SecurityCenter Continuous View
  
SecurityCenter Continuous View

SecurityCenter Continuous View® delivers a real-time, holistic view of all IT assets, network activity and events so you can find exploits and fix vulnerabilities faster.

Continuously monitor in real time to discover assets and detect anomalous activity with SecurityCenter CV's Nessus® Network Monitor.
Passively analyzes network traffic to provide continuous visibility into managed and unmanaged assets on your networks
From IT to OT, Nessus Network Monitor (formerly Passive Vulnerability Scanner® or PVS™) illuminates blind spots so you can see and protect your entire environment. The product provides a safe and non-intrusive way to discover and monitor even the most sensitive systems.
  • Eliminates Critical Blind Spots. Provides deep packet inspection to continuously discover and track users, applications, cloud infrastructure, trust relationships and vulnerabilities.
  • Monitors Everywhere. Automatically discovers users, infrastructure and vulnerabilities across more technologies than any other vendor, including operating systems, network devices, hypervisors, databases, tablets, phones, web servers, cloud applications and critical infrastructure.

Get centralized log analysis and event monitoring with SecurityCenter CV's Log Correlation Engine®.

  • Any Log From Any Event. Enable Log Correlation Engine® collects and aggregates data from firewalls, intrusion detection and prevention systems, and data loss prevention solutions, as well as raw network traffic, application logs and user activity.

  • Centralized Log Management. Significantly reduce deployment and administration time with centralized Log Correlation Engine client administration and management functions, for efficient deployment and real-time configuration modifications.

  • Flexible, Scalable Deployment. ​The Log Correlation Engine's scalable architecture supports up to enterprise-wide deployments with high availability requirements.

  • Analytics & Reporting. Rapid query performance and powerful, customizable analytics give network, security and compliance teams near-instant visibility - pinpointing threats, misconfigurations, audit violations and never-before-seen activity.

Key Features
  • Asset Discovery. Actively search your network, passively monitor traffic and gather information from third-party IT systems and network devices to discover all hardware, services and web applications on your network.
  • Vulnerability Assessment. Actively and passively assesses systems, networks and applications to gain unmatched depth and continuous visibility of weaknesses that threaten your security posture.
  • Compliance. Use pre-defined checks against industry standards and regulatory mandates, such as CIS benchmarks, DISA STIG, FISMA, PCI DSS, HIPAA/HITECH, SCAP and more. Get the visibility and context you need to easily demonstrate adherence to multiple compliance initiatives.
  • Frameworks. Automate effective conformance to security frameworks such as NIST, CIS and ISO/IEC. Effectively measure, visualize and communicate the technical security controls that help you manage risk. Learn more.
  • Malware Detection. Gain critical context with built-in threat intelligence that detects malware and identifies suspicious traffic to blacklisted external sites.
  • Integrations. Utilize intelligent connectors to integrate with leading solutions in patch management, mobile device management, threat intelligence, cloud and more. Integrations leverage existing security investments to provide additional data and improve visibility, context and analysis.
  • Vulnerability Analytics. Consolidate and analyze all vulnerability data gathered by SecurityCenter CV across your enterprise. Use Assurance Report Cards® (ARCs) to measure, analyze and visualize your security program and evaluate program effectiveness.
  • Assurance Report Cards. Communicate with the business by measuring, analyzing and visualizing the security posture of your IT enterprise at any time, and reporting results in an intuitive report card format.

If you have questions about SecurityCenter Continuous View write us at: tenable@bakotech.com.