Red Hat NETWORK 3.6 - Guide de l'utilisateur Page 50

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 61
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 49
Copyright © 2002-2012 Tenable Network Security, Inc.
50
ABOUT TENABLE NETWORK SECURITY
Tenable Network Security, the leader in Unified Security Monitoring, is the source of the
Nessus vulnerability scanner and the creator of enterprise-class, agentless solutions for the
continuous monitoring of vulnerabilities, configuration weaknesses, data leakage, log
management, and compromise detection to help ensure network security and FDCC, FISMA,
SANS CAG, and PCI compliance. Tenable’s award-winning products are utilized by many
Global 2000 organizations and Government agencies to proactively minimize network risk.
For more information, please visit http://www.tenable.com/.
Tenable Network Security, Inc.
7063 Columbia Gateway Drive
Suite 100
Columbia, MD 21046
410.872.0555
www.tenable.com
Vue de la page 49
1 2 ... 45 46 47 48 49 50 51 52 53 54 55 ... 60 61

Commentaires sur ces manuels

Pas de commentaire