sb-nz logo
Story image

Threat prioritisation feature announced for Tenable platforms

12 Feb 2019

Tenable has announced the general availability of Predictive Prioritisation, an offering that aims to change how organisations tackle vulnerabilities.

Predictive Prioritisation enables organisations to reduce business risk by focusing on the three percent of vulnerabilities with the greatest likelihood of being exploited in the next 28 days.

This capability is generally available within the company’s on-premises vulnerability management offering — Tenable.sc (formerly SecurityCenter) — which is a core component of the Tenable Cyber Exposure platform.

Effectively prioritising vulnerabilities is fundamental to cybersecurity.

Yet, knowing where an organisation is most exposed to threats is increasingly daunting given the volume of vulnerabilities.

According to the National Vulnerability Database, there were 16,500 new vulnerabilities disclosed in 2018 alone, of which only a small fraction was actively weaponised for cyber attacks.

This deluge of vulnerabilities, combined with the inability to identify those that pose an actual threat to the business, leaves organisations unable to effectively measure, manage and reduce their risk.

Predictive Prioritisation aims to address this problem.

It analyses Tenable vulnerability data combined with third-party vulnerability data and threat intelligence across 150 data sources using a proprietary machine learning algorithm to predict the likelihood a vulnerability will be exploited in the next 28 days.

This means organisations will be able to evolve their vulnerability remediation efforts from reactive to predictive by focusing on the three percent of issues that could and likely will be exploited.

This threat-centric model is a critical component of modern vulnerability management, hence Tenable has made Predictive Prioritisation a core feature of its vulnerability management platform offerings.

Tenable co-founder and chief technology officer Renaud Deraison says, “Predictive Prioritisation will change the way companies run their vulnerability management programs by giving them a new level of insight on where to focus based on threats to the business.”

“Predictive Prioritisation will help organisations answer foundational questions about where they’re exposed and what vulnerabilities to prioritise for remediation based on the threat landscape -- two questions that are critical for achieving Cyber Exposure.”

Predictive Prioritisation is generally available in Tenable.sc 5.9, for on-premises vulnerability management.

Predictive Prioritisation will be generally available in Tenable.io, for cloud-based vulnerability management, later in 2019.

Story image
CERT NZ provides threat intelligence for InternetNZ's DNS Firewall
"It’s important to InternetNZ to keep adding intelligence to Defenz to make sure our customers are protected from known security threats."More
Link image
Driving cloud cost efficiency with performance monitoring
Cloud infrastructure sprawl sneaks up on organisations through a series of individual decisions that in aggregate become inefficient. Thomas Dittmer shares how performance monitoring helped TravelSupermarket reduce cloud costs by 50%More
Story image
Beware of these six L7 DDoS attacks
As more services are migrating online, DDoS attacks are increasingly shifting away from the network layer, and into the application layer, writes Radware product marketing manager Eyal Arazi.More
Story image
Improving network security by ‘deflecting’ cybercriminals
Even with the best perimeter defences in place, malicious actors can still gain access to a network and resources connected to it. But a new technique has made it significantly easier to spot these cyber-attackers.More
Story image
Machine identities increasingly exploited, new research finds
Venafi, the provider of machine identity management, finds that malware attacks using machine identities doubled from 2018 to 2019, including high-profile campaigns such as: TrickBot, Skidmap, Kerberods and CryptoSink.More
Download image
451 Research: The new shape of the enterprise network
In this new world, distance has become the silent digital business killer. Latency looms large, especially for high-performance edge applications, IoT and 5G use cases. More