Tenable Announces Latest Release of Tenable.io
June 01, 2017

Tenable Network Security announced the latest release of its cloud-based Tenable.io platform, delivering new and enhanced capabilities to empower organizations to understand and reduce their cyber risk across the full range of traditional and modern assets.

“Massive shifts in computing have left enterprises struggling to gain visibility into their exposure areas. The rise of IoT and the convergence of IT and OT are only compounding the issue,” said Dave Cole, Chief Product Officer at Tenable. “The vulnerability management tools of yesterday are falling short in providing CISOs with a complete and reliable view of the entire modern attack surface so they can take a proactive approach to managing the security challenges of today and tomorrow.”

With Tenable.io, organizations have complete and centralized visibility over the full range of traditional and modern assets. Powered by Nessus sensors and third party data collection technologies, Tenable.io provides the industry’s greatest breadth and sophistication of asset discovery and vulnerability identification across the entire elastic attack surface - spanning IT, cloud, OT and IoT - all within a single platform. Only Tenable.io arms security teams and chief information security officers (CISOs) with the visibility required to understand cyber risk across the entire attack surface at the pace of innovation and digital transformation.

New and Enhanced Capabilities of the Tenable.io Platform:

- General Availability of Tenable.io Container Security: Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images as they are created. Through integration with the container build process, it provides vulnerability assessment, malware detection and policy enforcement prior to container deployment — enabling security teams to turn a blind spot into a strength. Request a free trial of Tenable.io Container Security.

- Nessus Network Monitor Support for IT, OT and IoT Assets: Nessus Network Monitor (formerly Passive Vulnerability Scanner or PVS) passively analyzes network traffic to provide continuous visibility into managed and unmanaged assets on the network, including IT, OT and IoT assets. It includes new capabilities for asset discovery and vulnerability identification on critical infrastructure and embedded systems, such as ICS and SCADA systems, which require a non-intrusive approach to vulnerability management. Nessus Network Monitor provides coverage for operational technologies in a variety of safety-critical infrastructure industries, including oil and gas, energy, utilities, public infrastructure, manufacturing, and medical/healthcare. Supported protocols include Bacnet, CIP, DNP3, Ethernet/IP, Modbus/TCP, Siemens S7, ICCP, IEC 60870-5-104, IEEE C37.118, OpenSCADA, and more. Request a free trial of Nessus Network Monitor.

- Shadow Brokers, WannaCry and Intel AMT Scan Policy Templates: Tenable.io includes pre-built scan templates for identifying systems exposed to all Shadow Brokers exploits, including WannaCry, EternalRocks and any new versions of these attacks, as well as a check for the recent Intel AMT vulnerability (INTEL-SA-00075).

- Tenable.io Web Application Scanning: Q new product within the Tenable.io platform that safely and automatically scans web applications to accurately identify vulnerabilities, will be generally available on July 14, 2017.

The Latest

June 23, 2017

Why Agile? DEVOPSdigest asked the experts for their opinions on what are the most important advantages of being Agile. Part 3 covers how Agile enables you to grow and adapt to change ...

June 21, 2017

Why Agile? DEVOPSdigest asked the experts for their opinions on what are the most important advantages of being Agile. Part 2 is all about speed ...

June 19, 2017

Earlier this year, DEVOPSdigest featured a list of expert opinions on the essential steps to become agile. Now that we have an idea on how to achieve agility, however, we have to consider why. What's the payoff? With this question in mind, DEVOPSdigest asked the experts — including analysts, consultants and vendors — for their opinions on what are the most important advantages of being Agile ...

June 15, 2017

In the development community, creating additional efficiency through improved collaboration has been prevalent for some time. But despite the head start on the rest of the corporate world when it comes to collaboration, many organizations function today as they did 15-20 years ago. Since time is money in the tech world, outdated collaboration is a huge missed opportunity ...

June 14, 2017

Given the efforts we put in these days to deconstructing monolithic applications, and using distributed microservices to make us more agile, the potential for app performance to take a nosedive because of unseen (and unanticipated) network congestion and outages is only getting greater. There is help at hand, though, in the form of new ways to program network awareness directly into your code ...

June 12, 2017

What if you discover a fatal error or an exploit in your app? What if your app is down during a crucial time? As a developer, how you react to a crisis can mean the difference between minor blip and an embarrassing or costly company blunder. Here's a crisis management plan to get things right when they go wrong ...

June 08, 2017

Recently, the results from SmartBear Software's annual survey, the State of Code Review 2017: Trends & Insights into Dev Collaboration were released. One point I found interesting is that it suggests only 66 percent of organizations can get releases out on time. Why are the other 34 percent struggling to get releases out the door? ...

June 06, 2017

Today's app development landscape is competitive and expensive. Thousands of apps are released each month, and user acquisition and retention are costing app developers millions. User abandonment is one of the main battles of every app developer — as every lost user means another wasted investment ...

June 05, 2017

Developers love using containers to build, run and ship applications in a flexible and simple way. However, the technology has received backlash for not being as secure as other (traditional) methods, such as Virtual Machines (VMs). Securing containers and securing VMs requires a completely different process. Below are four key differences between securing containers versus securing VMs ...

May 31, 2017

DevOps results in improvements in software delivery performance, according to a new first-of-its-kind study by CA Technologies to quantify the benefits for companies that combine DevOps methodologies with Cloud-based tools and delivery mechanisms ...

Share this