{"id":126,"date":"2023-08-09T16:41:42","date_gmt":"2023-08-09T13:41:42","guid":{"rendered":"http:\/\/tenable.com.ua\/?page_id=126"},"modified":"2023-08-10T12:55:17","modified_gmt":"2023-08-10T09:55:17","slug":"tenable-network-security","status":"publish","type":"page","link":"https:\/\/tenable.com.ua\/?page_id=126","title":{"rendered":"Tenable Network Security"},"content":{"rendered":"<p>Tenable Network Security \u0443\u0437\u0433\u043e\u0434\u0436\u0443\u0454 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0437 \u043f\u043e\u0442\u0440\u0435\u0431\u0430\u043c\u0438 \u0431\u0456\u0437\u043d\u0435\u0441\u0443 \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u0438\u0445 \u0440\u0456\u0448\u0435\u043d\u044c, \u044f\u043a\u0456 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u044e\u0442\u044c \u043f\u043e\u0441\u0442\u0456\u0439\u043d\u0443 \u043e\u0431\u0456\u0437\u043d\u0430\u043d\u0456\u0441\u0442\u044c \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432 \u0456 \u0432\u0430\u0436\u043b\u0438\u0432\u0443 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u043d\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044e, \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0443 \u0434\u043b\u044f \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457. Tenable \u0443\u0441\u0443\u0432\u0430\u0454 \u0441\u043b\u0456\u043f\u0456 \u0437\u043e\u043d\u0438, \u0432\u0438\u0437\u043d\u0430\u0447\u0430\u0454 \u043f\u0440\u0456\u043e\u0440\u0438\u0442\u0435\u0442\u0438 \u0437\u0430\u0433\u0440\u043e\u0437 \u0456 \u0437\u043c\u0435\u043d\u0448\u0443\u0454 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0456 \u0432\u0442\u0440\u0430\u0442\u0438. \u0422\u043e\u0439 \u0444\u0430\u043a\u0442, \u0449\u043e Tenable \u043c\u0430\u0454 \u0431\u0456\u043b\u044c\u0448\u0435 \u043c\u0456\u043b\u044c\u0439\u043e\u043d\u0430 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432 \u0456 \u0431\u0456\u043b\u044c\u0448\u0435 20 000 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043a\u043b\u0456\u0454\u043d\u0442\u0456\u0432 \u043f\u043e \u0432\u0441\u044c\u043e\u043c\u0443 \u0441\u0432\u0456\u0442\u0443, \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0443\u0454 \u0440\u0456\u0432\u0435\u043d\u044c \u0434\u043e\u0432\u0456\u0440\u0438 \u0434\u043e Tenable \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0456 \u0431\u0435\u0437\u043f\u0435\u043a\u0438. \u041a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u043c\u0438 \u043a\u043b\u0456\u0454\u043d\u0442\u0430\u043c\u0438 Table \u0454 \u043d\u0430\u0439\u0431\u0456\u043b\u044c\u0448\u0456 \u0443 \u0441\u0432\u0456\u0442\u0456 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0456\u0457 \u0437\u0456 \u0441\u043f\u0438\u0441\u043a\u0443 Fortune Global 500, \u043f\u0440\u043e\u0432\u0456\u0434\u043d\u0456 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0456 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457 \u0442\u0430 \u0441\u0435\u0440\u0435\u0434\u043d\u0456 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u0449\u043e \u043f\u0440\u0430\u0446\u044e\u044e\u0442\u044c \u0443 \u0442\u0430\u043a\u0438\u0445 \u0441\u0444\u0435\u0440\u0430\u0445, \u044f\u043a \u0444\u0456\u043d\u0430\u043d\u0441\u0438, \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f, \u043e\u0445\u043e\u0440\u043e\u043d\u0430 \u0437\u0434\u043e\u0440\u043e\u0432&#8217;\u044f, \u0432\u0438\u0449\u0430 \u043e\u0441\u0432\u0456\u0442\u0430, \u0440\u043e\u0437\u0434\u0440\u0456\u0431\u043d\u0430 \u0442\u043e\u0440\u0433\u0456\u0432\u043b\u044f \u0442\u0430 \u0435\u043d\u0435\u0440\u0433\u0435\u0442\u0438\u043a\u0430.<\/p>\n<h4><span style=\"color: #000000;\"><strong>\u0420\u0456\u0448\u0435\u043d\u043d\u044f Tenable Network Security<\/strong><\/span><\/h4>\n<p><strong>Nessus\u00ae<\/strong> \u0454 \u043d\u0430\u0439\u0431\u0456\u043b\u044c\u0448 \u0448\u0438\u0440\u043e\u043a\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0432\u0430\u043d\u0438\u043c \u0441\u043a\u0430\u043d\u0435\u0440\u043e\u043c \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u0443 \u0441\u0432\u0456\u0442\u0456, \u044f\u043a\u0438\u043c \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u044e\u0442\u044c\u0441\u044f \u043f\u043e\u043d\u0430\u0434 1,6 \u043c\u0456\u043b\u044c\u0439\u043e\u043d\u0430 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432 \u0437 \u0443\u0441\u044c\u043e\u0433\u043e \u0441\u0432\u0456\u0442\u0443. Nessus \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0438\u0439 \u044f\u043a \u043e\u0434\u043d\u043e\u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0446\u044c\u043a\u0438\u0439 \u0441\u043a\u0430\u043d\u0435\u0440 Nessus Professional, \u0442\u0430\u043a \u0456 \u0431\u0430\u0433\u0430\u0442\u043e\u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0446\u044c\u043a\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0441\u043a\u0430\u043d\u0443\u0432\u0430\u043d\u043d\u044f Nessus Manager \u0456 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u0448\u0432\u0438\u0434\u043a\u0435 \u0456 \u043d\u0430\u0434\u0456\u0439\u043d\u0435 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439, \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043a\u043e\u043d\u0444\u0456\u0433\u0443\u0440\u0430\u0446\u0456\u0457 \u0442\u0430 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e\u0441\u0442\u0456, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c \u0443 \u0444\u0456\u0437\u0438\u0447\u043d\u0438\u0445, \u0432\u0456\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u0438\u0445 \u0456 \u0445\u043c\u0430\u0440\u043d\u0438\u0445 \u0441\u0435\u0440\u0435\u0434\u043e\u0432\u0438\u0449\u0430\u0445.<\/p>\n<p><strong>\u2122 Tenable.io<\/strong> \u0454 \u043f\u0435\u0440\u0448\u043e\u044e \u0432 \u0441\u0432\u0456\u0442\u0456 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u043e\u044e \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0430\u043c\u0438, \u0449\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u0432\u0438\u0434\u0438\u043c\u0456\u0441\u0442\u044c \u0432\u0441\u0456\u0445 \u0430\u043a\u0442\u0438\u0432\u0456\u0432 \u043d\u0430 \u0431\u0443\u0434\u044c-\u044f\u043a\u0456\u0439 \u043e\u0431\u0447\u0438\u0441\u043b\u044e\u0432\u0430\u043b\u044c\u043d\u0456\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0456. \u0426\u0435 \u0434\u0430\u0454 \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u0430\u043c \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0442\u0430 \u043a\u0435\u0440\u0456\u0432\u043d\u0438\u0446\u0442\u0432\u0443 \u0432\u043f\u0435\u0432\u043d\u0435\u043d\u043e \u043f\u0440\u0430\u0446\u044e\u0432\u0430\u0442\u0438 \u0437 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u044f\u043c\u0438 \u0442\u0430 \u0440\u0438\u0437\u0438\u043a\u0430\u043c\u0438. \u041f\u043e\u0431\u0443\u0434\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u043f\u0435\u0440\u0435\u0434\u043e\u0432\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u044f\u0445 Nessus, \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 Tenable.io \u043f\u0440\u0430\u0446\u044e\u0454 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e \u0434\u043e \u0441\u0443\u0447\u0430\u0441\u043d\u043e\u0433\u043e \u043f\u0456\u0434\u0445\u043e\u0434\u0443, \u044f\u043a\u0438\u0439 \u043f\u0456\u0434\u0442\u0440\u0438\u043c\u0443\u0454 \u0434\u0438\u043d\u0430\u043c\u0456\u0447\u043d\u0456 \u0430\u043a\u0442\u0438\u0432\u0438, \u0442\u0430\u043a\u0456 \u044f\u043a \u0445\u043c\u0430\u0440\u0438 \u0442\u0430 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0438.<\/p>\n<p>\u0421\u0456\u043c\u0435\u0439\u0441\u0442\u0432\u043e \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0456\u0432 <strong>SecurityCenter\u00ae<\/strong> \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0434\u0430\u043d\u0438\u043c\u0438 \u0442\u0430 \u0430\u043d\u0430\u043b\u0456\u0437 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u0432 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0430\u0445 \u0432\u0441\u0456\u0454\u0457 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457, \u0432\u0438\u0437\u043d\u0430\u0447\u0430\u0454 \u043f\u0440\u0456\u043e\u0440\u0438\u0442\u0435\u0442\u0438 \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u043e\u0432\u0430\u043d\u0456 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438 \u0442\u0430 \u0437\u0432\u0456\u0442\u0438 \u043f\u0440\u043e \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u0456\u0441\u0442\u044c. \u0417\u0430\u0432\u0434\u044f\u043a\u0438 \u043f\u043e\u0441\u0442\u0456\u0439\u043d\u043e\u043c\u0443 \u043c\u043e\u043d\u0456\u0442\u043e\u0440\u0438\u043d\u0433\u0443 \u043a\u043e\u043c\u0430\u043d\u0434\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043c\u043e\u0436\u0443\u0442\u044c \u043a\u0456\u043b\u044c\u043a\u0456\u0441\u043d\u043e \u043e\u0446\u0456\u043d\u0438\u0442\u0438 \u0442\u0430 \u0432\u0456\u0437\u0443\u0430\u043b\u0456\u0437\u0443\u0432\u0430\u0442\u0438 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u043f\u0440\u0438\u043b\u0430\u0434\u043d\u0438\u0445 \u0434\u043e\u0449\u043e\u043a \u0456 \u0437\u0432\u0456\u0442\u0456\u0432, \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044c\u043e \u0441\u0442\u0432\u043e\u0440\u0435\u043d\u0438\u0445 \u0443 \u0426\u0435\u043d\u0442\u0440\u0456 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u044f\u043a\u0456 \u043b\u0435\u0433\u043a\u043e \u043d\u0430\u043b\u0430\u0448\u0442\u043e\u0432\u0443\u044e\u0442\u044c\u0441\u044f, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0443\u043d\u0456\u043a\u0430\u043b\u044c\u043d\u0438\u0445 \u0443 \u0433\u0430\u043b\u0443\u0437\u0456 Assurance Report Cards\u00ae \u0456\u0437 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u044f\u043a\u043e\u0441\u0442\u0456.<\/p>\n<h4>\u00a0<a href=\"https:\/\/tenable.com.ua\/?page_id=158\"><span style=\"color: #3366ff;\"><strong>\u041f\u0435\u0440\u0435\u0439\u0442\u0438 \u0434\u043e \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0456\u0432 \u0442\u0430 \u0440\u0456\u0448\u0435\u043d\u044c<\/strong><\/span><\/a><\/h4>\n<table dir=\"ltr\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\" align=\"center\">\n<thead>\n<tr>\n<th scope=\"col\">Feature<\/th>\n<th scope=\"col\">Nessus Professional<\/th>\n<th scope=\"col\">Tenable.io Vulnerability Management<\/th>\n<th scope=\"col\">Tenable.io Container Security<\/th>\n<th scope=\"col\">Tenable.io Web Application Scanning<\/th>\n<th scope=\"col\">Security Center<\/th>\n<th scope=\"col\">SecurityCenter Continuous View<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Deployment Type<\/td>\n<td>\u00a0On-Prem<\/td>\n<td>Cloud<\/td>\n<td>Cloud<\/td>\n<td>Cloud<\/td>\n<td>\u00a0On-Prem<\/td>\n<td>\u00a0On-Prem<\/td>\n<\/tr>\n<tr>\n<td>Vulnerability Scanning &amp; Assessment<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Scan Scheduling<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Compliance Checks<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Malware Detection<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Threat Intelligence<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Web Application Tests Using the Nessus Scan Policy Template<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Scan Modern HTML5 and AJAX Web Applications<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Detect OWASP Top 10 Vulnerabilities in Web Applications<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>SCADA Plugins<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Sensitive Data Searches<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>PCI Internal Vulnerability Scanning<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>PCI External Vulnerability Scanning (ASV Certified)<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Elastic Licensing Based on Assets Instead of IP Addresses<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Container Image Policy Enforcement<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Private Container Registry \u201cBuilt for Security\u201d<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Reporting &amp; Dashboards<\/td>\n<td>\u2714 (Basic Reporting)<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td>\u2714 (Basic Reporting)<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Centralized Scan &amp; Scan Policy Management<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Scan Resource Sharing<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Group and Role-Based Access<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Mobile Device Management Integration<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Patch Management System Integration<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Credential Management System Integration<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Agent-Based Scanning<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714*<\/td>\n<td>\u2714*<\/td>\n<\/tr>\n<tr>\n<td>Assurance Report Cards<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Trouble Ticketing &amp; Tracking<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Dynamic Asset Lists with Policy-Based Grouping<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Role-Based Scan Zone &amp; Repository Access<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Near Real-Time Asset Discovery<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Continuous Monitoring<\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<td>\u2714<\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Host Activity Monitoring &amp; Analytics<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<\/tr>\n<tr>\n<td>Near Real-Time Anomalous Behavior Detection &amp; Analysis<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>\u2714<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>*\u00a0Requires Tenable.io Vulnerability Management or Nessus Manager for agent management.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tenable Network Security \u0443\u0437\u0433\u043e\u0434\u0436\u0443\u0454 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0437 \u043f\u043e\u0442\u0440\u0435\u0431\u0430\u043c\u0438 \u0431\u0456\u0437\u043d\u0435\u0441\u0443 \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u0438\u0445 \u0440\u0456\u0448\u0435\u043d\u044c, \u044f\u043a\u0456 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u044e\u0442\u044c \u043f\u043e\u0441\u0442\u0456\u0439\u043d\u0443 \u043e\u0431\u0456\u0437\u043d\u0430\u043d\u0456\u0441\u0442\u044c \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432 \u0456 \u0432\u0430\u0436\u043b\u0438\u0432\u0443 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u043d\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044e, \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0443 \u0434\u043b\u044f \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457. Tenable \u0443\u0441\u0443\u0432\u0430\u0454 \u0441\u043b\u0456\u043f\u0456 \u0437\u043e\u043d\u0438, \u0432\u0438\u0437\u043d\u0430\u0447\u0430\u0454 \u043f\u0440\u0456\u043e\u0440\u0438\u0442\u0435\u0442\u0438 \u0437\u0430\u0433\u0440\u043e\u0437 \u0456 \u0437\u043c\u0435\u043d\u0448\u0443\u0454 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0456 \u0432\u0442\u0440\u0430\u0442\u0438. \u0422\u043e\u0439 \u0444\u0430\u043a\u0442, \u0449\u043e Tenable \u043c\u0430\u0454 \u0431\u0456\u043b\u044c\u0448\u0435 \u043c\u0456\u043b\u044c\u0439\u043e\u043d\u0430 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432 \u0456 \u0431\u0456\u043b\u044c\u0448\u0435 20 000 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043a\u043b\u0456\u0454\u043d\u0442\u0456\u0432 \u043f\u043e \u0432\u0441\u044c\u043e\u043c\u0443 \u0441\u0432\u0456\u0442\u0443, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/tenable.com.ua\/index.php?rest_route=\/wp\/v2\/pages\/126"}],"collection":[{"href":"https:\/\/tenable.com.ua\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tenable.com.ua\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tenable.com.ua\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tenable.com.ua\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=126"}],"version-history":[{"count":3,"href":"https:\/\/tenable.com.ua\/index.php?rest_route=\/wp\/v2\/pages\/126\/revisions"}],"predecessor-version":[{"id":165,"href":"https:\/\/tenable.com.ua\/index.php?rest_route=\/wp\/v2\/pages\/126\/revisions\/165"}],"wp:attachment":[{"href":"https:\/\/tenable.com.ua\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}