Tenable Network Security Incorporates a New Foolproof Threat Hunting Solution
FREMONT, CA: Tenable Network Security, Inc., a firm offering security technology solutions for the businesses reveals the release of a new and highly secure Threat Hunting solution at RSA Conference 2016. The new release focuses on helping customers identify threats and resolve compromises in a proactive manner before they encounter critical breaches. Key functions of the company include prioritizing threats, eliminating blind spots, and reducing exposure and loss.
“We’ve been predicting that the future of threat detection and incident response will belong to companies focused on a technology and asset-agnostic approach to situational awareness across the entire enterprise,” said Adrian Sanabria, Senior Security Analyst, 451 Research.
Organizations across the globe implement large number of security tools into their networks. But, even with highly sophisticated security measures, the companies may not have the resources to determine a security attack. They are always vulnerable to massive security breaches. Tenable’s new Threat Hunting solution offers a real-time critical context CISOs, visibility options and security teams with a wide range of integration support needed to determine and eliminate threats actively. It also includes intelligent connectors, active scanning, agent-based scanning, host activity data and continuous listening.
The new Threat Hunting solution features unique sensors in the company’s Security Center Continuous View, effectively monitoring normal activity. The built-in irregularity detection allows customers to identify and measure the difference from the normal activity patterns, realize complex threats on the network and identify suspicious chained events in real time. Efficient reporting functions and dashboards provide organizations with the tools needed to tackle the attackers.
“It’s time we change our strategies in combating the adversary. This is Tenable’s focus. We are helping organizations transform their security programs with proactive threat hunting that lets CISOs answer and act on a simple, yet important question — have I been breached?,” said Ron Gula, CEO, Tenable Network Security.
By Nancy S. Wolk, CIO, Alcoa - Global Business Services
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Bryson Koehler, EVP & CIO, The Weather Company, an IBM...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Lowell Gilvin, Chief Process Officer, Jabil
By Dennis Hodges, CIO, Inteva Products
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Walter Carvalho, VP& Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Kushagra Vaid, GM, Server Engineering, Microsoft
By Steve Beason, Enterprise CTO, Scientific Games
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Alberto Ruocco, CIO, American Electric Power