• Skip to Main Navigation
  • Skip to Main Content
  • Skip to Footer
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try

Exposure Management

Manage cyber risk with one platform to find, prioritize and eliminate exposures across your attack surface.
Find out more
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try
Exposure Management
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
  • Customers
  • Cancom
Case study

Cancom CANCOM


End users need to be able to use a security solution without problems and see tangible benefits. Tenable is very compelling in this regard because it simplifies IT security while increasing the level of security.
Download the case study
Primary product used

Tenable Security Center


Expose and close your cyber weaknesses with the world’s #1 vulnerability management solution—managed on-prem.

Reduce risk across your IT infrastructure. The solution that created the category continues to raise the bar to protect enterprises from critical cyber exposures that increase business risk.

Explore this product Request a demo
Industry: IT Service Provider
Location: DACH Region

CANCOM counts on Tenable for vulnerability and exposure management

The attack surface of all companies is constantly growing, and with it the risk of vulnerabilities.

As an experienced specialist for security solutions, CANCOM designs and implements customized security solutions for its customers and supports them in operating their infrastructure securely. CANCOM relies on Tenable's vulnerability and exposure management solutions to protect its own infrastructure and will offer these security solutions to its customers as part of its managed services portfolio in the future.

“Tenable has established itself as a market leader in the difficult area of exposure management,” said Marcel Reifenberger, CISO at CANCOM. “Digital trust is of the utmost importance to us and our customers, and Tenable’s reputation and leadership were key factors in our decision. In addition, we were impressed by Tenable’s streamlined user experience and were immediately sold.”

Key business needs

The services range from analyzing and assessing security and network infrastructure to designing state-of-the-art security solutions and deploying and implementing them. CANCOM helps its customers operate their infrastructure securely with its security support and managed services. The attack surface of all companies is constantly growing, and with it the risk of vulnerabilities and misconfigurations. As a hybrid IT service provider, CANCOM itself operates a large IT department with its own data centers in Germany and teams across several departments.

CANCOM had been using different vulnerability scanners in individual business units of its IT environment, which has grown over the years. Because of this isolated approach, cybersecurity assessments proved increasingly complex, and maintenance was time-consuming and expensive. In addition, there were problems due to incompatibility with other security solutions. CANCOM has therefore set itself the goal of deploying a uniform solution for vulnerability and exposure management throughout the company.

“Safety is a marathon, not a sprint. Attackers only need to find a single open door, but we must close all the doors. The aim must be to make life so difficult for the attackers as possible,” says Reifenberger. "It is now clear that not all doors – or vulnerabilities – can be patched immediately. That's why it's important to keep them all in mind and to distinguish between doors that are particularly at risk and doors that are less at risk.”

CANCOM chooses Tenable for its vulnerability management solution

To meet this challenge, CANCOM chose technology from Tenable, which specializes in exposure management solutions. Tenable supports B2B customers around the world who want to identify and reduce cybersecurity risks. As the developer of Tenable Nessus®, Tenable has extended its expertise in exposure management to provide the world's first platform for detecting and securing any digital asset on any computing platform.

User-friendliness is the decisive factor in security solutions. CANCOM conducted a proof-of-concept (PoC) with Tenable that quickly addressed any potential concerns. “Tenable is intuitive, easily customizable, and compatible with operating system environments like Windows and Linux and easily integrates with ITSM platforms such as ServiceNow. This seamless integration means that many processes can be automated,” explains Reifenberger.

Gradual rollout, integration into managed services portfolio is planned

All hardware is located in CANCOM data centers in Germany, much of it virtualized. CANCOM relies on comprehensive vulnerability management of its entire corporate environment as well as penetration tests to ensure that all vulnerabilities and possible entry points are found. In the future, Tenable Security Center (formerly Tenable.sc) will be used for vulnerability management. Tenable Security Center is managed on-premises, based on Tenable Nessus® technology, and provides comprehensive vulnerability coverage with continuous assessment of the network in real time.

The solution provides security teams with a risk-based overview of the state of their IT, security and compliance. Security executives have a comprehensive overall picture of all risks in the environment and know exactly which vulnerabilities and assets they should prioritize.

The introduction of Tenable at CANCOM will be gradual and will replace existing solutions. CANCOM intends to use Tenable's solutions not only in-house, but also to integrate them into its managed security services portfolio.

“Security is an essential trademark of CANCOM, and that's why we always use the most innovative solutions. We only offer our customers solutions if we ourselves are convinced that they meet the respective requirements in the best possible way. In this way we would like to take into account an increasing demand in the future. Nowadays, every company needs a solution for vulnerability and exposure management, otherwise the security of the business cannot be guaranteed,” explains Reifenberger.

New challenges of the wireless trend, cloud and hybrid working

The Internet of Things (IoT) will also lead to ever greater and more diverse security challenges for enterprises, as IoT devices bring new vulnerabilities to the corporate environment. Add to that 5G/6G and WLAN 6, because wireless is the future, and attacks through wireless infrastructure will increase as a result. Another critical security issue is the ongoing shift to cloud computing and hybrid working models, as this increases both the attack surface and the number of potential threats and vulnerabilities. Even before the pandemic began, CANCOM was well prepared for hybrid work, but it continues to bring new security challenges.

An ever-growing attack surface can also be attributed to corporate growth. CANCOM is growing rapidly and is constantly acquiring companies that need to be integrated into the security concept. This means that vulnerability scanning has to be a continuous, automated process.

Usability, performance and context are key

“End users need to be able to use a security solution without problems and see tangible benefits. You should have as little work as possible with security, so both usability and performance must be right,” explains Reifenberger. "Tenable is very compelling in this regard because it simplifies IT security while increasing the level of security.”

Roger Scheer, Tenable's Regional Vice President Central Europe, adds, "It's also important to assess vulnerabilities in the context of an organization's specific cyber risk. The importance of a particular vulnerability may change over time as the threat landscape changes as well. Also, a vulnerability in one type of asset may have a less severe impact than another type of asset. Modern, future-proof vulnerability management must be able to recognize exactly this and provide context for the environment that is to be protected. Only then can a company prioritize a vulnerability in such a way that the risk is reduced as much as possible.”

Automation pays off

Security is an increasingly complex issue and a challenge for many companies. The overarching goal is to continuously reduce cyber risk. It is therefore important to focus on the essentials, reduce complexity as much as possible and automate as much as possible. But many companies still do too much manual work when it comes to cybersecurity.

“Automation requires an initial investment, but it definitely pays off in the long run. Thanks to Tenable, we can do our 'homework' in terms of vulnerability management better and better,” concludes Reifenberger.

Back to Top

  • Tenable Security Center

Related customer case studies

TechMatrix


Read case study

Continental AG


Read case study

Major US Telecommunications Company


Read case study

Explore all case studies ›

Your exposure ends here.

Partners

  • Become a partner
  • Find a partner
  • Partner portal
  • Partner programs

Resources

  • Services
  • Technical support
  • Training and certifications
  • Product documentation
  • Customer community
  • Tenable Trust

Company

  • About us
  • Executive team
  • Newsroom
  • Investor relations

Connect

  • Contact us
  • Try our product
  • Chat with sales
  • Meet us at an event
  • Join us
  • Privacy policy
  • Do not sell/share my personal information
  • Legal
  • 508 compliance

© 2026 Tenable®, Inc. All rights reserved

Tenable One

Request a demo

The world’s leading AI-powered exposure management platform.

Thank You

Thank you for your interest in Tenable One.
A representative will be in touch soon.

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

Request a demo

Close cloud exposure with the actionable cloud security platform.

Thank You

Thank you for your interest in Tenable One Cloud Exposure.
A representative will be in touch soon.

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

Request a demo

Identify and prioritize vulnerabilities based on risk to your business. Managed on premises.

Thank You

Thank you for your interest in Tenable Security Center.
A representative will be in touch soon.

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

Request a demo

Streamline security and IT collaboration and shorten the mean time to remediate with automation.

Thank You

Thank you for your interest in Tenable Patch Management.
A representative will be in touch soon.

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

Request a demo

Know, expose and close IT and container vulnerabilities.

Thank You

Thank you for your interest in Tenable Enclave Security.
A representative will be in touch soon.

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

Request a demo

Gain visibility into your internet-connected assets to eliminate blind spots and unknown sources of risk.

Thank You

Thank you for your interest in Tenable One Attack Surface Management.
A representative will be in touch soon.

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

Request a demo

See, secure, and manage how your teams use AI platforms.

Thank You

Thank you for your interest in Tenable One AI Exposure.
A representative will be in touch soon.

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

Request a demo

Close OT exposure with the unified security solution for converged OT/IT environments.

Thank You

Thank you for your interest in Tenable One OT Exposure.
A representative will be in touch soon.

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

Request a demo

Close identity exposure with the essential solution for the identity-intelligent enterprise.

Thank You

Thank you for your interest in Tenable One Identity Exposure.
A representative will be in touch soon.

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

Why Tenable

See Tenable in action

Want to see how Tenable can help your team find and fix critical cyber weaknesses that put your business at risk? Complete this form to get a custom quote or demo.

Thank you

You should receive a confirmation email shortly and one of our representatives will be in touch.

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Thank You

You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

Subscribe

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Thank you for subscribing!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

Try for free

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.


Buy now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


Number of assets

100

Choose your subscription

Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management.
A representative will be in touch soon.

Debug:
Form ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

Try for free

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy now

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

FQDNs

5
$3,578
Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Web App Scanning.
A representative will be in touch soon.

Debug:
Form ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

Try for free

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Fill out the form below to continue with a Nessus Pro trial.

Buy now

Buy Tenable Nessus Professional

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

*VAT incl.

Try for free

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional? Upgrade to Nessus Expert free for 7 days.

Buy now

Buy Nessus Expert


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.