Welcome!

@CloudExpo Authors: Yeshim Deniz, Zakia Bouachraoui, Pat Romanski, Liz McMillan, Elizabeth White

News Feed Item

Tenable First to Manage Threats from Massive Field of New IPv6 Internet Addresses

Tenable Network Security, Inc., the leader in real-time vulnerability management, today released the first vulnerability management solution designed to identify emerging threats and vulnerabilities as an entirely new field of Internet addresses are employed.

IPv6 (Internet Protocol version 6) is the latest revision of the Internet Protocol (IP), the primary communications protocol upon which the entire Internet is built. It is intended to replace the older IPv4, which is running out of addresses that are needed to connect the exploding number of devices like smartphones and tablets to the Internet.

Security solutions not yet able to discover and assess known devices and systems assigned the new IPv6 address leave networks vulnerable to security risk and compliance violations, especially to malicious users who will be trying to exploit networks that contain unknown IPv6 addresses.

No longer a job for scheduled scanning alone, upgrades to Tenable’s SecurityCenter Continuous View™ (CV) solution combines scheduled scanning and passive vulnerability monitoring to identify vulnerabilities, threats, and compliance violations located at any of 1.2*10^24 IPv6 addresses, a /48 space recommended for a “typical” organization.

Already unique in its ability to manage risk from mobile devices, cloud-based services and virtual infrastructure, enhancements to SecurityCenter CV components, SecurityCenter™ version 4.6 and Passive Vulnerability Scanner™ (PVS) version 3.8, extend Tenable’s lead in vulnerability management to identify security and compliance risk from rapidly evolving computing environments.

“Our customers are already the first to continuously manage risk from mobile, cloud and virtual infrastructure. Now they can add IPv6 to the list of challenges they’ve uniquely prepared their organizations for,” said Ron Gula, CEO and co-founder of Tenable Network Security. “This new release of SecurityCenter continues to set the pace for IT risk management, helping companies rapidly adopt new technologies, and reduce gaps in risk awareness from months to minutes by transitioning from periodic scanning to continuous real-time monitoring.”

The following enhancements to SecurityCenter and PVS™ improve monitoring, analysis and collaboration:

  • IPv6 – Enhancements to SecurityCenter and PVS automatically identify security and compliance risk in IPv6 assets as soon as and wherever they appear across hybrid IPv4/IPv6 address spaces, increasing situational awareness.
  • Unified IPv6 Scanning – Enhancements to SecurityCenter, when used with Tenable Perimeter Service, provide a comprehensive internal and external assessment of an organization’s IPv6 risk posture.
  • LDAP Access and Asset Calculator - Enhancements in SecurityCenter simplifies the creation of scans targeted at devices based on enterprise IT asset information. New Plugin Date Filters improve compliance trending and reporting.
  • Scan on Alert, Report on Scan, and Report Sharing - New collaboration functions allow SecurityCenter to trigger scans, share reports, and initiate incident and remediation workflow with rich information on vulnerabilities, threats, and malware detection. With Tenable’s Log Correlation Engine™ deployed, reports and scans can be triggered based on anomalous behavior (e.g., never-before-seen events).

A complete list of enhancements can be found at Tenable SecurityCenter.

About Tenable Network Security

Tenable Network Security is the de facto standard for vulnerability and compliance management solutions with over 15,000 customers worldwide. Tenable’s unique real-time vulnerability and threat management technologies are used by the most demanding security professionals, compliance auditors, and executive risk managers to reduce the risk from mobile, cloud and virtual technologies. Our solutions scale to meet the needs of the smallest to the largest enterprises and government agencies including the entire U.S. Department of Defense.

For more information, please visit Tenable.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
Digital Transformation is well underway with many applications already on the cloud utilizing agile and devops methodologies. Unfortunately, application security has been an afterthought and data breaches have become a daily occurrence. Security is not one individual or one's team responsibility. Raphael Reich will introduce you to DevSecOps concepts and outline how to seamlessly interweave security principles across your software development lifecycle and application lifecycle management. With these new automated application security methodologies, organizations will be able to minimize their risk with digital transformation & migration to the cloud, comply to new regulations, and prevent data breaches from ever happening.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading these essential tips, please take a moment and watch this brief video from Sandy Carter.