Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Cesar Navas

Associate Software Engineer

Cesar Navas's picture
Cesar Navas is an Associate Software Engineer at Tenable. Cesar specializes in creating dashboards, reports and ARCs for Tenable.sc, addressing critical compliance issues, current vulnerabilities and network asset discovery. Cesar is knowledgeable with SCADA protocols and understands the difficulties of Vulnerability Management within a delicate SCADA Network. Cesar's expertise in Cyber Exposure and Vulnerability Management provide a solid foundation for the the data visualization content he develops.
SC Dashboard
Wednesday, October 19, 2016

Preventative measures alone will never be completely successful in stopping network intrusions and compromise, so continuous monitoring is needed to detect suspicious activity indicating network defenses have been breached. This dashboard aligns with Section VIII of the ANSSI 40 Essential Measures for a Healthy Network guide: Monitor Systems. Relying primarily on information from the LCE, this dashboard helps an organization continuously monitor the network and recognize any suspicious activity that may need further investigation.

SC Dashboard
Tuesday, October 18, 2016

Perimeter devices provide the first line of defense in preventing attacks that occur on a daily basis against internal systems. This dashboard aligns with Section VII of the ANSSI 40 Essential Measures for a Healthy Network: Protect the Internal Network from the Internet. Using this dashboard, an organization will better understand how the internal network can be accessed externally and what security concerns are present.

SC Dashboard
Friday, October 14, 2016

Network attacks typically target servers and perimeter devices in an attempt to infiltrate the network. This dashboard aligns with Section V of the ANSSI 40 Essential Measures for a Healthy Network: Secure Computer Terminals. Using this dashboard, an organization will be able to obtain information about configuration compliance failures and other policy-related concerns such as remote access and the use of portable devices and removable media.

SC Dashboard
Wednesday, October 12, 2016

New vulnerabilities are constantly being discovered in production software. This dashboard aligns with Section III of the ANSSI 40 Essential Measures for a Healthy Network guide: Upgrade Software. Using this dashboard will assist an organization in better patching and updating the software on network systems, and ultimately safeguarding critical assets and data.

SC Dashboard
Tuesday, October 11, 2016

As organizations continue to support workforce mobility, failing to monitor and control network connectivity can lead to the compromise of critical systems and sensitive data. This dashboard aligns with Section II of the ANSSI 40 Essential Measures for a Healthy Network: Control the Network. Using this dashboard, an organization will be able to better monitor network connectivity, access control, and connections of mobile and removable devices.

SC Dashboard
Monday, October 10, 2016

Many organizations struggle to implement and maintain an effective asset management program. This dashboard aligns with Section I of the ANSSI 40 Essential Measures for a Healthy Network: Know the Information System and Its Users. Using this dashboard, an organization will be able to obtain comprehensive information about assets, software installations, privileged user groups, and changes on the network.

SC Dashboard
Monday, October 10, 2016

The federal government relies heavily on external service providers and contractors to assist in carrying out a wide range of federal missions. In order to protect information processed by, stored on, or transmitted through nonfederal information systems, NIST SP 800-171 provides recommended requirements, including the Audit and Accountability and System and Information Integrity families of requirements. This dashboard assists the organization in the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.

SC Report Template
Thursday, August 25, 2016

Vulnerable application development software can be exploited, increasing the threat landscape to an organization. Tenable.sc CV has the ability to enumerate known application development software, such as VBScript, Xcode, and Java Development Kit. This report can assist the analyst in the identification of vulnerable development software, which potentially can give an attacker the ability to execute arbitrary code.

SC Dashboard
Monday, August 22, 2016

Vulnerable application development software can be exploited, increasing the threat landscape to an organization.The Application Development Summary dashboard enumerates known application development software, such as VBScript, Xcode, and Java Development Kit. This dashboard can assist the analyst in the identification of vulnerable development software, which potentially can give an attacker the ability to execute arbitrary code.

SC Dashboard
Thursday, July 7, 2016

Analysts can increase the chances of detecting and minimizing the impact of data compromise or other threats through log collection, review, and proactive analysis. PCI DSS requirements require organizations to collect all logs for retention and analysis. This dashboard provides analysts with methods to quickly see event types from logs as well as adhere with PCI security requirements.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.