Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Operationalizing Security Operations

218 views

Published on

Learn how Tenable is helping you achieve service now, not later! Get tips on how to operationalize security operations.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Operationalizing Security Operations

  1. 1. ServiceNow! Not Later… Operationalizing Security Operations
  2. 2. Who We Are $100M+ Revenue 800+ Employees 20 Countries Global Distribution 20,000+ Customers 15-20% of Business is Federal Government 40%+ Growth
  3. 3. • ServiceNow Geneva or Helsinki • ServiceNow Security Operations Module • Tenable SecurityCenter 5.x or greater • At least one ServiceNow MID server configured in your environment that can reach your Tenable SecurityCenter server(s) Integration Requirements
  4. 4. • Automatically deliver scan results from Tenable’s unique sensors for continuous monitoring of network and host vulnerabilities • Eliminate silos of security data with automated workflows • Automate documentation of key risk decisions Benefits
  5. 5. • Enhance response by automatically prioritizing workflows without requiring manual intervention • Minimize errors by providing Tenable vulnerability data in ServiceNow ticketing format with context and details for immediate action • Quantify your workload Benefits…
  6. 6. Tenable and ServiceNow Integration
  7. 7. 1 Tenable’s SecurityCenter and its array of Nessus Sensors conduct continuous monitoring of all assets in the Enterprise 2 Using Tenable’s robust APIs, ServiceNow Security Operations module conducts scheduled data requests for vulnerability and remediation data from Tenable
  8. 8. 3 The ServiceNow Security Operations leverages data from SecurityCenter to prioritize remediation activities
  9. 9. 4 ServiceNow Security Operations workflows assign and track remediation activities using input from SecurityCenter data 5 As incidents are responded to, remediation status is updated continuously updated through API data pulls from SecurityCenter 6 The process continues 24/7/365 since the work of a cyber incident response never stops

×