0% found this document useful (0 votes)
1K views

Tenable Slides For Presentation

This document discusses risk-based vulnerability management using Tenable products and services. It highlights that Tenable provides visibility across IT, OT, cloud, containers and remote workers to see all assets and potential vulnerabilities. Tenable then predicts which vulnerabilities should be prioritized to most effectively reduce risk. It also notes that Tenable can translate technical findings into metrics to help organizations assess and improve their overall security posture and benchmark against peers.

Uploaded by

Tofan Dwi Arta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Tenable Slides For Presentation

This document discusses risk-based vulnerability management using Tenable products and services. It highlights that Tenable provides visibility across IT, OT, cloud, containers and remote workers to see all assets and potential vulnerabilities. Tenable then predicts which vulnerabilities should be prioritized to most effectively reduce risk. It also notes that Tenable can translate technical findings into metrics to help organizations assess and improve their overall security posture and benchmark against peers.

Uploaded by

Tofan Dwi Arta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Risk-based Vulnerability

Management
BERITA CYBER SECURITY DI INDONESIA & GLOBAL

2
APLIKASI DIGITAL DAN KEAMANAN DI INDONESIA

5
COMPLIANCE (KEPATUHAN) DI INDONESIA

Persyaratan kepatuhan terus


meningkat dan mitra bisnis sering
kali memerlukan kesesuaian
dengan standar keamanan yang
diterima, seperti ISO 27001/ 2, PCI-
DSS, dll.
HASILNYA: Keamanan dapat
ditingkatkan dari mengurangi celah
keamanan dan meningkatkan nilai
Brand Perusahaan

6
SEE PREDICT ACT
EVERYTHING WHAT MATTERS TO ADDRESS RISK
Great security starts with With over 18,000 vulnerabilities When business leaders ask
complete and continuous being disclosed last year, half of “How Secure Are We?” They
visibility of the modern attack which were rated high or aren’t looking for a 300 page
surface. critical, it’s difficult to know technical answer.
where to start in reducing risk.
Only Tenable can give visibility Tenable translates raw
of IT, OT, Cloud, Container, Web Tenable continuously analyses technical findings into metrics
Apps and remote workers with over 20 Trillion aspects of and measurements that can be
one platform. threat, vulnerability and asset used to drive improvement and
information to focus first on the communicate overall value of
issues that matter most. the security program.

CUSTOMER • Do you have continuous visibility of all of the assets across your expanded attack surface?
3 QUESTIONS •

How do you decide which vulnerabilities to prioritize and is that effective at reducing risk?
If you were able to compare the effectiveness of business units in their ability to identify
and address exposures, how would that drive better behavior?
VISIBILITY OF THE MODERN ATTACK SURFACE
With adaptive approaches to assessing assets and devices across the infrastructure

CLOUD

API

3rd Party Container Applications Web Apps APIs Policy Workloads


Libraries
Frictionless Web App
Assessment OT Scanning

Agent OT Industrial Manufacturing OT Converged BMS Energy Image


Assessment Assessment
IT

Passive Passive Monitoring


Assessment --- for OT
Office Mobile Remote

Active Active Query


Assessment For OT
Servers Workstations Infrastructure
See everything. Predict what matters.

Managed in the Cloud.

Tenable.io is an integral component of the Tenable


Cyber Exposure Platform that
provides actionable insight into your entire
infrastructure’s attack surface.
MANAJEMEN KERENTANAN UNTUK MICRO-SERVICES
MANAJEMEN KERENTANAN UNTUK APLIKASI WEB
See everything. Predict what matters.

Managed On-Prem.

Get a risk-based view of your IT, security and


compliance posture so you can quickly identify,
investigate and prioritize vulnerabilities.
MONITORING KERENTANAN YANG BERKELANJUTAN
ASSURANCE REPORT CARDS –UNTUK KEPERLUAN AUDIT
MANAJEMEN KERENTANAN UNTUK OPERATIONAL TECHNOLOGY (OT)
How secure is the business? Meet your
Cyber Exposure Score

For the first time ever, you can visualize and explore
your Cyber Exposure, track risk reduction over time,
and benchmark against your peers.
“Tenable executes on its vision
to build the single-source-of-truth
platform for VRM. Part of Tenable’s
strong strategy relies on translating
data to provide business insight to
provide prioritization.”
Tenable Ranked #1 for
Device Vulnerability
Management Market Share

IDC, Worldwide Device Vulnerability Managem ent Market Shares, 2019: Finding the Transitional Elem ents Between
21 Device Assessm ent Scanning and Risk-Based Rem ediation (doc # US46284720, May 2020)
MENGAPA HARUS TENABLE

Technology Leadership Singular Vision Customer Commitment


Creator of Nessus and relentless innovator Market leading Risk-Based Vulnerability Complete dedication to our customers’
advancing modern cybersecurity –from IT Management technology and pioneering success –every day, in all we do
to OT, Cloud to Container Cyber Exposure to help customers
measure & reduce cybersecurity risk
Tenable Product Support
• Tenable memiliki Global Support 24/ 7 di Amerika, Eropa/ Timur tengah dan Asia
Pacific. Untuk Asia Pacific, lokasinya ada di Singapore

• Team Support di Asia Pacific juga cukup besar

• Support Portal Tenable ada di https:/ / community.tenable.com. Di portal ini kita bisa:
• Download license untuk customer yang sudah beli
• Open case ke Support
• Diskusi dengan customer lain yang menggunakan product Tenable
>80 CYBER EXPOSURE
INTEGRATION
PARTNERS
Terima Kasih. Ada pertanyaan?

25

You might also like