Accurately identify, investigate, and prioritize your vulnerabilities 

Josh Close, Vice President of Engineering, Dasher Technologies


Too many critical vulnerabilities to patch? According to the National Vulnerability Database, your organization is not alone:  There were over 16,500 new cybersecurity vulnerabilities disclosed in 2018. Attempting to prioritize for exposure management with the Common Vulnerability Scoring System (CVSS) alone presents significant limitations because it categorizes the majority of vulnerabilities as “high” or “critical” — even though most of them will never actually be exploited. With Tenable cybersecurity vulnerability management, Dasher Technologies opts for a different approach. 

The modern era of cyber exposure

Gartner forecasts 20.4 billion connected things will be in use worldwide by 2020. By 2023, the average CIO will be responsible for more than three times the endpoints they managed in 2018. As digital transformation accelerates across industry, the enterprise digital attack surface is also being transformed into an increasingly elastic and multilayered composition. Throwing hundreds of security tools at the problem to protect from the “threat of the week” doesn’t work — that failed strategy creates fractured risk visibility and management overhead, resulting in wasteful, haphazard, and reactive vulnerability mitigation. Of the thousands of vulnerabilities identified in a year, estimates indicate that only 3% will be exploited. Security resources should be strategically trained on the most pressing problems.

How do you determine which vulnerability to fix first? Built on foundations laid for on-premise vulnerability management, cyber exposure is an emerging discipline that provides a way to objectively measure cyber risk to help guide strategic decision making in a hyper-connected world. Tenable, the world’s first cyber exposure platform, is a critical part of Dasher Technologies’ Zero Trust architecture approach to resilient cybersecurity in the digital age. 

According to Tenable, its technology “uniquely provides the breadth of visibility into cyber risk across IT, Cloud, IoT, and OT environments and the depth of analytics to measure and communicate cyber risk in business.” Tenable’s capabilities map directly to the top six basic Center for Internet Security (CIS) Top 20 best practices, which are globally recognized industry strategies endorsed by leading IT security vendors and governing bodies.

3 keys for managing cybersecurity risk

1. Implement security best practices that are referenced global standards and verified by an objective volunteer community of cyber experts.

2. To reduce cyber exposure, find and fix (first) the 3% of vulnerabilities that matter most.

3. Eliminate vulnerabilities early. Identify and fix vulnerabilities before deployment to save significant time and reduce complexity. 


Dasher Technologies leverages Tenable for vulnerability scans of our clients’ networks and system patches to ensure all is secure and protected across your cloud infrastructure, containers, OT devices and traditional IT assets. Dasher’s expert cybersecurity engineers are able to identify and prioritize your vulnerabilities based on actual risk. 

“Predictive prioritization flips the advantage back to cyber defenders by telling them where they’re exposed, to what extent, and which vulnerabilities to focus on first,” said Renaud Deraison, co-founder and chief technology officer, Tenable. “These are all critical components of an effective Cyber Exposure strategy.”

Dasher Technologies: Tenable Cybersecurity Solution Provider

Dasher is an IT solution provider of Tenable products and solutions.

With (formerly SecurityCenter) implemented by Dasher Technologies you get continuous real-time assessment of your security posture so you can find and fix vulnerabilities faster. Built on leading Nessus technology, discovers unknown assets and vulnerabilities, and monitors unexpected network changes before they turn into breaches.

With and Dasher Technologies, reduce the number of vulnerabilities requiring immediate attention by 97%. Predictive Prioritization uses threat intelligence data drawn from multiple reliable sources for machine-learning enhanced services that let you to zero in on remediating the vulnerabilities that matter most. provides the actionable and accurate data you need to identify, investigate, and prioritize the remediation of vulnerabilities and misconfigurations in your modern IT environment

Add-on modules

Safely, accurately, and automatically scans your web applications, providing deep visibility into vulnerabilities and valuable context to prioritize remediation. For modern and traditional frameworks. 

Seamlessly and securely enables DevOps and microservices processes by providing visibility into the security of container images — including vulnerabilities, malware, and policy violations – through integration with the build process.

About Tenable

Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50% of the Fortune 500, more than 25% of the Global 2000, and large government agencies.

Call Dasher at (866) 898-9506 or email us at [email protected] to talk about your next IT project.