Tenable Network Security has unveiled a new set of analytics, helping customers act on key findings of Verizon’s 2016 Data Breach Investigations Report (DBIR) to enhance organizational security posture. “Every year the Verizon DBIR contains insights and information that can help organizations strengthen their security postures, but most struggle to put this information into action because the required data is difficult to manually extract and incorporate into the security program,” said Cris Thomas, strategist, Tenable Network Security. “Tenable’s new DBIR dashboards and remediation reports help customers build a comprehensive security program that incorporates key findings and recommendations from the report and makes them actionable.”
The release of new Tenable DBIR dashboards and Assurance Report Cards™ (ARCs) removes the burden of compiling and analyzing the data, accelerating adoption of DBIR recommendations and best practices. The new and updated dashboards provide organizations with the critical context and actionable intelligence needed to strengthen and protect themselves against cyber threats, while the ARCs enable CISOs to measure, analyze and visualize the security posture of their IT enterprise as it relates to the common threats and vulnerabilities identified in the report. In addition to updating the five existing Tenable DBIR dashboards (Account Weakness, Browser Vulnerabilities, Incident Pattern Monitoring, Network and Host Security; formerly called Indicators of Compromise in 2015, and Vulnerabilities and Malware Collection), new dashboards and ARCs include:
- Most Interesting Things Dashboard: Identifies specific common vulnerabilities and exposures (CVEs) that Verizon identified as being frequently exploited by attackers.
- Account Weakness and Compliance ARC: Allows organizations to improve access control measures by developing and enforcing user management policies, including effective passwords, account transition and least privilege policies.
- Incident Pattern Monitoring ARC: Helps security teams protect against intrusions by comprehensively monitoring for remote access, potential policy violations, anti-virus updates, data leakage, vulnerabilities, detected changes and suspicious activity.
- Other ARCs and Dashboards: including ARCs for Network and Host Security, Vulnerabilities and Malware, Vulnerabilities by Common Vendor, and Web Application and Browser Security.