Tenable Incorporates Top Four ASD Strategies in Latest Release of SecurityCenter Continuous View Dashboard

0

Tenable LogoNew measures help organisations address security program weaknesses and identify vulnerabilities.

Tenable Network Security, Inc., the leader in continuous network monitoring, has released the latest version of its SecurityCenter Continuous View™ (SC CV) dashboard. Incorporating the top four strategies identified in the 2014 update of the Australian Signals Directorate’s (ASD) security publication, “Strategies to Mitigate Targeted Cyber Intrusions,” the new SecurityCenter CV dashboard adheres to government-mandated security requirements to bring greater visibility to security processes and enables organisations to address weaknesses or gaps in their security program and identify all of their vulnerabilities, eliminating blind spots in their network.

The ASD report found over 85 percent of the cyber intrusions that ASD responds to could be prevented by following four key mitigation strategies that address the following areas: application whitelisting, patching applications, patching operating system vulnerabilities and restrictions to administrative privileges.

The newly released SC CV dashboard introduces additional critical components to support the ASD’s top four strategies and provides security analysts with an instantaneous view of security findings.  At the same time, it leverages SC CV’s continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance, enabling organisations to react to advanced threats, zero-day vulnerabilities and new regulatory compliance requirements.

Solution components that provide insight into the top four ASD strategies include: Active OS and Application Vulnerability Counts, OS and Application Top Remediations, Application Top Remediations, OS Top Remediations, Passive OS and Application Vulnerability Counts, Group Membership Indicators, Software Modification Events and List of Software.

Security analysts can use the dashboard to obtain a quick situation overview or drill down into any component to obtain more granular information.  Additionally, dashboards can be customised to meet the unique reporting and monitoring needs of individual departments and organisations.

“The threat of targeted cyber intrusion has reached an all-time high but by implementing ASD’s recommended mitigations, an organisation can reduce the impact to Australia’s economic well-being and that of its citizens,” said Attley Ng, vice president of sales for APAC, Tenable Network Security. However, for any one organisation to implement all 35 strategies requires time and resources, and that raises the risk of delayed action because the project is too big. By packaging the top four strategies into the new SecurityCenter dashboard, organisations can act quickly to reduce risk for a relatively small investment of time, effort and money.”

Richard Byfield, Managing Director, Datacom TSS, said,  “The threat of targeted cyber intrusion has reached an all-time high but by implementing ASD’s Top 35 recommended mitigation strategy, an organisation can reduce the impact to Australia’s economic well-being and prevent data breaches. However, for any one organisation to implement all 35 strategies requires time and resources, and that raises the risk of delayed action because the project is too big.  By packaging the top four strategies into the new SC CV dashboard, organisations can gain the visibility they need to respond quickly to reduce and manage these risk for a relatively small investment of time, effort, and money.”

Share.