Vulnerability Management in 2017: Leap Ahead or Fall...

22
Vulnerability Management in 2017: Leap Ahead or Fall Behind Josh Zelonis – Senior Analyst, Forrester Research Michael Applebaum – VP of Product Marketing, Tenable

Transcript of Vulnerability Management in 2017: Leap Ahead or Fall...

Page 1: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

Vulnerability Management in 2017:Leap Ahead or Fall Behind

Josh Zelonis – Senior Analyst, Forrester ResearchMichael Applebaum – VP of Product Marketing, Tenable

Page 2: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

© 2017 FORRESTER. REPRODUCTION PROHIBITED.

The Changing LandscapeOf Vulnerability ManagementJosh Zelonis, Senior Analyst

March 2017

Page 3: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

3© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Agenda

› How Attack Trends Have Changed Vulnerability Management

› The Intersection of Application Security and Vulnerability Management

› Containers offer a unique solution

Page 4: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

4© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Security vs Operations in Vulnerability Management

Page 5: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

5© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Software Vulnerabilities Continue To Plague Us

Source: Top Cybersecurity Threats in 2017 Forrester report

Page 6: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

6© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Elastic Infrastructure and BYOD Transform Your Network into a Shifting Landscape

Page 7: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

7© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Traditional Patching Prioritization Is Meaningless

Source: Top Cybersecurity Threats In 2017 https://www.forrester.com/go?objectid=RES136712

Page 8: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

8© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Application Security and Vulnerability Management have flirted together for years.

Page 9: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

9© 2017 FORRESTER. REPRODUCTION PROHIBITED.

DevOps Is A Gift To Us All

Page 10: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

10© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Automation Allows Us To Test Earlier In The SDLC

Page 11: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

11© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Containers take this a step farther

Page 12: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

12© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Unlike Virtual Machines, Containers Do Not Include A Full Guest OS

Source: Brief: Why Docker Is All The Rage Forrester report

Page 13: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

13© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Containers Allow Us To Push Earlier Into The SDLC

Source: Five Steps to Reinforce and Harden Application Security

Page 14: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

FORRESTER.COM

Thank you© 2017 FORRESTER. REPRODUCTION PROHIBITED.

Josh Zelonis+1 [email protected]: @jz415

Page 15: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

Tenable has introduced Tenable.io, a cloud-based platform we have been building since 2015. We will use it to transform Vulnerability Management, while expanding into application security.

We also maintain a long-term commitment to on-premises solutions.

Asset Model

Pricing /Licensing

Web App/Container

IntegrationFull Asset Visibility

Page 16: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

Tenable has introduced Tenable.io, a cloud-based platform we have been building since 2015. We will use it to transform Vulnerability Management, while expanding into application security.

We also maintain a long-term commitment to on-premises solutions.

Full Asset Visibility

IntegrationWeb App/Container

Pricing /Licensing

Asset Model

Page 17: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

Nessus Sensors Third Party Sources

Scanner Agent PVSVM

ProviderApp Sec Provider

CMDB Provider

Other 3rd Party

Vulnerability Management

Web Application Scanning

Container SecurityApplications

Platform

API and SDKIntegration

Sensors

Page 18: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

Tenable.io manages by assets, not IPs

A simple definition:An asset is a resource that can be analyzed

http://www…

Page 19: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

With Elastic Licensing for dynamic assets

Soft Enforcement

Keep working while upgrading your license

Baselines

Errors, bursts, and one-time assets are

automatically aged out

Page 20: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

Threat context improves prioritization

Page 21: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

We now offer Tenable.io Container Security to help customers with Dockervulnerability, malware & compliance analysis.

It integrates seamlessly into the build process – by integrating with common CI/CD tools.

This is the start of our push into application security.

Bringing security into the build process:Tenable.io Container Security

Define custom policies

That generate alerts or block deployment

Page 22: Vulnerability Management in 2017: Leap Ahead or Fall …event.lvl3.on24.com/event/13/71/99/5/rt/1/documents/resourceList...Vulnerability Management in 2017: Leap Ahead or Fall Behind

Next Steps

Learn more or try a free evaluation today:

tenable.com/try-io

tenable.com/try-container

Thank You!