+1-202-802-9399 (US)

Automating Credentialed Vulnerability Assessments

Tuesday, July 19, 2016 | 2:00 PM ET | 1 CPE Credit

63% of confirmed data breaches involve weak, default or stolen passwords*

The security risk intensifies if the stolen passwords are for privileged account credentials that unlock exceptional access to systems, applications, and sensitive data. Maintaining privileged account credentials is no small challenge. Yet privileged account access is what enables the most comprehensive vulnerability and scanning and analysis of targeted networks and systems. But, storing credentials in your vulnerability management solution results in decentralized security policies, extra work to maintain those passwords, and creates an additional attack vector for internal and external threats.

Together, Thycotic and Tenable enable you to easily perform credentialed scans, collecting the most accurate vulnerability information giving you the context and visibility needed to take action. Integration between Tenable Nessus Cloud and Thycotic Secret Server makes managing credentialed scans easy and secure, ensuring that you’re delivering more accurate results and identifying threats and vulnerabilities sooner.

Join Tenable Network Security and Thycotic to learn how together, Nessus Cloud and Thycotic Secret Server can help you:

• Perform deeper vulnerability analysis
• Shrink the attack surface
• Reduce the time and effort needed for credential additions and changes
• Improve compliance with regulations requirement credential management

*Verizon 2016 Data Breach Investigations Report

SHARE THIS


The following two tabs change content below.
mm

Chris Frishe

mm

Latest posts by Chris Frishe (see all)

ISC-CPE Credit LogoInterested in CPE Credit for attending? Please provide your (ISC)2 ID certificate number when you register. You will then automatically see your CPE credit added to your (ISC)2 account within 4-6 weeks. Note, most Thycotic webinars qualify for 1 CPE credit.