Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

David Schwalenberg

David Schwalenberg's picture
David Schwalenberg is a Senior Information Security Content Analyst on the SecurityCenter research team. David makes use of his considerable experience in Information Security to create standards-based content for SecurityCenter customers. Prior to joining Tenable, David worked for a government agency doing information assurance, and before that he was a video game programmer. David has contributed to the NSA Manageable Network Plan, NIST SP 800-61 (Computer Security Incident Handling Guide), and other information assurance publications.
SC Report Template
Tuesday, November 8, 2016

Insiders are those users – be they employees, contractors, or partners – that already have access to the organization's network and resources. The threat is that these insiders may either accidentally or intentionally do something to harm the network, compromise resources, or leak private data. This report brings together passive listening and host analysis to assist with monitoring users on the network and combating insider threats.

SC Dashboard
Monday, June 20, 2016

Default configurations for operating systems, applications, and devices tend to be geared for ease-of-use rather than security. If these systems are not locked down, attackers will find opportunities to exploit them. This dashboard aligns with CIS Critical Security Controls 3 and 11, Secure Configurations, which address establishing and maintaining secure configurations for applications and devices.

SC Dashboard
Monday, June 20, 2016

Organizations that don’t continuously look for vulnerabilities and proactively address discovered flaws are very likely to have their network compromised and their data stolen or destroyed. Tenable.sc is an on-premises Cyber Exposure platform which helps organizations reduce risk and manage discovered vulnerabilities. By implementing Cyber Exposure, organizations are able to continuously monitor for new threats on the network.

SC Dashboard
Friday, June 17, 2016

Vulnerable devices and applications on an organization's network pose a great risk to the organization and could allow attackers to compromise the network. A robust vulnerability scanning and risk assessment process combined with a sound vulnerability management and remediation program can go far to protect an organization. This dashboard presents detected vulnerabilities by plugin family grouping and can assist an organization in identifying vulnerabilities, prioritizing remediations, and tracking remediation progress.

SC Dashboard
Tuesday, May 24, 2016

Reviewing system and network logs is a recommended security best practice, but it can be a daunting task. Fortunately, the Tenable Log Correlation Engine (LCE) can help. This dashboard allows an analyst to investigate any events that have occurred without stopping for long periods of time, as that activity may indicate system or network problems, or even network attacks.

SC Dashboard
Wednesday, May 18, 2016

The annual Verizon Data Breach Investigation Report (DBIR) notes that a vast majority of all attacks fall into a few basic patterns. One best practice that can assist in thwarting these attacks is eliminating account weaknesses and vulnerabilities. This dashboard presents vulnerabilities related to accounts and credentials in order to help an organization reduce its chance of a data breach by eliminating weak passwords, default accounts, and lax policies.

SC Dashboard
Wednesday, May 18, 2016

The annual Verizon Data Breach Investigation Report (DBIR) notes that a vast majority of all attacks fall into a few basic patterns. One best practice that can assist in thwarting these attacks is patching and correctly configuring web browsers. This dashboard displays actively and passively detected vulnerability information for the major web browsers in order to help an organization reduce its chance of a data breach by eliminating unauthorized web browsers, patching browser vulnerabilities, and disabling vulnerable plugins.

SC Dashboard
Wednesday, May 18, 2016

The annual Verizon Data Breach Investigation Report (DBIR) notes that a vast majority of all attacks fall into a few basic patterns. This dashboard displays several components that can assist an organization in monitoring its network to reduce the successfulness of these attack patterns. The dashboard covers monitoring for remote access, potential policy violations, antivirus, data leakage, vulnerabilities, detected changes, and suspicious activity.

SC Dashboard
Wednesday, March 30, 2016

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability of the bulk power system in North America. The NERC CIP Standards provide a cyber security framework for the identification and protection of BES Cyber Systems. For organizations that are required to be CIP compliant, this dashboard can assist in monitoring for malicious code and activity on SCADA systems on the network, which will aid in meeting the CIP-007 R3 requirements and measures.

SC Dashboard
Tuesday, March 29, 2016

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability of the bulk power system in North America. The NERC CIP Standards provide a cyber security framework for the identification and protection of BES Cyber Systems. For organizations that are required to be CIP compliant, this dashboard can assist in monitoring user access management and control, which will aid in meeting the CIP-004 R4 and R5 and CIP-007 R5 requirements and measures.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.