Tenable Network Security Incorporates a New Foolproof Threat Hunting Solution
FREMONT, CA: Tenable Network Security, Inc., a firm offering security technology solutions for the businesses reveals the release of a new and highly secure Threat Hunting solution at RSA Conference 2016. The new release focuses on helping customers identify threats and resolve compromises in a proactive manner before they encounter critical breaches. Key functions of the company include prioritizing threats, eliminating blind spots, and reducing exposure and loss.
“We’ve been predicting that the future of threat detection and incident response will belong to companies focused on a technology and asset-agnostic approach to situational awareness across the entire enterprise,” said Adrian Sanabria, Senior Security Analyst, 451 Research.
Organizations across the globe implement large number of security tools into their networks. But, even with highly sophisticated security measures, the companies may not have the resources to determine a security attack. They are always vulnerable to massive security breaches. Tenable’s new Threat Hunting solution offers a real-time critical context CISOs, visibility options and security teams with a wide range of integration support needed to determine and eliminate threats actively. It also includes intelligent connectors, active scanning, agent-based scanning, host activity data and continuous listening.
The new Threat Hunting solution features unique sensors in the company’s Security Center Continuous View, effectively monitoring normal activity. The built-in irregularity detection allows customers to identify and measure the difference from the normal activity patterns, realize complex threats on the network and identify suspicious chained events in real time. Efficient reporting functions and dashboards provide organizations with the tools needed to tackle the attackers.
“It’s time we change our strategies in combating the adversary. This is Tenable’s focus. We are helping organizations transform their security programs with proactive threat hunting that lets CISOs answer and act on a simple, yet important question — have I been breached?,” said Ron Gula, CEO, Tenable Network Security.
By Debra Jensen, CIO, Charlotte Russe
By Phil Jordan, CIO, Telefonica
By Alberto Ruocco, CIO, American Electric Power
By Sven Gerjets, SVP-IT, DIRECTV
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
By Mike Dieter, CTO, Transplace
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Kevin Kometer, CIO, CME Group
By John Landwehr, Public Sector CTO, Adobe
By Marc Probst, CIO & VP, Intermountain Healthcare
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
By Jeff Bauserman, VP-Information Systems & Technology,...