Tenable Security Center provides an automated approach to implementing, assessing and monitoring many of the SP 800-53 technical controls. Tenable Security Center provides both active and passive monitoring to ensure all stakeholders have near real-time visibility of technical control status. Out-of-box report, dashboard and Assurance Report Card® templates make it easy for you to track and demonstrate conformance.
Get the Solution Brief
NIST SP 800-53 & Tenable
Learn how Tenable Security Center implements assesses and continually monitors technical controls.
Take Your Security Program to the Next Level
Tenable Security Center collects data from multiple sensors to provide advanced analysis of vulnerability, threat, network traffic and event information and deliver a continuous view of IT security across your environment. It gives you the information you need to continuously adapt and improve your security posture to protect your organization.
Supports most technical controls prescribed in the NIST CSF, ISO/IEC 27002 and CIS CSC frameworks, and builds them into an automated control foundation for managing risk and securing the business.
Use active scanning combined with continuous listening to obtain a complete view of control conformance across your environment.
Analyze Third-Party Security Products
Audit configurations of many third-party products and analyze events generated by them to identify control weaknesses.
Dynamic Asset Grouping
Focus dashboards to display a complete security and compliance view for services in your industrial control system and IT networks, including physical and virtual infrastructure, cloud and mobile environments.
Measure, Visualize and Communicate Adherence to Controls
Easily measure, visualize and understand your technical control conformance status by using dashboard templates, and identify gaps between where you are and where you want to be.
Map Technical Control Status to Business Objectives
Use Tenable Security Center Assurance Report Cards to compare your current security status to the desired status and help you build a roadmap for demonstrating a defensible security program.