SecurityCenter 5 from Tenable Network completes SCAP 1.2 Certification
COLUMBIA, MD: Developer of vulnerability detection systems, Tenable Network Security attains recognition from National Institute of Standards (NIST) and Technology as a Security Content Automation Protocol (SCAP) validated product for its SecurityCenter 5. SCAP forms a key component for the United States Department of Homeland Security’s Continuous Diagnostic Monitoring (CDM) program and serves a pivotal part of securing the nation from cyber attacks.
The creation of SCAP was to cater to a standardized approach in maintaining the security of enterprise systems, like automatically verifying the presence of patches, checking system security configuration settings, and examining systems for signs of compromise.
“SecurityCenter 5 was engineered from the start to be technologically compliant with SCAP standards,” quotes Ron Gula, CEO, Tenable Network Security. “Federal customers who need a comprehensive, real-time view into overall network health can now export SCAP validated data directly from SecurityCenter 5 to meet NIST and FISMA reporting requirements.”
Being certified with SCAP 1.2SecurityCenter 5 displays capabilities such as Authentic configuration scanner, Common Vulnerabilities and Exposure (CVE), Assessment of Windows 7 (32 and 64 bit), Microsoft Windows, SP2, Windows XP Pro, SP3 and Red Hat Enterprise Linux (RHEL) 5 Desktop (32 and 64 bit) and Compliance with SCAP version 1.2: XCCDF 1.2, OVAL 5.10, CCE 5, CPE 2.3, CVE, and CVSS 2, Asset Identification 1.1, ARF 1.1, TMSAD 1.0.
Accompanied with a batch of technologies and sensors, SecurityCenter 5 also comes with Tenable’s innovative Assurance Report Cards (ARCs). These ARCs enable CISOs to measure, analyze and visualize the security posture of respective IT environment, and report the results in an intuitive report card format, helping in aligning security policies with organizational objectives.
Tenable's SCAP dashboards, integrated with SecurityCenter 5, along with identifying risks also helps in detecting system security weaknesses, visually track audit performance, scan for compliance and receive pass/fail vulnerability summaries using these dashboards from the security teams.