SecurityCenter 5 from Tenable Network completes SCAP 1.2 Certification
COLUMBIA, MD: Developer of vulnerability detection systems, Tenable Network Security attains recognition from National Institute of Standards (NIST) and Technology as a Security Content Automation Protocol (SCAP) validated product for its SecurityCenter 5. SCAP forms a key component for the United States Department of Homeland Security’s Continuous Diagnostic Monitoring (CDM) program and serves a pivotal part of securing the nation from cyber attacks.
The creation of SCAP was to cater to a standardized approach in maintaining the security of enterprise systems, like automatically verifying the presence of patches, checking system security configuration settings, and examining systems for signs of compromise.
“SecurityCenter 5 was engineered from the start to be technologically compliant with SCAP standards,” quotes Ron Gula, CEO, Tenable Network Security. “Federal customers who need a comprehensive, real-time view into overall network health can now export SCAP validated data directly from SecurityCenter 5 to meet NIST and FISMA reporting requirements.”
Being certified with SCAP 1.2SecurityCenter 5 displays capabilities such as Authentic configuration scanner, Common Vulnerabilities and Exposure (CVE), Assessment of Windows 7 (32 and 64 bit), Microsoft Windows, SP2, Windows XP Pro, SP3 and Red Hat Enterprise Linux (RHEL) 5 Desktop (32 and 64 bit) and Compliance with SCAP version 1.2: XCCDF 1.2, OVAL 5.10, CCE 5, CPE 2.3, CVE, and CVSS 2, Asset Identification 1.1, ARF 1.1, TMSAD 1.0.
Accompanied with a batch of technologies and sensors, SecurityCenter 5 also comes with Tenable’s innovative Assurance Report Cards (ARCs). These ARCs enable CISOs to measure, analyze and visualize the security posture of respective IT environment, and report the results in an intuitive report card format, helping in aligning security policies with organizational objectives.
Tenable's SCAP dashboards, integrated with SecurityCenter 5, along with identifying risks also helps in detecting system security weaknesses, visually track audit performance, scan for compliance and receive pass/fail vulnerability summaries using these dashboards from the security teams.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....