On 6/11/2011 12:09 PM, Anatoly Bodner wrote:
> Has anyone ever looked into scripting/automating community or commercial
> security scanners? Are there utilities which anyone found helpful to
> support this? How effective and what aspects of automation have you been
> able to achieve, auto execution of regularly-scheduled scans, or
> creation and modification of new scans, targets, and outputs of reports?
> 
> Anatoly
> [email protected] <mailto:[email protected]>
> 

Hi there,

We have two white papers about Tenable's approach of combining
distributed active scanning with distributed passive scanning. Our
enterprise solution is referred to as Unified Security Monitoring.

Here are links to the papers with no need to fill out forms or enter in
fake gmail accounts:

Unified Security Monitoring Best Practices
http://www.nessus.org/expert-resources/whitepapers/unified-security-monitoring-best-practices

Firewall and Boundary Auditing
http://www.nessus.org/expert-resources/whitepapers/firewall-and-boundary-auditing

The firewall and boundary auditing paper takes the concept of putting a
scanner or sniffer outside your firewall to audit what ports are open to
new levels.

-- 
Ron Gula, CEO
Tenable Network Security
http://www.tenable.com



_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to