Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual Infrastructure.

Tenable Network Security has announced that its patented Passive Vulnerability Scanner™ (PVS™) 4.0 is now generally available as a standalone product. Already available as part of Tenable’s SecurityCenter continuous monitoring platform, PVS 4.0 can now be used by any company, security specialist or compliance auditor to monitor networks in real-time, in a non-intrusive manner.


“PVS goes beyond traditional scanning. We use it to find anomalous indicators after a breach. It also allows us to provide valuable prevention services to our clients,” said Reg Harnish, Chief security strategist of GreyCastle Security, a security consulting firm who provides incident response, pen testing, and on-going professional services to enterprise clients. “The Tenable brand is a tremendous selling point for our customers, and that level of brand recognition has been important in building our business.”


Using network sniffing technology, PVS 4.0 uniquely identifies and assesses transient systems—like mobile, virtual and cloud apps—that may not be present during scheduled scans, and pinpoints potential security and compliance risks. PVS 4.0 also monitors systems sensitive to disruption, uncovers inappropriate use and insider threats, and eliminates gaps between active scans. PVS scanners are invaluable as dedicated servers within your network and at customer sites deployed by consultants.


“By supplementing a Nessus active scan-based strategy with PVS 4.0, companies can significantly lower their overall security risk, increase compliance and avoid costly security breaches,” said Ron Gula, CEO of Tenable Network Security.”


The new features available in PVS 4.0 include:
· Improved Interface: HTML5 Web-based Interface optimised for mobile
· Simplified Installation: Guided by an installation wizard
· Optimised to run on portable systems
· Web-based Data Export: Supported file formats include .csv, .nessus and .html
· Automatic snapshots: Network discovery and vulnerability data provides visibility into changes over time
Vulnerability scanning is a cornerstone of IT security and has become a regulatory compliance standard today. Over the last few years, scanning has risen in priority as confirmed by the first four controls in the SANS Top 20 Critical Controls.

Research shows ‘game needs to be changed,’ with security innovation years behind that of the attackers, the board a decade behind security discussions and regulation needing more industry input.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that the UK’s Mid-Market IT Leadership expects to see a shortfall in IT spend in 2022. While 52% of IT decision-makers believe their 2021 budget met the ambitions of their team, there seems to be less certainty and confidence about future finances — 61% think their budget will need to increase in 2022, but only 13% expect it to.
Atos has launched Atos OneCloud Sovereign Shield, a set of solutions, methodologies, and operational cloud services that is unique on the market, enabling clients across the world to meet the challenges of managing their data in the edge to cloud continuum, in line with the highest jurisdictional data governance requirements. Part of the Atos' OneCloud initiative, Atos OneCloud Sovereign Shield is a comprehensive edge to cloud platform ecosystem and highly secure service that improves the level of control clients have over the data they produce and exchange, helping them regain control and effectively deal with legal dependencies.
New distribution agreement set to bolster Westcon-Comstor’s Zero Trust offering in more markets across Europe with further expansion into APAC planned.
Research from Avast has found that employees in almost a third (31%) of Small and Medium Businesses (SMBs) in the UK are connecting to the corporate network using personal devices that do not have any security controls in place, according to IT Decision Makers (ITDMs) within SMBs.
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53% offer backup services.
Trend Micro has published new research revealing that 90% of IT decision makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals. Additionally, 82% have felt pressured to downplay the severity of cyber risks to their board.
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real terms’ during 2022 – leading to increased cyber vulnerability.