Carole Fennelly got her first Unix login in 1980 on a PDP 11/70 running PWB Unix, moved on to testing phone switches at Bell Labs and for the next 10 years was a Unix Systems Administrator on various Unix distros before moving on to consulting as a systems and security administrator in the Manhattan Financial sector for the next 15 years. In 2006, Ron Gula convinced her to join his little start-up, Tenable, to help build out technical content that aligned with Tenable products. During this time, she also authored some of the Center for Internet Security (CIS) Solaris and Red Hat benchmarks, which are used globally as configuration standards to secure IT systems. As a CISO advisor, Carole provided strategic guidance and executive level support and services for Fortune 500 clients in the financial sector before rejoining Tenable as a Senior Security Content Engineer to leverage her skills to provide the CISO perspective to Tenable content. [email protected] https://www.linkedin.com/in/cfennelly/ @carole_fennelly
The purpose of this dashboard is to provide security leaders with information to prioritize and remediate the worst cyber risk exposures currently present in their environment. Very often the worst cyber risk exposures get lost in a sea of vulnerabilities, which creates a challenge for busy security leaders in identifying the most serious exposures and prioritizing a remediation plan.
Exploits leveraged in attacks are imported into various tools and services when the attack is made public. Common exploit frameworks are easy to obtain and are used by both security researchers and malicious attackers. Tenable Vulnerability Management provides security operations teams a centralized view of common vulnerabilities and exploit frameworks present in the organization’s environment.
Many organizations suffer breaches as a result of not following fundamental cyber hygiene practices. Key areas of concern are unsupported products, asset management/vulnerability remediation, and secure communications for sensitive information. This dashboard provides an overall picture of an organization’s fundamental cyber hygiene.
The CVSS framework was designed to measure the characteristics and technical severity of vulnerabilities rather than the actual risk they pose. Tenable’s Vulnerability Priority Rating (VPR) helps organizations improve their remediation efficiency and effectiveness by rating vulnerabilities based on both severity and threat. This dashboard helps organizations visualize which vulnerabilities are present in the environment that have a high VPR and which of those have been fixed.
Microsoft Patch Tuesday is a monthly challenge for operations teams that run Microsoft products, especially if critical or zero-day vulnerabilities are announced. Operations teams are often left scrambling to get patches deployed in the face of users who do not want their daily work interrupted by deployment activities, such as a reboot. This dashboard provides a comprehensive view of the organization’s Microsoft Patch Tuesday status over time, to help organizations identify the most difficult issues to remediate.
Security operations teams need to ensure their scanning program is appropriately maintained for an evolving operational technology landscape aligned with business strategy. There are many factors that can adversely affect the scope and accuracy of scan data, such as failed credentials, network problems or license limitations. This dashboard provides security analysts comprehensive information to monitor the health of their scanning program.
Applications enable users to interface and manipulate data in a consistent manner. Attackers can leverage flaws in applications to bypass access controls. This dashboard helps prioritize remediation efforts by presenting lists of web services to prioritize in various categories.
Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security professionals on the latest web application security risks.
Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security professionals on the latest web application security risks. This dashboard provides organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in the OWASP Top 10 Application Security Risks document.
The CL0P Ransomware Group, also known as TA505, has exploited zero-day vulnerabilities across a series of file transfer solutions since December 2020. This stolen information is used to extort victims to pay ransom demands.
This dashboard contains a list of vulnerabilities known to be exploited by the CL0P ransomware group.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Buy Tenable Lumin
Contact a sales representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Request a demo of Tenable Security Center
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable OT Security
Get the Operational Technology security you need.
Reduce the risk you don’t.
Request a demo of Tenable Identity Exposure
Continuously detect and respond to Active Directory attacks. No agents. No
privileges.
On-prem and in the cloud.
Request a demo of Tenable Cloud Security
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
See Tenable One in action
Exposure management for the modern attack surface.
See Tenable Attack Surface Management in action
Know the exposure of every asset on any platform.
Get a demo of Tenable Enclave Security
Please fill out the form with your contact information and a sales representative will contact you shortly to schedule a demo.
Thank You
Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
NEW - Tenable Nessus Expert now available
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].