3D Vulnerability, Connection and Asset Visualization

3D Vulnerability, Connection and Asset Visualization

This is a screen shot of the Tenable 3D Tool which works with SecurityCenter. It can visualize a topology based on Nessus vulnerability scans, change features of each node (color, shape, icon, size, elevation, animation) based on any type of value such as an asset class, political group, technology, .etc. Each node also can have 8 vertical bars (4 up and 4 down) which can be colored based on vulnerability, open port, missing patches, configuration issues, .etc. Each node can also have connection information displayed from IDS, netflow, firewall, login failures, .etc that have been collected by the Passive Vulnerability Scanner or from logs gathered by the Log Correlation Engine. The tool is currently in beta testing and will be available to Tenable customers in early 2011. http://www.tenable.com

That sounds real good. I

That sounds real good. I always put your pic in my slides (non-commercial), to show the kind of network monitoring tool that is required - http://secviz.org/content/3d-network-topology
I didn't get a chance to play with it, but can tell it's like Etherape with loads of extras going by the description - so it's like if you're using Etherape and you want to also see the network info for each node, and more...

Video posted

http://www.youtube.com/watch?v=8rFVEijp2Gs:

I created a video of the 3D Tool beta and posted it to YouTube. There is also a walk through of how the data is gathered and used for 3d modeling on the Tenable Discussion portal at:

https://discussions.nessus.org/message/8787#8787

Ron Gula

3D Graph

Hi,

I'm new to visualization.

I have some experience with NMAP & Nessus. Would anyone point me to a quick-start guide how to generate this 3D or similar graph?

Appreciate a lot...

Re: 3d graph

The tool is a program we are beta testing with customers of the Tenable SecurityCenter. We plan to support XMLRPC with Nessus in earl 2011, however you need SecurityCenter if you want to do things like query by asset, age of vulnerability or as a front end to passively discovered data with the PVS or from netflow, NIDS and other logs with our LCE.

Ron Gula