Tenable.io™ is an open, cloud-based vulnerability management platform, built for today’s dynamic IT assets, including cloud, containers and web applications. By exchanging data with the industry’s leading technology products, Tenable.io provides IT and security teams with unparalleled visibility and insight into current risks and threats.
With a fully documented, easy-to-use API and software development kit (SDK), customers and partners can easily connect to the Tenable.io platform to share system, application and user data. This enriched view makes full use of existing technology investments and helps automate manual tasks, enabling you to focus on the most critical issues.
Below are current Tenable.io partner integrations for ITSM workflow, credentials management, network access, patch management and other solutions. Leverage these out-of-the-box integrations to streamline your vulnerability practice and protect your organization, from network to endpoint to cloud and beyond.
Tenable.io integrates with VMware AirWatch to detect vulnerabilities in mobile devices and its associated operating system and applications, and also audit for adherence with corporate policies and best practices.
Amazon Web Services
Tenable.io scans AWS instances to detect vulnerabilities, malware and compliance issues (pre-authorized); can audit AWS infrastructure for adherence to AWS and security best practices; and can connect directly to AWS for CloudTrail event monitoring.
BMC BladeLogic consumes Tenable.io vulnerability scan data to ensure security and regulatory compliance across the entire digital service lifecycle, from service creation to operation to decommissioning. By leveraging Tenable.io vulnerability data, BladeLogic can help customers identify vulnerabilities, reduce risk and ensure compliance
Tenable.io integration with CyberArk Application Identity Manager simplifies privileged access to hosts for vulnerability and compliance scans, enabling improved scan accuracy and performance.
ForeScout CounterACT integrates with Tenable.io to improve endpoint security and real-time visibility over managed and unmanaged devices, while automating network access control and threat response.
Good for Enterprise and Tenable.io integrate to detect mobile vulnerabilities and misconfigurations with devices, applications and systems.
IBM QRadar integrates with Tenable.io to pull Nessus® vulnerability scan data for enhanced security insight and intelligence.
Tenable.io detects and audits Microsoft Azure cloud services to identify misconfigurations and identify entry points for attackers.
Tenable.io integrates with MobileIron to identify vulnerabilities associated with mobile device operating systems and associated applications, detect whether the devices are misconfigured, and check for out-of-compliance, as well as audit for adherence with corporate policies and Tenable best practices.
Phantom consumes Tenable.io vulnerability scan data for security automation and orchestration. By leveraging Tenable.io’s vulnerability data, customers can streamline their security operations for faster, automated decision-making.
Tenable.io works with Quest KACE (formerly Dell) systems management appliances to identify missing patches on vulnerable systems, identify unmanaged systems that are vulnerable and require patching, and extend scanning to cover systems that cannot be directly scanned.
Tenable.io vulnerability scanning integrates with Red Hat Satellite to correlate patch status to identify inconsistencies in current patching programs.
Splunk integrates with Tenable.io vulnerability data to protect organizations from advanced cyber threats by providing better security intelligence and context.
Tenable integrates with Symantec Altiris to correlate patch statuses reported by Symantec with the results of Tenable.io vulnerability scanning. By correlating patching with scan results, organizations can identify inconsistencies in their patching programs.
“As organizations progress their cloud migration initiatives, the potential attack surface increases with the introduction of new tools and applications making connections to sensitive assets in these dynamic environments. Read More– Adam Bosnian, Executive Vice President of Global Business Development and Head of the C3 Alliance, CyberArk
“ForeScout partners with Tenable to leverage complementary capabilities and bring comprehensive visibility and automated control over endpoints. This helps customers get up-to-date information about vulnerable endpoints and mitigate threats. ForeScout Extended Module for Tenable facilitates a vulnerability scan, shares contextual insights and provides automated system-wide response against threats, thereby increasing the overall security posture of the network and minimizing data breaches.”- Pedro Abreu, Chief Strategy Officer, ForeScout
“Phantom helps IT teams by streamlining security operations. Together with Tenable.io's leading vulnerability scan data, customers can more effectively protect their organizations by automating and orchestrating the best response to the most critical security issues.”- CP Morey, Vice President of Products & Marketing, Phantom
“By leveraging timely vulnerability scan data from Tenable in our IBM QRadar security intelligence platform, our clients can correlate system vulnerabilities with their infrastructure security events to automatically prioritize security incidents with greater accuracy.”- Rich Telljohann, Director of Business Development, IBM Security
"The integration of BMC’s Threat Director solution with the Tenable.io vulnerability scanning technology significantly benefits our joint customers, enabling them to quickly assess, prioritize and remediate high-risk assets. Read More- David Cramer, Vice President, Product Management, BMC Software