Example: barber

Tenable Network Security and Ingram Micro

| DATA SHEETT enable Network Security and Ingram MicroAdd Security to Your Portfolio with the Market Leader in Vulnerability Management and Continuous MonitoringWhen you become a Tenable partner through Ingram Micro , you will be selling industry-leading solutions designed to help your customers ensure that they have the tools and information to keep their enterprises safe and secure. Tenable s Nessus and SecurityCenter product families lead the market in vulnerability management and continuous monitoring solutions, offering you a quick sale with a licensed software model and flexible deployment options, but more importantly, adding Network Security to your business practices.

Tenable Network Security and Ingram Micro ... Tenable’s Nessus vulnerability scanner, the global standard in detecting and assessing network data, simplifies vulnerability assessment, auditing, reporting and PCI compliance. ... traffic and detects devices on your network, including virtual and cloud-based devices.

Tags:

  Devices, Security, Network, Micro, Margin, Detecting, Benlate, Tenable network security and ingram micro

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Tenable Network Security and Ingram Micro

1 | DATA SHEETT enable Network Security and Ingram MicroAdd Security to Your Portfolio with the Market Leader in Vulnerability Management and Continuous MonitoringWhen you become a Tenable partner through Ingram Micro , you will be selling industry-leading solutions designed to help your customers ensure that they have the tools and information to keep their enterprises safe and secure. Tenable s Nessus and SecurityCenter product families lead the market in vulnerability management and continuous monitoring solutions, offering you a quick sale with a licensed software model and flexible deployment options, but more importantly, adding Network Security to your business practices.

2 You will become a recognized, trusted Security advisor to your clients, with recurring revenue streams and increased margin sales. Tenable products help businesses identify vulnerabilities, reduce risk and ensure compliance across their enterprises. Tenable s Nessus vulnerability scanner, the global standard in detecting and assessing Network data, simplifies vulnerability assessment, auditing, reporting and PCI products provide high-speed asset discovery, configuration auditing, target profiling, malware detection, sensitive data discovery, patch management integration and vulnerability analysis.

3 Single scanners, multi-scanner support and consolidation Cloud or on-premises model Passive, continuous scanning (with Passive Vulnerability Scanner) Payment Card Industry Approved Scanning Vendor (PCI ASV) validation services SecurityCenter products provide the ability to continuously monitor a customer s enterprise, applying Nessus technology as well as passive scanning and log correlation, which provide the intelligence necessary to apply strong Security policies to protect the Network Jetson Bryant Market Development Specialist Ingram Micro Licensing Ben Elkington Tenable Channel Account Manager LOG CORRELATION ENGINE SECURITYCENTER PVS PASSIVE VULNERABILITY SCANNER NESSUS CLOUDNESSUS PROFESSIONALNMNESSUS MANAGER2 Tenable Products Offered Through Ingram MicroProduct PortfolioNessus Professional Global standard in detecting and assessing Network data.

4 Active vulnerability scanning Web application scanning Mobil device detection Malware auditing Exportable reports Scan scheduling, targeted email notifications Distributed scanning Compliance checks (PCI DSS, NERC, CIS, FDCC, NIST, HIPAA)Nessus Manager On-premises multi-scanner solution that enables sharing of resources among an unlimited set of users or Nessus Professional features plus: Manage multiple Nessus scanners, policies, reports and users/groups Add users, assign new roles, assign users to groups Assign resources to users and/or groups Share results with users and/or groups Agent and/or agent-less deploymentsNessus Cloud Tenable s hosted, cloud-based vulnerability management solution.

5 Designed to scan internally and externally. Customers can take advantage of optional PCI ASV compliance Nessus Professional and Nessus Manager features plus: Tenable hosted scanning PCI ASV Compliance servicesPassive Vulnerability Scanner (PVS) Passively monitors Network traffic and detects devices on your Network , including virtual and cloud-based features: Passive scanning and monitoring (IPv4, IPv6 and mixed networks) Asset detection including BYOB/mobile, virtual, and cloud-based systems Vulnerability identification in devices , OS and applications Scan sensitive systems unavailable to active scans Effectively scan without credentials Inappropriate use and insider threats discovery Pinpoint rogue assets and systems automatically Track all client and server application vulnerabilities Identify when an application is compromised or subverted Detect protocols and application used on communicating systems Packet-level sniffing with patented technology SecurityCenter Continuous View (SC CV)

6 - Tenable s market-defining continuous monitoring platform, provides the most comprehensive and integrated view of Network health across all environments, including traditional, mobile, virtual and cloud. From a single console, SecurityCenter CV offers a unique combination of detection, reporting and pattern recognition utilizing industry-recognized algorithms and models to deliver the most advanced analysis of Security risks and compliance exposure. SecurityCenter CV incorporates all Nessus scanning technology, PVS capabilities and Tenable s Log Correlation Engine, which delivers centralized log analysis and event monitoring to find actionable context in customer this platform your customers can.

7 Eliminate risk, even in mobile, virtual and cloud systems Rapidly respond to advanced threats and compliance violations Streamline breach investigations Identify failing Security processesTarget BusinessesFor the smaller-size SMB or retail customers that might only need vulnerability scanning and assessment, Nessus will meet their internal scanning requirements. Nessus Cloud will meet their PCI compliance external scanning SMB/Retail customers requiring vulnerability management, perhaps with multiple locations, Nessus Manager provides a centralized management platform for conducting internal vulnerability scanning from one or more Nessus scanners.

8 Nessus Cloud provides internal and external scanning and PCI ASV services. If the requirement is for a comprehensive continuous monitoring view of their Network , they are also a potential candidate for SecurityCenter the larger SMB or enterprise customers, SecurityCenter CV provides continuous monitoring that combines active and passive scanning for detection, reporting, and pattern recognition of assets accessing networks, as well as log correlation to provide Security intelligence that will enable advanced analysis of Security risks and compliance exposure present in an with Third-Party IntegrationsTenable offers the following third-party integrations with Nessus Manager, presenting cross-sell opportunities with other vendors.

9 These integrations provide additional value to your partners and their customers, and increased sales opportunities for you. Cloud instances (AWS AMIs) MDM vendors (Airwatch, MobileIron, Exchange Activ Sync) Third-party identity services (Cisco ISE) Mitigation - Quarantine vulnerable/infected host (Cisco ISE) Patch management integration capabilitiesFor More Information: Ingram Champsite: im-inside-world/operations/operationspri vate/champhome/ See Tenable site for podcasts, demo videos and more: 2015. Tenable Network Security , Inc. All rights reserved.

10 Tenable Network Security and Nessus are registered trademarks of Tenable Network Security , Inc. SecurityCenter Continuous View and Passive Vulnerability Scanner are trademarks of Tenable Network Security , Inc. All other products or services are trademarks of their respective owners. EN-MAR202015-V1


Related search queries