• Skip to Main Navigation
  • Skip to Main Content
  • Skip to Footer
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try

Exposure Management

Manage cyber risk with one platform to find, prioritize and eliminate exposures across your attack surface.
Find out more
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try
Exposure Management
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
  • Customers
  • Continental AG
Case study

Continental AG Continental AG logo


TISAX is the most important seal of approval for our industry today. Without the robust, risk-based vulnerability management and unified view of our attack surface via the Tenable One Exposure Management Platform, we would hardly be able to meet the ENX requirements and many doors would remain closed to us.

Martin Sturm, Continental

Download the case study
Primary product used

Tenable One


The world’s leading AI-powered exposure management platform

Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between.

Explore this product Request a demo
Industry: Automotive Supply
Location: Germany

Continental AG achieves TISAX compliance readiness with Tenable One

As an automotive supplier, Continental AG operates in a strictly regulated market. In addition to NIS-2, KRITIS and GDPR, the TISAX industry standard maintained by the ENX Association is of central importance. More and more OEMs (Original Equipment Manufacturers) are making TISAX certification a prerequisite for participating in attractive tenders, and suppliers only receive the coveted seal if they can prove that they minimized their cyber risks with appropriate technical and organizational measures.

Key business needs

  • Meet regulatory and compliance requirements (TISAX, NIS-2, GDPR) to stay eligible for OEM contracts
  • Prevent future cyberattacks after a major incident exposed vulnerabilities
  • Gain unified visibility across IT, OT, cloud, and web apps in a global environment
  • Enable risk-based decisions with prioritized insights, automation, and clear reporting

"TISAX is the most important seal of approval for our industry today. Without the robust, risk-based vulnerability management and unified view of our attack surface via the Tenable One Exposure Management Platform, we would hardly be able to meet the ENX requirements and many doors would remain closed to us," says Martin Sturm, CISSP and IT Security Manager.

Strengthening its position as a reliable supply chain partner

Sturm joined Continental in 2023, after the company experienced a serious cyber incident, to coordinate the introduction of company-wide vulnerability management for IT, OT and cloud. "But TISAX is a relatively recent development," he notes. "When we originally made the decision to invest in vulnerability management, the issues of governance and compliance played a relatively subordinate role. The overriding task at the time was to reliably prevent an attack like the one in 2022 from happening again."

The search for a suitable solution started with a comprehensive market analysis. As a first step, the newly formed vulnerability management team at Continental developed a detailed catalog of requirements and compared this with the portfolios of all established VM vendors. The four most promising candidates were then tested in a comprehensive proof of concept. "We set up a demo environment that was closely aligned with our actual IT and app landscape and hid dozens of vulnerabilities in there – from incorrectly configured Kubernetes clusters to unpatched OT systems and service accounts with unnecessarily broad authorizations. We then scanned this environment with each of the four VM solutions to see which performed best," says Sturm.

The rules were as simple as they were objective—the solution that found the most vulnerabilities was to be awarded the contract. Tenable One identified approximately 25 percent more vulnerabilities than the competition, including several critical use cases.

Tenable delivers strategic advantage

After a six-month test phase, Tenable outperformed nearly all competitors in a strong field. Its key advantage was the holistic approach enabled by its unified exposure management platform, Tenable One. The platform consolidated the broad feature set Continental required—spanning vulnerability and attack surface management, cloud and web application security, and OT security—into a consistent, all-in-one solution. The integrated view made it easy to correlate vulnerabilities, eliminate data silos, and reduce risk.

Outstanding detection rate in cloud and OT

Tenable One scored particularly well in the areas of cloud security and OT. The platform scored bonus points in several critical use cases – for example, in detecting misconfigurations in cloud environments, such as Azure PIM and Amazon S3 buckets.

Comprehensive platform provides holistic insights

In spring 2024, the project team set about transferring the Tenable One proof of concept (PoC) installation into live operation. In view of the high level of integration, the platform's wide range of functions and the complexity of the environment, the team opted for a multi-stage approach:

  • In Phase 1, a company-wide vulnerability management with Tenable Nessus scanners and company-wide attack surface management were rolled out in Continental's IT environment
  • Phase 2 focused on the parallel introduction of Tenable Web App Scanning and Tenable Cloud Security
  • Phase 3 saw the rollout of the OT security solution

Phase 1: Vulnerability and attack surface management with Tenable Nessus

As a multinational company that is active in 56 countries and employs 200,000 people, Continental operates over 500,000 dedicated IT systems worldwide. In order to reliably capture and scan these assets, more than 200,000 Tenable Nessus scanners were required – but despite this enormous volume, the rollout went quite smoothly.

"We set up a relatively simple metric. Locations with fewer than 1,000 IT systems are scanned centrally by us," recalls Sturm. "In all larger locations, we set up dedicated scanners because there were usually enough reserves there to manage the scans on-site. In this way, we were able to parallelize many tasks – and covered over 80 percent of the IT systems within a very short time."

10 percent more web assets than suspected

To identify potentially compromised and unknown web assets, the team accompanied the Nessus scans with Tenable Attack Surface Management. The solution analyzed the DNS entries, IP addresses and ASNs in the Continental network to locate all web-facing systems and found ten percent more assets than originally suspected. The identified systems were then inventoried using a wide range of metadata in order to obtain an optimal overview of the IT landscape.

Phase 2: Tenable Cloud Security and Tenable Web App Scanning

The cloud is omnipresent at Continental today especially in its more innovative units, where in-house application development plays a key role. At Continental, as in nearly every software company today, development takes place primarily in the cloud. To ensure the security of data and access in the cloud, the project team integrated Tenable Cloud Security, a comprehensive Cloud-Native Application Protection Platform (CNAPP). The solution connects to all major public cloud providers via open APIs, and continuously identifies – and provides actionable guidance for remediating – risks in hybrid and multi-cloud environments. This allows the team to secure cloud configurations, workloads and identities, while ensuring that development, Infrastructure as Code (IaC) and Kubernetes environments are secure and compliant at all times.

"Tenable Cloud Security helps us cut cloud risks faster and easier—no experts needed. It reveals toxic access, flags anomalies, and gets us closer to least privilege," notes Sturm.

At the same time, Continental integrated Tenable Web App Scanning – a powerful scanner that dynamically scans approximately 2,500 internal and external web applications and APIs in the corporation for potential vulnerabilities, thus paving the way for timely remediation without disruption.

Phase 3: Protecting the OT environment

After completing the first two phases, the team proceeded to the final phase of the project—the rollout of Tenable OT Security—a groundbreaking step in more than one respect. A few selected OT locations had already been integrated during the PoC, and the Tenable Professional Services team provided expert guidance and resources to streamline deployment in Continental’s complex environment.

The actual fleet was much more heterogeneous than the showcase selection. In addition, due to the high prevalence of on-prem systems, only a few tasks could be solved remotely and many steps had to be readjusted on-site where the wide range of operating systems, software versions, protocols and interfaces that characterize industrial environments today proved to be a real challenge.

"We were well aware of the difficulties that awaited us," confirms Sturm. "And most of these hurdles have materialized in one form or another. Nevertheless, the rollout of Tenable OT Security will not only improve our security standing, but also achieve very relevant savings by bringing our entire exposure management program into a modern and consolidated platform."

ISMS based on ISO 27001 sets the stage for NIS-2 and TISAX

When assessing and prioritizing the identified IT, cloud and OT vulnerabilities, Continental adopted a consistently risk-based approach from day one, which is closely aligned with the requirements of ISO 27001. Instead of simply tagging vulnerabilities according to their CVSS rating, the team uses the much more meaningful Vulnerability Priority Ratings (VPR) provided by Tenable, which takes into account the probability of an exploit as well as the severity of the vulnerabilities. The VPR ratings are then validated again with regard to their risk potential, explains Sturm. "If you have the same vulnerability on two notebooks, but one belongs to the CEO and the other to an intern, the criticality is of course much higher in the first case. Although this individual readjustment requires some effort, it enables us to take the business impact of the vulnerabilities into account and to always focus our energy on the most dangerous hotspots."

Executive liability is no longer an issue

This risk-based approach not only contributes to the efficiency of processes and the protection of critical systems, but is also crucial in terms of compliance. Both the TISAX standard mentioned at the beginning and the NIS-2 Directive require those responsible at companies to systematically manage risk and even enforce the personal liability of management in the event of breaches. "There can be no compromises when it comes to complying with legal requirements and relevant industry standards. Compliance is therefore a key issue for us, and Tenable One helps us to meet complex regulations and standards. By implementing this holistic, risk-based platform, we have set the course for seamless monitoring, implementation, and documentation of all relevant requirements", Sturm emphasizes.

Spillover effects on the company's patch culture

To make the most of Tenable’s exposure management platform potential, Sturm's team automatically forwards the vulnerability data, including for cloud vulnerabilities along with actionable recommendations, to the company's asset and patch managers. They then decide for themselves how to deal with the respective risks - in other words, whether to close the vulnerabilities or to accept the risks. Sturm sees the close exchange between the teams as a big plus. "The clear communication of vulnerabilities and business impacts has definitely led to a completely new, much more sensitive patch culture. If the responsible colleagues can see at a glance what danger a vulnerability poses and even receive concrete guidance on how to fix it, it is usually closed promptly."

Robust database for well-founded decisions

In addition, the raw data from Tenable One is also automatically transferred via API to Continental's reporting team, which then distributes the huge volume to decentralized databases and prepares it for the executives. In this way, stakeholders and decision-makers in the company are always kept up to date on the status quo and the successes in vulnerability management – and can make better decisions based on hard facts. "The extensive automation of processes is another major benefit for the team, and frees up the employees to focus on the jobs they were originally hired for – even if we are far from unlocking the full potential," says Sturm.

In December 2024, Continental's Executive Board announced that the Automotive division will be transformed into a dedicated organization by September 2025. This restructuring – which also includes the separation of the shared IT infrastructure of the Automotive, Tires, ContiTech and Vibration Control units into four dedicated environments – brings exciting opportunities to expand the successful implementation of the Tenable One platform.

Back to Top

  • Tenable One

Related customer case studies

TechMatrix


Read case study

Major US Telecommunications Company


Read case study

SRF Limited


Read case study

Explore all case studies ›

Your exposure ends here.

Partners

  • Become a partner
  • Find a partner
  • Partner portal
  • Partner programs

Resources

  • Services
  • Technical support
  • Training and certifications
  • Product documentation
  • Customer community
  • Tenable Trust

Company

  • About us
  • Executive team
  • Newsroom
  • Investor relations

Connect

  • Contact us
  • Try our product
  • Chat with sales
  • Meet us at an event
  • Join us
  • Privacy policy
  • Do not sell/share my personal information
  • Legal
  • 508 compliance

© 2026 Tenable®, Inc. All rights reserved

Tenable One

Request a demo

The world’s leading AI-powered exposure management platform.

Thank You

Thank you for your interest in Tenable One.
A representative will be in touch soon.

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

Request a demo

Close cloud exposure with the actionable cloud security platform.

Thank You

Thank you for your interest in Tenable One Cloud Exposure.
A representative will be in touch soon.

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

Request a demo

Identify and prioritize vulnerabilities based on risk to your business. Managed on premises.

Thank You

Thank you for your interest in Tenable Security Center.
A representative will be in touch soon.

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

Request a demo

Streamline security and IT collaboration and shorten the mean time to remediate with automation.

Thank You

Thank you for your interest in Tenable Patch Management.
A representative will be in touch soon.

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

Request a demo

Know, expose and close IT and container vulnerabilities.

Thank You

Thank you for your interest in Tenable Enclave Security.
A representative will be in touch soon.

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

Request a demo

Gain visibility into your internet-connected assets to eliminate blind spots and unknown sources of risk.

Thank You

Thank you for your interest in Tenable One Attack Surface Management.
A representative will be in touch soon.

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

Request a demo

See, secure, and manage how your teams use AI platforms.

Thank You

Thank you for your interest in Tenable One AI Exposure.
A representative will be in touch soon.

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

Request a demo

Close OT exposure with the unified security solution for converged OT/IT environments.

Thank You

Thank you for your interest in Tenable One OT Exposure.
A representative will be in touch soon.

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

Request a demo

Close identity exposure with the essential solution for the identity-intelligent enterprise.

Thank You

Thank you for your interest in Tenable One Identity Exposure.
A representative will be in touch soon.

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

Why Tenable

See Tenable in action

Want to see how Tenable can help your team find and fix critical cyber weaknesses that put your business at risk? Complete this form to get a custom quote or demo.

Thank you for subscribing!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Thank You

You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

Subscribe

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Thank you for subscribing!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

Try for free

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.


Buy now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


Number of assets

100

Choose your subscription

Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management.
A representative will be in touch soon.

Debug:
Form ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

Try for free

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy now

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

FQDNs

5
$3,578
Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Web App Scanning.
A representative will be in touch soon.

Debug:
Form ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

Try for free

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Fill out the form below to continue with a Nessus Pro trial.

Buy now

Buy Tenable Nessus Professional

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

*VAT incl.

Try for free

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional? Upgrade to Nessus Expert free for 7 days.

Buy now

Buy Nessus Expert


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.