Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Vulnerability Management Principles

1. Vulnerability Management Overview


What is vulnerability management?

Vulnerability management is an ongoing program of technologies and tools to identify cyber risks across your organization, align them with your operational goals and objectives and then prioritize to remediate vulnerabilities in a timely manner to secure your network and keep your operations safe.

Vulnerability management consists of the people, policies and processes that work together toward common goals to ensure your attack surface and cyber risk are as small as possible.

Fixing vulnerabilities across your entire attack surface is a daunting task. The reality is, the volume of assets in most organizations, coupled with more than a growing list of hundreds of potential attack vectors, makes it challenging for security teams to patch and remediate them all.

It’s even more challenging because most organizations don’t have the right tools to gain insight into all of the assets across the organization — from traditional IT, to cloud, to mobile, to containers or serverless, to web applications and operational technology (OT) assets.

Add that to the reality of the real world problem that many assets have multiple vulnerabilities and other security issues and before you know it, your security team is buried under a mountain of vulnerabilities.

The more vulnerabilities that exist and the more disparate remediation functions are, the more likely it is that attackers can exploit your attack surface.

That’s where vulnerability management comes in.

What does vulnerability management entail?

There are five core steps for effective vulnerability management. These steps align with your cybersecurity lifecycle.

Step 1: Discover

Identify and map all of your assets across all of your computing environments.

Step 2: Assess

Understand exposure of all of your assets including vulnerabilities, misconfigurations and other security health indicators.

Step 3: Prioritize

Understand your exposures with context so you can prioritize remediation based on asset criticality, vulnerability severity and threat context.

Step 4: Remediate

Prioritize which exposures to address first and then use the appropriate remediation process.

Step 5: Measure

Measure and then benchmark your exposure so your teams can make better business and technology-related decisions.

What's the difference between vulnerability management and vulnerability assessment?

Vulnerability management and vulnerability assessment are different, but complementary practices.

Vulnerability management helps you identify all of the assets and vulnerabilities across your attack surface. It also helps you plan how you will mitigate issues, prioritize and remediate weaknesses and improve your overall security posture.

Vulnerability assessment, on the other hand, is a one-time project conducted on a regular basis to identify all of your assets and vulnerabilities.

Generally, vulnerability assessment, which is not the same as a vulnerability scan, has a specified beginning and end date. It’s a snapshot of your attack surface at a specific point in time.

Vulnerability assessment is part of your overall vulnerability management program, which helps you continuously identify and address your cyber risks.

How is vulnerability management different from risk-based vulnerability management?

Traditional vulnerability management practices, also called legacy vulnerability management, give you a theoretical view of vulnerabilities and risks, uncovering threats a vulnerability could introduce into your environment, but without indication of which threats pose real risk.

Without clear insight into actual risks, your security team can get bogged down trying to remediate vulnerabilities that may not pose actual risk and can miss finding and remediating critical vulnerabilities more likely to impact your organization.

Adding a risk-based approach to your vulnerability management practices can help you better understand risks — with threat context — so you have insight into the potential business impact of weaknesses across your attack surface.

2. Assets and Vulnerabilities


자산은 무엇입니까?

An asset is hardware or software within your IT environment. This can include traditional IT assets such as servers, networks and desktop computers, but also other devices like smartphones, tablets, laptops, virtual machines, software as a Service (SaaS), cloud-hosted technologies and services, web apps and IoT devices.

Continuous asset discovery, evaluation and management are important components in your overall vulnerability management program.

What is an attack surface?

A modern IT attack surface consists of multiple exposure points (your IT assets) in your enterprise that attackers can potentially exploit. These exploits often lead to breaches. Historically, an attack surface consisted of traditional IT assets such as servers and networks, but today’s attack surface is vast and ever-growing. It now also includes mobile devices such as smartphones, desktops and laptops, virtual machines, cloud infrastructure, web applications, containers and IoT devices.

Many organizations have challenges keeping up with visibility into all assets across the enterprise. It’s further complicated by additional challenges of mitigating and remediating the vast volume of vulnerabilities discovered by most vulnerability assessment programs.

That’s why it’s important to build a robust and scalable vulnerability management program, one that continuously discovers and assesses all of your assets and vulnerabilities to decrease cyber risk.

Here are some tips to help you assess your attack surface as part of your vulnerability management program:

  1. Identify all of your assets, regardless of type.
  2. Determine where each is located.
  3. Determine who manages each asset and who has access.
  4. Indicate asset type: cloud, mobile, traditional IT, IoT, etc.
  5. Determine if the asset is critical to business operations and prioritize accordingly.
  6. Evaluate what could happen if a vulnerability affects each critical asset.

What is a security vulnerability?

A security vulnerability is a weakness in hardware or software attackers can exploit to compromise systems. In more common terms, they’re “bugs” or programming mistakes.

Some vulnerabilities are remediated by patching, which repairs issues within code. The more complex a system is, the more lines of code it will likely have, meaning there’s a greater chance of programming mistakes somewhere in that code.

Vulnerabilities can also be found when systems are misconfigured, creating additional opportunities for attackers. These vulnerabilities can often be remediated by fixing misconfiguration issues.

Here are some other ways attackers target security vulnerabilities and weaknesses:

  • Exploitation of misconfigurations and unpatched systems
  • Phishing: Sending fake emails that look like they're from real sources to trick people into revealing sensitive information.
  • Credential stealing: Attackers attempt to collect usernames and passwords from one breach and then use them to access other sites.
  • Malware: Malicious software gives attackers system access.
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS): Flooding attacks to use up bandwidth so systems can’t respond to service requests.
  • Cross-Site Scripting (XSS): Malicious code on websites to target visitors.
  • Man-in-the-Middle (MitM): Compromising users through unsecure networks such as public WiFi.
  • Structured Query Language (SQL) Injection: Malicious code on a server that uses SQL to access sensitive information that otherwise wouldn’t be accessible.
  • Zero-Day Exploits: Exploit of a system after a threat is publicly announced but before a patch or fix is released.

3. Vulnerability Scanning


What is a vulnerability scanner?

A vulnerability scanner is an automated tool to discover vulnerabilities across your attack surface.

There are two main types of vulnerability scans,:

  • Credentialed: Scans that use login credentials to discover detailed information about security issues within an asset, system or network
  • Non-credentialed: Scans that do not require credentials and target open ports, protocols, and exposed services on a host

Also, your organization can choose to do:

  • Internal vulnerability scans: Scans performed inside your organization to discover ways attackers can move through your network
  • External vulnerability scans: Scans performed outside of your organization to discover vulnerabilities

Routine vulnerability scanning is an important part of your vulnerability management program and continuous vulnerability scanning can help you further decrease your cyber risks.

Active Scanners

Active vulnerability scanning creates a detailed picture of your network and assets at a specific point in time to identify system misconfigurations, vulnerabilities and other security issues within your attack surface.

Active scanning generates network traffic and interacts with devices on your network. It sends packets to a remote target, which creates a snapshot of your network at that moment.

Active services and applications are then compared to a plugin database to see if any vulnerabilities are present.

Unlike passive scanning, discussed below, active scanning gives you additional insight including open ports, installed software, security configuration settings and known malware.

Other types of active scanning variants include:

  • Unauthenticated scans
  • Authenticated scans
  • Agent-based scanning

Active scanning is ideal for IT devices operating in your converged IT/OT environment. It gives insight into assets on your network; installed applications, libraries and services vulnerabilities within your system; and details about users, groups and installed software.

Active scanning can also help you with configuration assessments and uncover use of default usernames and passwords for critical systems and applications. It’s also useful for malware detection and can help uncover backdoors and bad file hashes.

Active scanning is integrated into Tenable Vulnerability Management.

With Tenable, you can select from a variety of active scanning options including:

  • On-demand: User manually launches.
  • Scheduled scans: Automatically launches daily, weekly or monthly on a set schedule.
  • Dependent scans: Launches when a scheduled parent scan completes. Dependent scans can be daisy-chained to other dependent scans.

While active scanning is an important part of your overall vulnerability management program, it’s only a capture of your attack surface at one point in time. It doesn’t include other devices such as tablets, smartphones, or laptops, that may only periodically appear on your network.

There is another challenge for active scanning — potential disruptions

While active scanning can help pinpoint vulnerabilities, you shouldn’t use them on any assets that can experience an outage if scanned. That could include, but not limited to, systems that are critical to your organizational infrastructure, medical devices and industrial systems.

Credentialed Scans

Credentialed scans, which are also known as authenticated scans, remotely login to devices to examine them from the inside-out. These scans allow you to examine devices from the inside out. Credentialed scans gather additional information about your configuration settings and whether or not software has been infected by known malware.

You don’t have to install software on an asset to conduct a credentialed scan, but the scan may still cause some disruptions because they could use network bandwidth and processing power.

Credentialed scans may be better suited to IT systems in upper layers or your OT environment. These scans can often be used together with unauthenticated scans so you can get better insight from both inside-out and outside-in.

Agents

Agent scans provide detailed information and look at each device from an inside-out approach. These scans are generally conducted on control environment systems and are installed on a device or server to function. Agent scans are a good idea for devices not frequently connected (or connected at all) to your network.

Agent scans can find malware on a device, look for misconfigurations and uncover vulnerabilities.

While agents are usually easy to install and are not generally intrusive, there are drawbacks to agent scanning, specifically related to resources. Because they are on-device, they use power, bandwidth, space on your disk and memory. Also, on-device installation means you should always carefully analyze the agent and test it before you selectively install it on devices, especially in OT environments.

Image Registry

Image registry is a security process you can use while your software is in the build/development stage of your lifecycle. When you create an image registry, it can hold and then scan images for assets including public cloud instances and containers. The benefit of image registry is it helps discover potential security issues before new software deployment. You can also use image registry for open-source software or components.

4. Network Monitors


What is a network monitor and how does it help me manage vulnerabilities?

A network vulnerability monitor helps discover vulnerabilities, misconfigurations and other security issues within your traditional IT infrastructure, including networks, servers, operating systems and applications.

Web application scanners are similar, but focus on web applications. Web application scanners are not just for third-party applications, but can also be used to test in-house apps.

패시브 네트워크 모니터링

When an asset connects to your network, you should be able to quickly determine if it’s authorized and if not, react.

Passive network monitoring gives your team continuous insight into applications and operating systems used in your network, who is connected to your network, from where and to where data is transferred, which hosts are active, when a new host becomes active, which ports/services are active and your inter-asset connections.

Passive network monitoring uses deep packet inspection to analyze network traffic. It is ideal for IT and OT devices operating in a converged IT/OT environment and can help you discover and identify active network assets and vulnerabilities, as well as active installed applications and services.

Passive network monitoring is an important part of your overall cyber health. Sometimes, active scanning isn’t an option and you have to avoid it because it could disrupt operations. Instead of relying only on active scanning or agent monitoring, passive scanning keeps you informed of what’s going on across your attack surface, giving you more visibility.

One of the great things about passive network monitoring is its near real-time asset discovery means you can eliminate blindspots you might otherwise have by doing only periodic active scanning.

Passive network scanning is also great for seeking out vulnerabilities in your industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA), both of which can be disrupted by active scanning.

Nessus Network Monitor

With Tenable, you can use Nessus Network Monitor (NNM) to passively analyze your network traffic and eradicate blind spots for complete visibility into your entire attack surface. It’s a safe and non-intrusive way to discover and monitor your sensitive systems.

Nessus Network Monitor is included as a sensor with Tenable Vulnerability Management and Tenable Security Center.

Here are some benefits of using network monitor:

  • Non-intrusive continuous monitoring and assessment of your network
  • Network traffic monitoring at the packet level for visibility into server and client-side vulnerabilities
  • Scalability for future asset discovery and vulnerability monitoring for all of your devices, including virtual systems and cloud services
  • Automatic infrastructure and vulnerability assessment
  • Vulnerability detection on communicating systems, including protocols and applications
  • Identification of application compromise
  • Comprehensive asset discovery of all your devices, including OT devices and applications, servers, endpoints, web apps, network devices, virtual- and cloud-based devices, BYOD/mobile devices and jailbroken iOS devices

Which passive network monitoring tools are right for my organization?

Here are some tips for evaluating which passive network monitoring tools may be best for your organization. Your passive monitor should:

  • Provide complete visibility into your network traffic
    • Sensors should be able to connect to a physical TAP or SPAN port. For virtual traffic, like in a cloud environment or within your virtual infrastructure, your passive network monitor should be capable of running on a properly configured virtual machine
  • Support common protocols for TCP and UDP
  • Support all of the protocols your system may use: SCTP, ICMP, IPIP, IDP and OT — BACnet, CIP, DNP3, Ethernet/IP, ICCP, IEC 60870-5-104, IEC 61850, IEEE C37.118, Modbus/TCP, OPC, PROFINET and Siemens S7.
  • Be able to recognize all of the assets across your attack surface that use your protocols
  • Be able to identify all the known vulnerabilities that affect your assets
  • Be equipped to send alerts to your security information and event management (SIEM) solution whenever new assets are discovered.

In Tenable Nessus, passive network monitors, which are monitoring sensors, enable continuous discovery of all active network assets and facilitate vulnerability assessments. Nessus Network Monitor is also integrated into Tenable Vulnerability Management.

5. Patch Management


What is patch management?

Patch management is the process you use to update systems and software throughout your organization. Patching is an important part of vulnerability management and an effective way to mitigate risk for your organization.

Because of the volume of systems and applications within your attack surface, and because vendors are constantly releasing new patches, you may struggle to know which patches you should do first and then how to prioritize the rest.

Patching priorities is directly related to the risk rating associated with vulnerabilities. If your scoring system ranks a vulnerability high or critical for impact, start there, then work your way down your list for lower ranking vulnerabilities.

Like asset discovery, it can be difficult to get a comprehensive look into your patching needs without the help of a vulnerability management platform. This is another place where Tenable can help.

Tenable Vulnerability Management dashboard, for example, can show you which patches your assets need. With Tenable’s Vulnerability Priority Rating (VPR), you can see which patches are most critical for your organization and where you should focus your attention.

You can even filter the patch list for a closer look. For example, if you want to know how many patches were published in the past 90 days, you can filter your view and see that, including which are most critical for your organization.

Some patches can cause problems for your organization, so you may want to pre-test a patch before deploying it in an active environment. This will give you an opportunity to see if there are conflicts or problems before it negatively affects your real-world operations.

Is your patch management system effective?

Here are some questions to ask to help you evaluate the effectiveness of your patch management system:

Does your team apply all security patches?

It’s up to your organization to adopt a policy about whether or not your teams should cover all security patches. If you do, Nessus and Tenable Security Center can help determine if your patch system works or not. If your organization does not require 100% coverage, it may be helpful to do an external audit to find security risks that have not been addressed by your patching processes.

How quickly do you apply patches?

Your organization should also create a policy to address the timeframe in which patches should be installed. You can use Nessus and Tenable Security Center to test for discrepancies within your policy and report on progress.

Do you include new hosts in your patch management program?

You should include new hosts in your patch management processes. As you add servers or desktops to your infrastructure, you can use Tenable Security Center to monitor your patch cycle for those devices.

What about embedded devices?

Security issues also exist within embedded devices such as switches, firewalls, routers and printers. You can use Nessus and Tenable Security Center to find patch issues in your embedded devices.

To learn more about patch management effectiveness, check out, “Testing the Effectiveness of Your Patch Management System.”

Why do some patches fail?

Even with an efficient patch management system, sometimes patches just fail. Here are a few examples of why this can happen:

  • Your device, like a UNIX or Windows server, may be too secure. It can be configured in a way that a remote user account or local user agent pushing the patch doesn’t have the rights to do so.
  • If your server has out-of-date network settings, for example, a stale DNS server or local router that looks alive but is stale, your patch could fail because of limited network access.
  • Firewall rules can affect systems and cause patch failure.
  • There could be patch dependencies that were not considered.
  • If you have limited space on your drive or partition, the patch may fail. This is also true for self-extracting patches.
  • You may have limited bandwidth that prevents the patch from delivery and installation.

Want to know more about patch management and potential fail points? Check out this blog.

6. Vulnerability Management Solutions


Why do I need vulnerability management?

With hundreds of potential attack vectors, countless assets and ever-changing work environments (people, locations, technology, etc.), security teams can’t patch and fix every vulnerability, but attackers are continuously looking for ways to infiltrate these weaknesses.

Today, there are more than 223,929 Common Vulnerabilities and Exposures (CVEs) in the National Institute of Standards and Technology’s (NIST) National Vulnerability Database (NVD). In the first eight months of 2023, NIST had already analyzed more than 19,352 that year.

While few of these vulnerabilities will likely be used in a real-world exploitation, any could be targeted at any given time.

And while vulnerabilities marked high/critical get the most attention, attackers don’t care about scores, they care about the easiest way to get into your network.

With increasing opportunities, it has never been more important to understand the value of vulnerability management, explore best practices and adopt tactics you can put to work today to protect your network.

That’s why having a vulnerability management program — one that focuses on prioritizing risk and increasing remediation efficiencies — is important.

How do I choose a vulnerability management solution?

While your organization will have unique needs when it comes to selecting a vulnerability management solution, there are some core considerations applicable across industries.

Here are six things to consider when evaluating a vulnerability management vendor to meet your current and future needs.

1. Continuous Asset Discovery

Your vulnerability management solution should offer a wide range of coverage, including continuous asset discovery and complete visibility into your attack surface.

Consider a solution with:

  • Network scanners
  • Agents for endpoints frequently off-network, for example, laptops or mobile devices
  • Passive network monitors to continuously discover assets and vulnerabilities
  • Cloud connectors and pre-authorized cloud scanners to monitor and assess cloud instances
  • Image scanners for static container images before deployment
  • Web app scanners
  • Integrations with cloud, CMDB, CI/CD, ticketing/SOAR and other technologies

2. Assessment Beyond Static Scans

Asset assessment should be more than running a scan. Your vulnerability management solution should facilitate collection and assessment of data to identify security issues.

Consider a solution with:

  • Container assessment before deployment with integrations into developer workflows
  • Cloud workload assessment needs with API-based visibility
  • Passive detection for IT and OT devices that won’t impact system performance and availability

3. Advanced Prioritization

Your vulnerability management solution should leverage machine learning to help your team synthesize vulnerability data so you can uncover blind spots and hidden patterns to better understand organizational risks.

Consider a solution with:

  • Vulnerability prioritization
  • Data inputs for prioritization
  • Research and data teams
  • Automated asset scoring that can scale

4. Automated Reports and Benchmarking

Your vulnerability management solution should provide out-of-the-box reporting for your basic needs and include a powerful and well-documented API to customize and automate reports for your team needs, business goals and compliance.

It’s also a good idea to choose a solution that includes benchmarking metrics so you can evaluate your vulnerability management program success internally and against peer organizations.

5. Simple Pricing and Licensing

Your vulnerability management solution should have simple and straightforward pricing. Consider a solution with a licensing model that doesn’t penalize you for things like using an API or prioritizing threats.

6. Scalability

Your vulnerability management solution should be able to scale as your organization grows and changes over time. Look for a solution that can keep up and adapt with you.

7. Vulnerability Management Best Practices


Vulnerability management best practices

There are many ways attackers can exploit weaknesses within your attack surface. A single security breach can have devastating impacts on your organization.

Here are a few best practices you can apply to your vulnerability management program to facilitate success:

Asset Identification and Management

First, identify all of the assets within your organization and then determine where each asset is located, how it’s used, who is responsible for it and how critical it is to your organization.

Next, track and record asset relationships and dependencies with other assets in your network. If an attacker compromises one, what path does it open for additional exploits? Even if one asset isn’t ranked critical, check for interdependencies that could put you at risk. An often overlooked access point is within Active Directory (AD), so be sure to include this in your identification processes.

You should also evaluate when each device connects and disconnects from your network. You can get this insight through a network access control system, reviewing DHCP logs, reviewing DNS server logs and installing vulnerability scanning agents on devices to routinely scan them.

Vulnerability Identification

Once you have insight into your assets, you can begin assessing each for vulnerabilities, including the severity risk for each security issue.

Take a close look at how easy and likely it is for attackers to exploit each vulnerability and potential damage if successfully attacked. Once you understand vulnerability criticality, then you can prioritize how to mitigate and remediate each security issue.

Routine Vulnerability Management

Traditionally, vulnerability management relied on periodic point-in-time vulnerability discovery and assessment scans, but to improve your security posture, you should consistently and continuously scan your attack surface to discover problems and remediate them to decrease the likelihood of an attack.

Continuous scanning prevents blind spots between manual scans and can help you find new security issues that can happen at any time. By scanning more often and remediating routinely, you may discover fewer vulnerabilities during each single scan.

Risk Assessment

You likely have a large volume of diverse assets across your organization and each device doesn’t have the same level of security.

That means you need to determine the security level for each asset so you can plan steps to take — and the priority — to fix it. Determining how valuable each asset is to your organization and exposure level will help you better understand what you need to do to protect it.

Change Management

Because devices on your network change frequently (and that creates new security issues), it’s important to develop a vulnerability management program that is flexible and that can discover and address changes whenever they happen. This could be when applications are updated, when hardware is added, or when software gets upgraded.

Effective change management will help you create processes to ensure new security issues are addressed and dealt with quickly.

Patch Management

Because of the volume of vulnerabilities traditionally discovered during vulnerability scans, it can be challenging to effectively deploy patches without significant downtime or disruptions. Your vulnerability management program should integrate patch and release management processes to facilitate timely patching for critical assets.

Integrate your patch management processes with your change management processes to ensure your updates and patches are applied consistently, in a controlled manner, correctly and that the patch addresses the vulnerability exposure.

Mobile Devices

Today, mobile devices may make up a significant part of your attack surface. While these devices bring flexibility to your users, they can add additional and unique security risks for your organization. This can be further complicated if your organization supports bring your own device (BYOD) instead of using corporate-issued devices. Mobile device management (MDM) systems are good, as well as agent deployment on mobile devices.

Mitigation Management

Your organization may have vulnerabilities without available patches or fixes. So, what do you do? Your vulnerability management program should include alternate ways to manage those vulnerabilities until you can address them. Some effective approaches could include increasing log monitoring, updating IDS attack signatures or changing firewall rules.

Incident Response

One measure of vulnerability management program effectiveness is how quickly you respond to incidents. The faster you respond to a security issue, the greater chance you have to decrease organizational impact. Incident response isn’t just a reaction to a breach. Adopt a proactive approach so you’re always prepared to respond. Continuous security monitoring, process automation and alerts facilitate rapid response.

Automation

Automation helps you quickly and accurately discover, assess and remediate vulnerabilities across your attack surface, especially for larger systems where there is a constant flow and change of data across your network. Automation helps you work through data in less time and with fewer errors.

관련 제품

Vulnerability Management Resources

 

What’s the Answer to the Vulnerability Overload Problem?

 

Five Steps to Building a Successful Vulnerability Management Program

 

What to Look for in a Cloud Vulnerability Management Solution

 

Vulnerability Management: Asset Discovery

 

4 Failings of Vulnerability Management You Need to Fix for a More Secure 2020

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 전 세계를 대상으로(UAE 제외) 만들어졌으며 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구입하십시오.

100 자산

구독 옵션 선택:

지금 구입

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 전 세계를 대상으로(UAE 제외) 만들어졌으며 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구입하십시오.

100 자산

구독 옵션 선택:

지금 구입

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 전 세계를 대상으로(UAE 제외) 만들어졌으며 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구입하십시오.

100 자산

구독 옵션 선택:

지금 구입

Tenable Web App Scanning 사용해보기

Tenable One - 위험 노출 관리 플랫폼의 일부분으로 최근의 애플리케이션을 위해 설계한 최신 웹 애플리케이션 제공 전체 기능에 액세스하십시오. 많은 수작업이나 중요한 웹 애플리케이션 중단 없이, 높은 정확도로 전체 온라인 포트폴리오의 취약성을 안전하게 스캔합니다. 지금 등록하십시오.

Tenable Tenable Web App Scanning 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Web App Scanning 구입

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구입하십시오.

5개 FQDN

$3,578

지금 구입

Tenable Lumin 사용해 보기

Tenable Lumin으로 위험 노출 관리를 시각화하여 파악하고 시간에 걸쳐 위험 감소를 추적하고 유사한 조직과 대비하여 벤치마킹하십시오.

Tenable Lumin 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Lumin 구입

영업 담당자에게 문의하여 어떻게 Tenable Lumin이 전체 조직에 대한 통찰을 얻고 사이버 위험을 관리하는 도움이 되는지 알아보십시오.

무료로 Tenable Nessus Professional 사용해보기

7일 동안 무료

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다.

신규 - Tenable Nessus Expert
지금 사용 가능

Nessus Expert는 외부 공격 표면 스캔닝과 같은 더 많은 기능 및 도메인을 추가하고 클라우드 인프라를 스캔하는 기능을 추가합니다. 여기를 클릭하여 Nessus Expert를 사용해보십시오.

아래 양식을 작성하여 Nessus Pro 평가판을 사용해보십시오.

Tenable Nessus Professional 구입

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다. Tenable Nessus Professional은 취약성 스캔 절차를 자동화하고 컴플라이언스 주기의 시간을 절약하고 IT 팀과 참여할 수 있도록 합니다.

여러 해 라이선스를 구입하여 절감하십시오. 연중무휴 전화, 커뮤니티 및 채팅 지원에 액세스하려면 Advanced 지원을 추가하십시오.

라이선스 선택

여러 해 라이선스를 구입하여 절감하십시오.

지원 및 교육 추가

무료로 Tenable Nessus Expert 사용해보기

7일간 무료

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

이미 Tenable Nessus Professional을 보유하고 계십니까?
7일간 Nessus Expert로 무료 업그레이드하십시오.

Tenable Nessus Expert 구입

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

라이선스 선택

여러 해 라이선스를 구입하여 비용을 더 절감하십시오.

지원 및 교육 추가