIN and VisiWave
Investments to accelarate technology Innovation and Global Expansion Columbia, MD, Sept. 5, 2012 – Tenable Network Security, Inc., whose widely used software identifies network security gaps before they are exploited by attackers, today announced $50 million in first-round funding from Accel Partners. Tenable will use the funds to expand its innovative security offerings and accelerate
Tagged under: ,
Getting started with Unified Security Monitoring (USM) couldn’t be easier. Read this book to: Find out what Unified Security Monitoring (USM) is all about Understand Unified Security Monitoring process, architecture, tools Learn how to perform passive vulnerability scanning for network and segment you are no authorize to scan and audit Learn how to perform log
TOP