Verizon's DBIR Dashboard Guides Organizations to Maintain Enterprise Health
BALTIMORE, MD: Tenable Network Security, a network monitoring firm, has announced five new SecurityCenter Continuous View dashboards based on Verizon’s 2015 Data Breach Investigations Report (DBIR). Tenable doesn’t burden the user with manually collecting the data and filtering it. Instead, it automates the process with pre-configured DBIR dashboards, focusing on five key areas of risk.
SecurityCenter Continuous View (CV) provides the most comprehensive and integrated view of enterprise health. Customers can evaluate on the possible threats and vulnerabilities in the network, and can take action to prevent them.
Verizon’s 2015 Data Breach Investigations Report (DBIR)is announced annually highlighting the common attack patterns; and identifies how often an attack vector may result in a successful breach. However, many organizations struggle to incorporate the findings of the report to safeguard them. It includes overhead of managing the large volumes of data.
“Tenable’s DBIR dashboards take advantage of SecurityCenter CV’s unique sensors and ability to automate complex, time-consuming tasks. Customers get increased visibility into their security status and are able to put the DBIR’s key recommendations and best practices to use,” says Ron Gula, CEO, Tenable Network Security.
The five areas focused in the dashboard are:
- Indicators of Compromise (IOC): IOCs like virus signatures, specific traffic patterns, specific IP addresses, malware, specific URLs, or domains of known illicit activity using continuous network monitoring to be tracked.
- Account Weakness: Chances of data breach to be reduced by eliminating weak passwords and default accounts.
- Vulnerabilities and Malware Collection: Missing patches with Common Vulnerabilities and Exposure (CVE) IDs accounted for a large number of exploits according to the DBIR.
- Browser Vulnerabilities: Vulnerabilities in major web browsers including Firefox, Chrome, IE, Opera should be understood and vulnerable plugins to be disabled to reduce the probability of data breach.
- Incident Pattern Monitoring: Risks can be reduced by monitoring the remote access, anti-virus updates, data leakage and suspicious activities.
“Data breach reports are interesting, but everyone wants to know what this means for their company and how their company compares,” says Christian A. Christiansen, Program Vice President of Security Products, IDC.
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. The family of products developed by Tenable allows for the most comprehensive and integrated view of the network health.
“Customers get increased visibility into their security status and are able to put the DBIR’s key recommendations and best practices to use,” explains Ron Gula, CEO, Tenable Network Security.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....