Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Tenable Broadens Availability of PVS Network Scanning Tool

    Written by

    Jeff Burt
    Published August 7, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Tenable Network Security is releasing a stand-alone version of its real-time networking monitoring technology to help organizations deal with the security concerns arising from such trends as bring-your-own-device and virtualization.

      Tenable at the end of the month will make its Passive Vulnerability Scanner (PVS), which until now had been available to customers using Tenable’s SecurityCenter and SecurityCenter Continuous View offerings, available to any business. Company officials made the announcement July 30 at the Black Hat 2013 security conference.

      The move comes at a time when corporate networks are increasingly seeing more applications crossing the infrastructure and more devices—from notebooks to smartphones to tablets—connecting to the network. The bring-your-own-device (BYOD) trend, with employees tapping into the network with their own computing devices, promises greater productivity and lower operating and capital costs for businesses, but also creates more management and security headaches for IT staff.

      Such trends are forcing businesses to increase the amount of scanning they do of their networks, according to Tenable CEO Ron Gula.

      “As innovations such as BYOD and virtualization gain traction within the organization, more and more transient devices are being brought into the organization and onto corporate networks,” Gula said in a statement. “If a company is only scanning for these devices monthly, they do not have an accurate picture of their network weakness.”

      BYOD has been on the rise since the first Apple iPhone was introduced in 2007, and gained steam when the iPad tablet hit the market in 2010. Employees are balking at the idea of using company-issued technology, preferring to use their own devices for work. Organizations are looking to institute BYOD policies that enable workers to use whatever device they want while protecting corporate data and networks from unauthorized intrusions.

      The situation has created tension. According to a survey of 700 IT decision makers by managed cloud services provider NaviSite released in July, 80 percent of respondents said that BYOD has become the norm in business, but only 45 percent said they have a formal BYOD policy in their workplace.

      About 68 percent said they were concerned about security enterprise data on employees’ mobile devices.

      Tenable’s PVS is designed to complement the company’s Nessus active scanning products. The technology constantly scans networks at the packet layer, detecting everything from applications and services to protocols and hosts that may not always be found or present at the time of active scanning, according to the company. It’s designed to pick up on security vulnerabilities, suspicious network relationships and compliance violations. In BYOD environments, it monitors IPv4 and IPv6 network traffic to find devices connecting to the network and assessing their vulnerabilities.

      It also evaluates data crossing the network that might be sensitive, such as social security numbers and credit card information.

      “A hacker only needs one pathway into your network,” Gula said. “Not knowing what an unmanaged device is doing on your network is a security blind spot.”

      The standalone PVS offering will be available at the end of August through the company’s partners and its e-commerce store.

      Jeff Burt
      Jeff Burt
      Jeffrey Burt has been with eWEEK since 2000, covering an array of areas that includes servers, networking, PCs, processors, converged infrastructure, unified communications and the Internet of things.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×