The Vulnerability Management System provides analytical insight into your network that reveals individual vulnerabilities and ranks them according to their severity.
Every piece of software has vulnerabilities that affect applications, network services, operating systems, drivers, firmware, and more.
Vulnerabilities are everywhere. Even big companies like Microsoft, Apple, Google release updates every month fixing many security vulnerabilities.
Vulnerabilities may not only be caused by software programmer error, but also by misconfiguration or insufficient hardening of servers. By hardening, we mean changing the default configuration to a state that complies with security best practice.
In short, humans are not perfect, so the software they create contains vulnerabilities.
The basic rule is “Update, update, update…“. But updates can cause us some wrinkles.
In short, we would need to know what vulnerabilities exist in the software we run and what the impact is. This is where a vulnerability management system comes in.
Vulnerabilities can be exploited by hackers. For example, they can cause the following:
We would like to introduce you to the solutions of Tenable, a company that once pioneered the well-known Nessus product and now has a full range of products in its portfolio.
How can we scan our environment? The Tenable.io product offers 2 types of sensors.
Accesses the device under test over the network.
Scan is active – communicates with services and evaluates responses.
Runs directly on the target device – server or station.
Passively collects information about installed software.
Ideal solution is a combination:
Nessus scanner without authentication + Agent on the target device
Tenable.io – provides a cloud-based service and interface for defining, scheduling, running and evaluating tests
Tenable.sc – this is a similar interface to Tenable.io, however the product is distributed as an on-premise product for installation on your own HW
Tenable.cs – a service within Tenable.io that serves as a scanner for docker containers
Tenable.ot – vulnerability scanning solution for IOT environments
Tenable.ad – the solution offers an active directory audit with normal user rights
Nessus scanner – this is a security scanner that is part of the above scanners, but can also be purchased as standalone product
Product description directly on the manufacturer’s website.
Don’t have time to spend on vulnerability monitoring and impact? No problem – we’ll be happy to arrange it for you:
We will provide a Trial version for you
Define the targets you want to scan
If you’re interested in learning more about Tenable, please don’t hesitate to get in touch. We will be happy to help you with everything.