Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

David Schwalenberg

David Schwalenberg's picture
David Schwalenberg is a Senior Information Security Content Analyst on the SecurityCenter research team. David makes use of his considerable experience in Information Security to create standards-based content for SecurityCenter customers. Prior to joining Tenable, David worked for a government agency doing information assurance, and before that he was a video game programmer. David has contributed to the NSA Manageable Network Plan, NIST SP 800-61 (Computer Security Incident Handling Guide), and other information assurance publications.
SC Dashboard
Wednesday, September 23, 2015

Monitoring web activity for known threats or other related vulnerabilities is often difficult for security operations. Many organizations have content filters, anti-virus gateways, and intrusion detection/prevention systems; but security analysts often times do not have direct access to the logs for these systems. SecurityCenter Continuous View (CV) allows the operations team to monitor web activity via sniffing DNS requests and monitoring related traffic.

SC Report Template
Tuesday, August 18, 2015

Managing risk can seem to be an overwhelming task -- even more so when security managers don’t have metrics to show progress. Tenable.sc Continuous View has the ability to track mitigated vulnerabilities, allowing management to see and understand that progress is being made and how it is being measured. This report provides executives with an evolving view of mitigated vulnerabilities compared to unmitigated vulnerabilities.

SC Dashboard
Thursday, August 6, 2015

The most effective way to detect and prevent network compromise and data breaches is through early recognition and investigation of potentially suspicious network activity. SecurityCenter Continuous View (CV) collects and correlates network data from many sources in order to provide a centralized view of current network activity. This dashboard is a collection of various components that highlight potentially unauthorized, suspicious, or malicious activity, such as targeted intrusions, botnet interaction, activity spikes, data leakage, and more.

SC Report Template
Wednesday, July 29, 2015

Many services used by today's organizations are cloud based. This report can assist an organization in detecting and tracking network interactions with cloud services such as file storage and sharing services, customer relationship management (CRM) services, resource planning services, and others. Organizations can also use this report to discover if any unauthorized cloud service interactions are occurring and even determine potential vulnerabilities associated with the use of cloud services.

SC Dashboard
Tuesday, June 23, 2015

The Logjam attack (CVE-2015-4000) exploits a flaw in the TLS protocol that allows a man-in-the-middle attacker to downgrade the cryptography on vulnerable TLS connections, allowing the attacker to read and modify data sent over the connection. The Logjam attack affects all web browsers and any server that still supports weak export-grade cryptography. This dashboard assists organizations with finding systems that are vulnerable to the Logjam attack so that they can be patched and properly configured.

SC Dashboard
Thursday, April 16, 2015

Many services used by today's organizations are cloud based. This dashboard can assist an organization in detecting and tracking network interactions with cloud services such as file storage and sharing services, customer relationship management (CRM) services, resource planning services, and others. The organization can also use this dashboard to discover if any unauthorized cloud service interactions are occurring and even determine potential vulnerabilities associated with the use of cloud services.

SC Report Template
Tuesday, April 7, 2015

System administrators often have so much to do that it can be difficult for them to prioritize their host administration and mitigation efforts. This report can assist in that prioritization by presenting multiple top 100 lists of hosts in various categories, such as most vulnerable, most infected with malware, most policy violations, most out of compliance, most detected changes, etc. Several of the components in this report also contain suggestions on how to modify the components to generate additional lists of hosts, if desired.

SC Dashboard
Tuesday, March 31, 2015

System administrators often have so much to do that it can be difficult for them to prioritize their host administration and mitigation efforts. This dashboard can assist in that prioritization by presenting multiple top ten lists of hosts in various categories, such as most vulnerable, most infected with malware, most policy violations, most out of compliance, most detected changes, etc. Several of the components on this dashboard also contain suggestions in their descriptions on how to modify the components to generate additional lists of hosts, if desired.

SC Report Template
Tuesday, March 17, 2015

Malware, once it infects a system, will often have a hard-coded list of domains that it attempts to contact for further instructions. This report highlights hosts that have anomalies in failed DNS query activity, and presents summaries of the domains that were attempting to be resolved. An analyst can use this report to discover hosts infected with such beaconing malware.

SC Dashboard
Tuesday, March 10, 2015

Insiders are those users – be they employees, contractors, or partners – that already have access to your organization's network and resources. The threat is that these insiders may either accidentally or intentionally do something to harm the network, compromise resources, or leak private data. This dashboard brings together passive scanning and log correlation to assist with monitoring users on the network and combating the insider threat.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.