Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070



Take control. Propel improvement. Secure the business.

Network security is a key challenge for organizations of all sizes. Increasingly, IT teams are using security frameworks to guide their efforts to protect their critical systems and data.

Learn About Security Frameworks   ▶

A variety of security frameworks are available to help users meet due care standards, continuously identify security gaps, comply with multiple compliance requirements and communicate business risk to executives.

To create a tailored solution, many organizations are selecting controls from different frameworks to suit their specific risk profile, requirements and resources. For example, they may use the NIST Cybersecurity Framework or ISO/IEC 27001/2 for administrative controls and the CIS Critical Security Controls for technical controls.

Get the Solution Story

Learn how Tenable SecurityCenter CV automates and continuously monitors technical controls.

Read Now

NIST solution

NIST Cybersecurity Framework


NIST SP 800-171


NIST SP 800-53


CIS solution

CIS Critical Security Controls


ISO solution

ISO / IEC 27001 / 27002


A Next-Generation Approach to Security

CSF mockup

SecurityCenter Continuous View® (SecurityCenter CV™) supports the flexibility of frameworks, with report, dashboard and Assurance Report Card® (ARC) templates that can easily be tailored to meet business needs.

SecurityCenter CV collects data from multiple sensors to provide advanced analysis of vulnerability, threat, network traffic and event information and delivers a continuous view of IT security across your environment.

Get a Demo

Broadest Coverage

Supports most technical controls prescribed in the NIST CSF, ISO/IEC 27002 and CIS CSC frameworks, and builds them into an automated control foundation for managing risk and securing the business.


Use active scanning combined with continuous listening to obtain a complete view of control conformance across your environment.

Analyze Third-Party Security Products

Audit configurations of many third-party products and analyze events generated by them to identify control weaknesses.

Dynamic Asset Grouping

Focus dashboards to display a complete security and compliance view for services in your industrial control system and IT networks, including physical and virtual infrastructure, cloud and mobile environments.

Measure, Visualize and Communicate Adherence to Controls

Easily measure, visualize and understand your technical control conformance status by using dashboard templates, and identify gaps between where you are and where you want to be.

Map Technical Control Status to Business Objectives

Use SecurityCenter CV Assurance Report Cards to compare your current security status to the desired status and help you build a roadmap for demonstrating a defensible security program.


Cybersecurity Frameworks and Foundational Security Controls – a Survey of IT Professionals

Get the Report NowSee How You Measure Up

“Today’s security teams are looking for all the help they can get to do an increasingly difficult job. Frameworks have become a common place to look for guidance, with most companies, 80%, saying they use a cybersecurity framework.” Dimensional Research, November 2016
無料でお試し 今すぐ購入

Tenable.io Vulnerability Managementをお試しください

60 日間無料

最新のクラウドベースの脆弱性管理プラットフォームに完全にアクセスし、比類のない正確さですべての資産を表示および追跡することができます。 今すぐご登録ください。60秒以内の最初のスキャンを実行できます。

Tenable.io Vulnerability Managementのご購入

最新のクラウドベースの脆弱性管理プラットフォームに完全にアクセスし、比類のない正確さですべての資産を表示および追跡できます。 年間サブスクリプションを今日お求めください。

65 資産
無料でお試し 今すぐ購入

Nessus Professionalを無料で試す


Nessus®は、今日の市場で最も包括的な脆弱性スキャナです。Nessus Professional は脆弱性のスキャンプロセスを自動化し、コンプライアンスサイクルの時間を短縮化するため、ITチームに専念できます。

Nessus Professional を購入する

Nessus®は、今日の市場で最も包括的な脆弱性スキャナです。Nessus Professional は脆弱性のスキャンプロセスを自動化し、コンプライアンスサイクルの時間を短縮化するため、ITチームに専念できます。