Tenable Acquires Attack Path Visualization Company Cymptom
Identify and Eliminate Attack Paths
Headline breaches, be they advanced persistent threats or common hacks, routinely exploit well known attack paths in enterprise networks. Identifying, understanding and removing these attack paths before attackers can exploit them is critical to reducing the probability of a breach.
Combining Tenable’s market- leading coverage of vulnerabilities and misconfigurations with Cymptom’s attack path visualization and prioritization capabilities will enable security teams to preemptively focus response ahead of attacks in a unified risk-based platform to eliminate the paths attackers take.
