"Tenable" New Functionalities Based on Verizon DBIR
COLUMBIA, MD: Tenable, provider of security solutions has revealed their new set of analytics that could help customers to enhance organizational security posture. The set of functionalities operates on the findings of Verizon‘s 2016 Data Breach Investigations Report (DBIR).
Tenable’s new DBIR dashboard and its Assurance Report Cards (ARC) enable organizations to compile and analyze data which influences the adoption of DBIR recommendations and its best practices. The updated dashboard provides critical context and actionable intelligence which helps organizations to protect and strengthen their cyber security. With the assistance of the ARC, security officers can analyze and measure common threats and vulnerabilities that are identified in the report.
According to Tenable, they are able to identify all of the different types of risk on the network so customers can make informed decisions about where they are exposed.
Tenable has helped many companies address their security challenges by continuously measuring, analyzing, and visualizing the health of organizations IT. Apart from updating the existing DBIR dashboards—browser vulnerabilities, account weakness, network and host security, tenable network has also incorporated new dashboards and ARCs. The account weakness and compliance ARC enable organizations to improve access control measures by utilizing user management policies. With the help of Incident Pattern Monitoring, firms can comprehensively monitor anti-virus updates, potential policy violations, remote access, and data leakage. Other Dashboards and ARCs include web application and browser security, network and host security, and vulnerabilities by common vendors.
By Debra Jensen, CIO, Charlotte Russe
By Phil Jordan, CIO, Telefonica
By Alberto Ruocco, CIO, American Electric Power
By Sven Gerjets, SVP-IT, DIRECTV
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
By Mike Dieter, CTO, Transplace
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Kevin Kometer, CIO, CME Group
By John Landwehr, Public Sector CTO, Adobe
By Marc Probst, CIO & VP, Intermountain Healthcare
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
By Jeff Bauserman, VP-Information Systems & Technology,...