Security Experts:

Tenable Adds IPv6 Support to Vulnerability Management Solution

Tenable Network Security announced upgrades to its unified security monitoring platform, SecurityCenter, on Tuesday.

The most significant update to the product is added support for IPv6, as organizations with IPv6 already enabled, or those planning on future implementations, can benefit from the layered risk assessment and management tools offered.

The SecurityCenter upgrades focus on the Continuous View (CV) side of the platform, allowing network managers to “automatically identify, manage and audit security and compliance risk in IPv6 environments; as soon as and wherever IPv6-enabled assets communicate across the network - increasing situational awareness,” the company states.

IPv6 is steadily gaining in adoption, but for the most part the protocol developed to replace IPv4 isn’t completely mainstream, as many organizations tend to dual-stack the network running IPv6 and IPv4 at the same time. Eventually, the aim is to transition out completely.

In addition to the upgrades in CV, Tenable also announced upgrades to SecurityCenter Passive Vulnerability Scanner (PVS). Combined, the upgrades target customer requests and market changes since the last product release.

The company said that new collaboration functions in SecurityCenter enable it to trigger scans, share reports, and initiate incident and remediation workflow with details on vulnerabilities, threats, and malware detection.

“Our customers are already the first to continuously manage risk from mobile, cloud and virtual infrastructure. Now they can add IPv6 to the list of challenges they’ve uniquely prepared their organizations for,” said Ron Gula, CEO and co-founder of Tenable Network Security. 

In September 2012, the network security firm announced that it has raised $50 million dollars in its first round of venture funding.

Additional information is available online.

view counter
Steve Ragan is a security reporter and contributor for SecurityWeek. Prior to joining the journalism world in 2005, he spent 15 years as a freelance IT contractor focused on endpoint security and security training.