SecurityCenter CV enables testing of servers to ensure they are configured with the proper level of access control, including separation of duties, and that accounts are configured with least needed privileges.
Additionally, new users can be detected through continuous network monitoring, which SecurityCenter CV provides through powerful host analysis capabilities that facilitate an enterprise-wide search of a particular user’s activity.
SecurityCenter CV has the ability to identify the user IDs associated with specific network activity, allowing the organization to ensure that only authorized users are performing the activity. SecurityCenter CV continuously listens to network data flows and can be configured to monitor for a number of specific data types (e.g., credit card data, patient health information, etc.) across specified network segments.
SecurityCenter CV performs continuous network monitoring to detect user account access and help ensure that accounts are only accessing systems they have authorization to access. This is done through continuous network monitoring utilizing Tenable’s five sensors.
SecurityCenter CV utilizes audit files that organizations can customize to their environment to ensure proper system configuration. Audit files can be used to monitor registry keys, such as the ones responsible for screensaver timeouts and session locks.
Through the use of agents, SecurityCenter CV can monitor and manage remote access to the environment. Network access, vulnerabilities and device configuration are monitored through agents that report device information back to SecurityCenter CV, even if the device is remote.
SecurityCenter CV can monitor unique asset groups (such as those identified as being used remotely) to ensure they are accessing the organization’s environment through approved managed access points as opposed to rogue access points in the environment. These can be detected and reported to system administrators for further analysis.
SecurityCenter CV utilizes agents to monitor remote devices with policies and configurations defined by the organization. Remote network access and system activity can all be logged, monitored and reported on to an organization’s specifications to ensure users only have access to servers and applications to which they’ve been given rights to access.
Administrators can utilize audit files to monitor remote access servers to ensure they are compliant with the organization’s cryptography standards. Organizations can utilize audit files to monitor and report on configuration settings to ensure proper authentication controls and encryption configurations are in place for wireless access. Alerts can be created and sent to necessary personnel should weak encryption or authentication settings be discovered.
SecurityCenter CV has the ability to monitor, analyze and report on various mobile device types and operating systems connected to the network for administrators to monitor. Mobile assets can be dynamically placed into a unique “mobile assets” group for review and analysis. SecurityCenter CV has the ability to monitor and report settings of an organization’s Mobile Device Management (MDM) system. Passcode, remote wipe and encryption settings can all be monitored with SecurityCenter CV policy audits.
SecurityCenter CV allows organizations to monitor connections to and from external information systems by source and destination IP addresses and counts connections made between them. This information is sortable by IP address or connection count to easily track connections for authorized and unauthorized use.
Through the use of audit files, SecurityCenter CV can continuously monitor and report on publicly accessible information systems to ensure they are properly secured and maintained. SecurityCenter CV also performs host analysis to track file and directory change events for administrators to review. Searches can be done on host, IP address or event type to ensure data is not being unintentionally exposed.