|By Business Wire||
|December 4, 2012 02:00 PM EST||
Tenable Network Security, Inc., the leader in real-time vulnerability management, today released the first vulnerability management solution designed to identify emerging threats and vulnerabilities as an entirely new field of Internet addresses are employed.
IPv6 (Internet Protocol version 6) is the latest revision of the Internet Protocol (IP), the primary communications protocol upon which the entire Internet is built. It is intended to replace the older IPv4, which is running out of addresses that are needed to connect the exploding number of devices like smartphones and tablets to the Internet.
Security solutions not yet able to discover and assess known devices and systems assigned the new IPv6 address leave networks vulnerable to security risk and compliance violations, especially to malicious users who will be trying to exploit networks that contain unknown IPv6 addresses.
No longer a job for scheduled scanning alone, upgrades to Tenable’s SecurityCenter Continuous View™ (CV) solution combines scheduled scanning and passive vulnerability monitoring to identify vulnerabilities, threats, and compliance violations located at any of 1.2*10^24 IPv6 addresses, a /48 space recommended for a “typical” organization.
Already unique in its ability to manage risk from mobile devices, cloud-based services and virtual infrastructure, enhancements to SecurityCenter CV components, SecurityCenter™ version 4.6 and Passive Vulnerability Scanner™ (PVS) version 3.8, extend Tenable’s lead in vulnerability management to identify security and compliance risk from rapidly evolving computing environments.
“Our customers are already the first to continuously manage risk from mobile, cloud and virtual infrastructure. Now they can add IPv6 to the list of challenges they’ve uniquely prepared their organizations for,” said Ron Gula, CEO and co-founder of Tenable Network Security. “This new release of SecurityCenter continues to set the pace for IT risk management, helping companies rapidly adopt new technologies, and reduce gaps in risk awareness from months to minutes by transitioning from periodic scanning to continuous real-time monitoring.”
The following enhancements to SecurityCenter and PVS™ improve monitoring, analysis and collaboration:
- IPv6 – Enhancements to SecurityCenter and PVS automatically identify security and compliance risk in IPv6 assets as soon as and wherever they appear across hybrid IPv4/IPv6 address spaces, increasing situational awareness.
- Unified IPv6 Scanning – Enhancements to SecurityCenter, when used with Tenable Perimeter Service, provide a comprehensive internal and external assessment of an organization’s IPv6 risk posture.
- LDAP Access and Asset Calculator - Enhancements in SecurityCenter simplifies the creation of scans targeted at devices based on enterprise IT asset information. New Plugin Date Filters improve compliance trending and reporting.
- Scan on Alert, Report on Scan, and Report Sharing - New collaboration functions allow SecurityCenter to trigger scans, share reports, and initiate incident and remediation workflow with rich information on vulnerabilities, threats, and malware detection. With Tenable’s Log Correlation Engine™ deployed, reports and scans can be triggered based on anomalous behavior (e.g., never-before-seen events).
A complete list of enhancements can be found at Tenable SecurityCenter.
About Tenable Network Security
Tenable Network Security is the de facto standard for vulnerability and compliance management solutions with over 15,000 customers worldwide. Tenable’s unique real-time vulnerability and threat management technologies are used by the most demanding security professionals, compliance auditors, and executive risk managers to reduce the risk from mobile, cloud and virtual technologies. Our solutions scale to meet the needs of the smallest to the largest enterprises and government agencies including the entire U.S. Department of Defense.
For more information, please visit Tenable.com.
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, will explore the IoT cloud-based platform technologies drivi...
Jul. 2, 2015 02:00 PM EDT Reads: 985
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
Jul. 2, 2015 01:45 PM EDT Reads: 2,265
Live Webinar with 451 Research Analyst Peter Christy. Join us on Wednesday July 22, 2015, at 10 am PT / 1 pm ET In a world where users are on the Internet and the applications are in the cloud, how do you maintain your historic SLA with your users? Peter Christy, Research Director, Networks at 451 Research, will discuss this new network paradigm, one in which there is no LAN and no WAN, and discuss what users and network administrators gain and give up when migrating to the agile world of clo...
Jul. 2, 2015 01:36 PM EDT Reads: 222
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Jul. 2, 2015 01:15 PM EDT Reads: 669
SYS-CON Events announced today that JFrog, maker of Artifactory, the popular Binary Repository Manager, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based in California, Israel and France, founded by longtime field-experts, JFrog, creator of Artifactory and Bintray, has provided the market with the first Binary Repository solution and a software distribution social platform.
Jul. 2, 2015 01:00 PM EDT Reads: 1,195
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 2, 2015 01:00 PM EDT Reads: 1,023
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Jul. 2, 2015 12:00 PM EDT Reads: 2,000
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult – let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and liv...
Jul. 2, 2015 11:50 AM EDT Reads: 364
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
Jul. 2, 2015 11:17 AM EDT Reads: 383
"We have a tagline - "Power in the API Economy." What that means is everything that is built in applications and connected applications is done through APIs," explained Roberto Medrano, Executive Vice President at Akana, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 2, 2015 11:15 AM EDT Reads: 1,024
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
Jul. 2, 2015 11:00 AM EDT Reads: 2,186
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Jul. 2, 2015 11:00 AM EDT Reads: 2,102
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes. In his session at DevOps Summit, Michael Demmer, VP of Engineering at Jut, will discuss how this can...
Jul. 2, 2015 10:46 AM EDT Reads: 343
"A lot of the enterprises that have been using our systems for many years are reaching out to the cloud - the public cloud, the private cloud and hybrid," stated Reuven Harrison, CTO and Co-Founder of Tufin, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 2, 2015 10:45 AM EDT Reads: 716
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 2, 2015 10:00 AM EDT Reads: 1,110
The most often asked question post-DevOps introduction is: “How do I get started?” There’s plenty of information on why DevOps is valid and important, but many managers still struggle with simple basics for how to initiate a DevOps program in their business. They struggle with issues related to current organizational inertia, the lack of experience on Continuous Integration/Delivery, understanding where DevOps will affect revenue and budget, etc. In their session at DevOps Summit, JP Morgenthal...
Jul. 2, 2015 10:00 AM EDT Reads: 771
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, reviewed the changes that the cloud computing industry has gone through over the last five years and shared insights into what the next five will bring. He also chronicled the challenges enterprise companies are facing as they move to the public cloud. He delved into the "Hybrid Cloud" space and explained why every CIO should consider ‘hybrid cloud' as part of their future strategy to achi...
Jul. 2, 2015 10:00 AM EDT Reads: 792
In the midst of the widespread popularity and adoption of cloud computing, it seems like everything is being offered “as a Service” these days: Infrastructure? Check. Platform? You bet. Software? Absolutely. Toaster? It’s only a matter of time. With service providers positioning vastly differing offerings under a generic “cloud” umbrella, it’s all too easy to get confused about what’s actually being offered. In his session at 16th Cloud Expo, Kevin Hazard, Director of Digital Content for SoftL...
Jul. 2, 2015 09:45 AM EDT Reads: 2,241
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Jul. 2, 2015 09:30 AM EDT Reads: 810
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
Jul. 2, 2015 09:24 AM EDT Reads: 522