Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

CIS Critical Security Controls

 

Simplify CIS Critical Security Controls Implementation

The CIS Controls for Effective Cyber Defense (CSC) is a set of information security control recommendations developed by the Center for Internet Security (CIS).

CSC consists of best practices compiled from a variety of sectors, including power, defense, transportation, finance and more. Many organizations – especially those with multinational operations – utilize CSC to protect their network by focusing on the top security controls – those that provide the best protection against the most dangerous threats.

Tenable.sc™ (formerly SecurityCenter®) provides an automated approach to implementing and monitoring the CIS Critical Security Controls. It delivers continuous monitoring and out-of-the-box reports, dashboards and the industry’s only Assurance Report Cards® (ARCs) to help you address CSC’s five critical tenets: offense informs defense, prioritization, metrics, continuous diagnostics and mitigation, and automation.

Get the Solution Story

Security Frameworks & Tenable

Learn how Tenable.sc automates and continuously monitors technical controls.

Read Now

Advanced Security With Tenable

Tenable.sc collects data from multiple sensors to provide advanced analysis of vulnerability, threat, network traffic and event information and deliver a continuous view of IT security across your environment. It gives you the information you need to continuously adapt and improve your security posture to protect your organization.

Get a Demo

Broadest Coverage

Supports most technical controls prescribed in the NIST CSF, ISO/IEC 27002 and CIS CSC frameworks, and builds them into an automated control foundation for managing risk and securing the business.

Continuous Visibility

Use active scanning combined with continuous listening to obtain a complete view of control conformance across your environment.

Analyze Third-Party Security Products

Audit configurations of many third-party products and analyze events generated by them to identify control weaknesses.

Dynamic Asset Grouping

Focus dashboards to display a complete security and compliance view for services in your industrial control system and IT networks, including physical and virtual infrastructure, cloud and mobile environments.

Measure, Visualize and Communicate Adherence to Controls

Easily measure, visualize and understand your technical control conformance status by using dashboard templates, and identify gaps between where you are and where you want to be.

Map Technical Control Status to Business Objectives

Use Tenable.sc Assurance Report Cards to compare your current security status to the desired status and help you build a roadmap for demonstrating a defensible security program.

Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security