Comprehensive installation, administration and user guides are available as downloadable PDF files. The documentation is, in a word, voluminous. The core is the Nessus vulnerability scanner, which scans servers and network gear against a massive database of vulnerabilities and displays them referencing the CVSS and CVE IDs. Customizable analytics and dashboards can be displayed and shared among users within the Securit圜enter console, and new ones are easily created through a simple wizard or via download from the company website. Fully scalable, each module can be installed on a single server or on a server dedicated to each. Available as software or as a virtual or hardware appliance, its multiple modules combine discovery, auditing, event management and vulnerability and data leakage detection into a single threat management suite. This product comes with a massive feature set. Once we completed the wizard, we attached our Nessus, Passive Vulnerability Scanners and Log Correlation Engine modules to Securit圜enter and we were ready to go. This wizard stepped us through adding the appropriate licensing information, configuring SMTP, LDAP and various organization settings. After the initial installation was complete, we accessed the product via a web browser and completed the configuration wizard presented to us. The Securit圜enter configuration itself was reasonably straightforward. ![]() Each component has its own installer with its own license key or file, and the majority of components required minimal configuration as control of each component was managed by the Securit圜enter console. We considered this a strength, as we were able to spread the product installation across multiple servers for increased performance. Each component needed to be installed separately, with varying system requirements - some requiring Linux, others able to be installed on Windows or Apple operating systems. ![]() While we wouldn't call Securit圜enter's setup complicated, necessarily, it was not as straightforward as some other products - due to its modular nature. Combining the gold-standard Nessus vulnerability scanner with the powerful Passive Vulnerability Scanner and Log Correlation Engine, Tenable's Securit圜enter Continuous View brings some of the industry's best vulnerability management tools under one roof.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |