Tenable SecurityCenter Primary Use Case

Joey Smith
Medical Device Cybersecurity Analyst at a healthcare company with 10,001+ employees
I'm the one who scans and performs assessments on clinical and medical equipment in our environment. I manage the clinical endpoint devices: MRI systems, bedside monitoring, Alaris pumps, fusion pumps, CTUs, EEGs, EKGs, wireless defibrillators, and a lot of IP cameras that are part of operation room labs. My colleague handles all the regular enterprise IT, database servers, etc. From a scanning standpoint, I do everything from discovery scanning to full-credential auditing and anything and everything in between. That's just for the medical space in a 24/7 production medical environment. We're also using a bit of the Passive Vulnerability Scanner and, eventually, I want to get to using the agents, but we haven't gotten to that stage yet. View full review »
Information Security Expert at a comms service provider with 5,001-10,000 employees
I primarily use this solution for vulnerability assessment on the assets that we have. This includes servers, network equipment, appliances, routers, firewalls, and switches. View full review »
Abill Nerry
Senior Manager, IT Security at a financial services firm with 5,001-10,000 employees
Basically it reviews our threat landscape vulnerability. So, we just want to be sure that we check compliance in terms of our configuration and compliance to our policies. But, the key is to make sure that we are not exposed to non-vulnerabilities that can be exploited. So, it's more of just securing our threat landscape. View full review »
Carl Vancil
Network Security Analyst at a government with 201-500 employees
I use SecurityCenter currently to investigate daily network security events from reports I receive. Our network support team uses it to track, manage, and remediate system vulnerabilities. It works well for the latter, not so much for the former. View full review »
Senior Information Security Analyst at a financial services firm with 1,001-5,000 employees
The primary use case is to perform vulnerability assessments across the entire network. View full review »

Sign Up with Email