Josef Weiss is a Senior Software Engineer at Tenable, and expertly tracks vulnerabilities, threats, and cybersecurity risks and manages processes & dependencies around detecting such events. Josef is also responsible for identifying new or potentially new threats (for example vulnerabilities or malware) and monitoring levels of threat activity. The typical day includes researching and documenting vulnerabilities and cyber-attacks, including techniques being used by responsible parties. This cyber intelligence is used to ensure that Tenable Research reacts appropriately to any new or existing threats. Prior to joining Tenable, Josef’s experience spanned over 19 years in information security. He has worked as a security engineer and architect for the Big 4, several major universities, large healthcare organizations and the telecommunications industry. Josef, who holds many certifications, is a Certified Information Systems Security Professional (CISSP), and a Python programmer.
The ability to detect active user accounts and executed commands across hosts is very useful for analyzing system activity, as well as assisting in the identification of activity that may be malicious in nature. Being able to alert on active users and executed commands can be helpful in maintaining a secure environment. This report presents information on active users and issued commands executed across hosts within the environment.
The ability to detect unique processes across hosts is very useful for identifying new changes, as well as executables created by malicious software. Many types of malicious software create executables with random file names, being able to alert on those is key is maintaining a secure environment. This report presents information on unique processes and new commands that have been detected in the environment.
Monitoring the status of multiple security devices can be a challenge for security teams. The pressure to track down and remediate vulnerabilities often overshadows the routine tasks to ensure the health of the security devices. This dashboard provides administrators a platform for monitoring the health and status of their Nessus scanners, Passive Vulnerability Scanners (PVS) and Log Correlation Engines (LCE) through their connection to SecurityCenter.
Hosts that contain unsupported or unauthorized software within an organization’s environment is risky and may have dangerous consequences. Unsupported software is no longer compliant with regulatory obligations while unauthorized software may create other organizational risks. This report identifies hosts that are found to have unsupported and unauthorized applications installed.
Adobe products are widespread, and Flash is a favorite target of exploit kits, with many of the top exploits targeting flash and other Adobe product vulnerabilities. Understanding what vulnerabilities exist better informs and prepares organizations to which patch management functions need to be addressed. This report provides details on flash vulnerabilities as well as other Adobe products for Windows and Mac OS systems.
Hosts that contain unsupported software or operating systems within an organization’s environment are risky, and may have dangerous consequences. Patches for new vulnerabilities in unsupported software will no longer be available, and unsupported software is no longer compliant with regulatory obligations. This report identifies hosts that are found to have unsupported operating systems or applications installed.
Netstat displays active connections for Transmission Control Protocol (TCP), and lists the ports on which the computer is listening. Netstat is useful for displaying statistics and enumerating open ports on a given host and across multiple platforms. This dashboard utilizes Nessus netstat plugins to enumerate open ports via SSH and WMI.
Securing assets appropriately is a common goal of any information security program. The Center for Internet Security (CIS) provides industry best practices to help organizations improve their security posture. The CIS Linux and Unix dashboard is designed to display the overall compliance status of the network based on Tenable's certified Center for Internet Security (CIS) Linux and UNIX Configuration Benchmark audits.
Sensitive data is data that should be protected against unwarranted disclosure. Protection of sensitive data may be required for legal purposes pertaining to privacy or proprietary information, such as trade secrets. This dashboard assists the analyst to determine if potentially sensitive data has been located, or vulnerabilities exist that may enable the release of sensitive data.
A common implementation of firewalls is to protect network devices by analyzing data moving in and out of the organization, restricting unauthorized access, and malicious traffic. Monitoring the organization’s firewall solution ensures that the implementation is running smoothly. The Fortinet dashboard allows security administrators to view a status summary of the Fortinet device. This includes indicators for events, performance alerts, and connection activity in a single location within SecurityCenter.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Buy Tenable Lumin
Contact a sales representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Request a demo of Tenable Security Center
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable OT Security
Get the Operational Technology security you need.
Reduce the risk you don’t.
Request a demo of Tenable Identity Exposure
Continuously detect and respond to Active Directory attacks. No agents. No
privileges.
On-prem and in the cloud.
Request a demo of Tenable Cloud Security
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
See Tenable One in action
Exposure management for the modern attack surface.
See Tenable Attack Surface Management in action
Know the exposure of every asset on any platform.
Get a demo of Tenable Enclave Security
Please fill out the form with your contact information and a sales representative will contact you shortly to schedule a demo.
Thank You
Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
NEW - Tenable Nessus Expert now available
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].