Tenable Network Security Whitepapers


Sort by: Date | Company | Title


Using security metrics to drive action in ASIA Pacific
By Tenable Network Security | 8/5/2017

22 Experts Share How to Communicate Security Program Effectiveness to Upper Management.

Today’s cybersecurity challenges are more complex than ever before. Technologies like Development Containers, Cloud, BYOD, and BYOA have greatly complicated the security team’s ability to understand all of the potential IT attack surface.

We hope you find this e-book useful in helping you develop and communicate security metrics in your own organization.

Download this now


BYOD and Mobile Security – 2016 Spotlight Report
By Tenable Network Security | 21/7/2016

BYOD and Mobile Security – 2016 Spotlight Report

Download this now


Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
By Tenable Network Security | 10/3/2014

This report assesses the current state and effectiveness of vulnerability management.

Download this now


Keeping up with an Increasingly Sophisticated Threat Environment
By Tenable Network Security | 10/3/2014

Relying on traditional signature based Anti Virus alone is simply not sufficient to prevent today’s onslaught of new, sophisticated and advanced malware.

This whitepaper describes in detail, some trends and statistics on the malware detection, it then introduces a multi-vector approach to accurately detect malware in the IT environment, and verify that existing anti malware already deployed are functioning optimally.

Download this now


Implementing an Effective Vulnerability Management Program
By Tenable Network Security | 10/3/2014

Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.

Download this now
[]