What’s in a Name? SecurityCenter Is Now Tenable.sc

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

<p>On November 7, 2018, Tenable SecurityCenter was renamed Tenable.sc. Read on to learn more about why we did it – and catch up on the latest innovations coming to our Cyber Exposure platform.</p>

<p>Earlier this month, when we announced new <a href=”https://www.tenable.com/press-releases/tenable-announces-industry-s-firs… Prioritization capabilities</a> coming to the Tenable Cyber Exposure platform, we decided it was also time to give one of our key products a fresh name. As of Nov. 7, 2018, Tenable SecurityCenter was renamed Tenable.sc to better reflect its position as a core element of the Tenable Cyber Exposure platform.</p>

<h2>Redefining SecurityCenter</h2>

<p>For most businesses, the number of vulnerabilities they’re dealing with is simply untenable. In fact, the recent <a href=”https://www.tenable.com/cyber-exposure/vulnerability-intelligence”>Vulne… Intelligence Report</a> from Tenable Research reveals a 53% increase in vulnerabilities published in 2017 compared with the previous year. Combine this rapidly changing and expanding threat landscape with a huge increase in the amount and types of assets on your network, and it’s clear the risk of business-disrupting events has never been higher. </p>

<p>To keep up with the current volume of vulnerabilities, new assets and changes to the threat landscape, organizations need a solution to holistically assess, manage and measure cyber risk across their modern attack surface. Organizations need <a href=”https://www.tenable.com/cyber-exposure”>Cyber Exposure</a>. </p>

<p>And that’s why we’re excited to bring Tenable.sc into our <a href=”https://www.tenable.com/cyber-exposure/platform”>Cyber Exposure platform</a>. This change gives customers flexible deployment options for managing vulnerabilities in their modern organization. They may now choose between Tenable.sc (managed on-prem) or Tenable.io (managed in the Cloud). </p>

<p>So what does this mean for Tenable.sc?</p>

<h2>Innovating Tenable.sc</h2>

<p>Tenable.sc, a key part of our portfolio since its inception in 2003, has continually driven innovation in the vulnerability management market. Now, as a core element of the Tenable Cyber Exposure platform, you will see the solution receive increased innovation and accelerated development to help our customers see more, do more and further reduce their cyber risk. </p>

<h2>Available now</h2>

<p>Last week, we released Tenable.sc 5.8. This release enables our customers to see more, extending beyond the walls of the organization for greater support in an on-prem environment. It includes enhancements to <a href=”https://www.tenable.com/blog/securitycenter-innovation-continues-with-5-… Agent Workforce</a> capabilities, such as the ability to:</p>
<ul><li>Speed up DNS calls with the ability to resolve DNS assets in parallel</li>
<li>Modify the severity of vulnerabilities with accept/recast rules for agenta data</li>
<li>Get greater flexibility over agent data with option to set a timeline for expiration of agent repositories</li>
<li>Easily retain user data with ability to reassign objects for users deleted by admins</li>
<li>Save time with ability to set a date threshold to import data for agent scans</li>
<li>See key information at a glance with the addition of the scan ID in the component title of PDF reports</li></ul>

<p>For additional information on Tenable.sc 5.8 features and quality fixes check out the <a href=”https://docs.tenable.com/releasenotes/securitycenter/securitycenter580.h… notes</a>.</p>

<h2>Coming in 2019</h2>
<p>As we move into the new year, you’ll see significant innovations in Tenable.sc, including:
<ul><li>Integrating SAML to allow for multiple SSO/ authentication solutions, such as Shibboleth.</li>
<li>Integration between Tenable.sc and Industrial Security to deliver high-level analysis and reporting of both OT and IT networks found in critical infrastructure. This gives customers a single platform to measure and manage cyber risk across both OT and IT networks.</li>
<li>Advanced <a href=”https://www.tenable.com/press-releases/tenable-announces-industry-s-firs… Prioritization</a> capabilities to address the deluge of vulnerabilities and predict which ones will generate the most cyber risk to organizations. Predictive prioritization will provide organizations with the unprecedented capability to reduce the number of critical vulnerabilities they need to remediate by 95%, while maintaining the same level of cyber risk across their attack surface compared to basic prioritization with CVSS. </li>
<li>Integration with <a href=”https://www.tenable.com/products/tenable-io/lumin#form”>Tenable Lumin</a> for advanced visualization, analytics and measurements to help organization understand and reduce their Cyber Exposure.</li>
<li>Enhancements and additions to reports and dashboards</li></ul>

<p>So, to answer my original question, what’s in a name? As it turns out, a lot. </p>

<p>We’re excited to bring these innovations to market and bring all our customers along in our Cyber Exposure journey. </p>

<p>Want to learn more about Tenable.sc? Visit the webpage <a href=”https://www.tenable.com/products/tenable-sc”>https://www.tenable.com/pro…

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
1594 Followers
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel