Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Explore Technology Partners

Search by keyword OR filter by product and/or category.

Analyst Platform

Analyst Platform

Illuminate is a threat intelligence and cyber operations tool that orchestrates & automates rapid and comprehensive response actions. The illuminate integration with Tenable.sc automates the enrichment of Tenable vulnerability data to enable threat-based prioritized actions, allowing security teams to focus on what will provide the greatest reduction of cyber risk.

This integration is built and supported by Analyst Platform. Please contact [email protected] for support.

Classification: SIEM/SOAR, Threat Intelligence

Integrates with: Tenable.sc

APCON

APCON

The APCON IntellaStore platform provides data aggregation, capture, storage, and onboard applications all in one box. IntellaStore captures all traffic of interest from anywhere in the network and provides full packet visibility to the Nessus Network Monitor running directly on the IntellaStore. The ability to have Nessus Network Monitor running on the same box that is tapping the data means data can be analyzed from one spot and threats can be identified faster.

This integration is built and supported by APCON.

Classification: Network Access Control

Integrates with: Nessus

Apple

Apple

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detect vulnerabilities on those devices.

This integration is built and supported by Tenable.

Classification: Mobile Device Management

Integrates with: Tenable.io, Tenable.sc

Arcon

Arcon

Tenable’s integration with Arcon streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

This integration is built and supported by Tenable.

Classification: Privileged Access Management

Integrates with: Tenable.io, Tenable.sc

Aruba, an HPE company

Aruba, an HPE company

Aruba's integration with Tenable enables automated vulnerability assessments when systems join the network. This ensures all systems are evaluated prior to accessing secure networks.

This integration is built and supported by Aruba.

Classification: Network Access Control

Integrates with: Tenable.sc

Asimily

Asimily

Asimily is a Healthcare focused and medical device solution to manage and secure devices. Currently Asimily solves for use cases around inventory, device relationships, risk monitoring and mitigation, patch and mitigation prioritization, forensic analysis, asset utilization, policy management, vendor management, device tracking, FDA recall monitoring and is adding more. As a part of the Patch and Mitigation Prioritization module, Asimily integrates with Tenable.sc and Tenable.io to fetch vulnerabilities for scanned devices that are then processed by the Asimily solution. In addition, the Tenable scanners are configured to avoid scanning certain medical devices based on Asimily device classification.

This integration is built and supported by Asimily. Please contact [email protected] for support.

Classification: IoT Security

Integrates with: Tenable.io, Tenable.sc

Atlassian

Atlassian

Tenable integrates with Atlassian's Jira On Prem - Jira Core, Jira Software and Jira Service Desk to automatically open tickets for vulnerabilities that Tenable identifies and close them once they have been resolved, providing a cohesive and trackable remediation process.

This integration is built and supported by Tenable.

Classification: Ticketing

Integrates with: Tenable.io, Tenable.sc

Autonomic Software

Autonomic Software

Autonomic Software, Tenable, and McAfee have partnered to provide a robust, streamlined solution for closed-loop remediation. Using McAfee ePO as the main console, Tenable vulnerability findings are correlated to all assets, allowing Autonomic Software to provide a feature-rich patch management process based on Tenable findings.

This integration is built and supported by Autonomic Software.

Classification: Patch Management

Integrates with: Tenable.io

AWS

AWS

The Tenable.io connector for AWS automatically and continuously discovers and tracks asset changes in AWS cloud environments to ensure all instances are known and assessed for exposure with every change. With the life of cloud workloads commonly measured in hours, the AWS Connector solves the key challenge of achieving accurate visibility into cyber risk. In addition, Tenable’s integration with AWS Security Hub ensures all Tenable findings are available along side your other security findings for a comprehensive view of your security state.

These integrations are built and supported by Tenable.

Classification: Cloud Security, Virtual Appliance

Integrates with: Tenable.io

Axonius

Axonius

Axonius' integration with Tenable synchronizes vulnerability and asset data into the content management database in order to provide a unified view of all devices.

This integration is built and supported by Axonious.

Classification: CMDB

Integrates with: Nessus, Tenable.io, Tenable.sc

BeyondTrust

BeyondTrust

Tenable’s integration with BeyondTrust Password Safe and Privileged Identity streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure. Tenable’s integration with BeyondTrust Priviledged Identity streamlines privileged access to use in credentialed vulnerability scans, which provides a more comprehensive understanding of your cyber exposure.

This integration is built and supported by Tenable.

Classification: Privileged Access Management

Integrates with: Tenable.io, Tenable.sc

Bit Discovery

Bit Discovery

Bit Discovery enables organizations to easily and comprehensively discover their internet-connected assets including websites, mail servers, DNS servers, VPNs, IoT devices, cloud deployments and third-party providers. The integration syncs those Bit Discovery internet-connected assets into Tenable.io for prioritization and continuous visibility of the organization's entire attack surface.

This integration is built and supported by Bit Discovery.

Classification: Asset Discovery

Integrates with: Tenable.io

BlackBerry

BlackBerry

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detect vulnerabilities on those devices.

This integration is built and supported by Tenable.

Classification: Mobile Device Management

Integrates with: Tenable.io, Tenable.sc

Blackpoint Cyber

Blackpoint Cyber

Blackpoint Cyber's integration with Tenable connects vulnerability data and asset information into Blackpoint's platform for increased visibility. This provides a complete understanding of every connected device and the ability to pinpoint targeted devices immediately.

This integration is built and supported by Blackpoint Cyber.

Classification: SIEM/SOAR

Integrates with: Tenable.io

Brinqa

Brinqa

Brinqa's integration with Tenable enables organizations to effectively connect asset and vulnerability information with business context and threat intelligence data to deliver a data-driven, risk-based program.

This integration is built and supported by Brinqa.

Classification: Threat Intelligence, Vulnerability Management

Integrates with: Nessus, Tenable.io, Tenable.sc

Centrify

Centrify

Tenable’s integration with Centrify Privileged Access Service streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

This integration is built and supported by Tenable.

Classification: Privileged Access Management

Integrates with: Tenable.io

Check Point CloudGuard

Check Point CloudGuard

The Tenable.io and CloudGuard integration provides clients with high fidelity cloud security posture management to ensure more accurate findings and prioritization based on public exposures. Check Point CloudGuard Cloud Security Posture Management capabilities enrich the Tenable.io host level vulnerability findings which can help clients best prioritize their remediation and patching efforts.

This integration is built and supported by Check Point.

Classification: Cloud Security

Integrates with: Tenable.io

Chronicle, a subsidiary of Alphabet

Chronicle, a subsidiary of Alphabet

Chronicle leverages massive data and compute resources to analyze and fight cyber threats. The Backstory platform helps enterprise security teams investigate incidents and hunt for threats in their networks, at the speed of search, making sense of threat information and security telemetry on a global scale. Together, Chronicle and Tenable deliver deeper insights into security issues and improved ability to hunt and respond to threats in real time. Tenable is the first integration partner with Chronicle’s Backstory asset module.

This integration is built and supported by Chronicle.

Classification: SIEM/SOAR

Integrates with: Tenable.io

Cisco

Cisco

Firepower Management Center can automatically import vulnerability reports from Tenable’s Security Center which improves the accuracy of the Firepower Network Host Map. This enhanced Host Map improves the fidelity of Firepower’s Intrusion Event Impact Level scoring which helps analysts to prioritize the Intrusion events that can most impact the business. In addition, the Tenable information helps improve Intrusion policy tuning, further reducing false positives. The Integration with Cisco Identity Services Engine (ISE) leverages Tenable vulnerability and compliance violation findings to trigger rule-based Network Access Control to remediate vulnerable systems.

This integration is built and supported by Cisco.

Classification: Network Access Control, NGFW

Integrates with: Tenable.sc

Cohesity

Cohesity

Discover cyber exposures and vulnerabilities within your production IT environment by leveraging backup data. Cohesity CyberScan powered by Tenable, makes it easy to assess your risk posture, and meet stringent security and compliance requirements by helping to ensure no known or previously addressed vulnerabilities are re-injected into the production environment while performing a recovery job.

This integration is built and supported by Cohesity.

Classification: Data Management

Integrates with: Tenable.io

Cortex XSOAR

Cortex XSOAR

Our integration combines Tenable’s comprehensive vulnerability management capabilities with Demisto’s security orchestration and automation to help security teams standardize their incident response processes, execute repeatable tasks at scale, and accelerate time to detect and remediate vulnerabilities.

This integration is built and supported by Palo Alto Networks.

Classification: SIEM/SOAR

Integrates with: Tenable.sc

Cyber Observer

Cyber Observer

Cyber Observer is a holistic cybersecurity management solution that delivers end-to-end real-time cybersecurity posture and awareness in a single-pane-of-glass. It continuously measures the status of an organization’s security environment by Critical Security Controls from relevant security tools. Cyber Observer empowers CISOs to make insightful decisions to ensure the organization’s cybersecurity.

This integration is built and supported by Cyber Observer

Classification: Threat Intelligence, Vulnerability Management

Integrates with: Tenable.sc

CyberArk

CyberArk

Tenable’s integration with CyberArk streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

This integration is built and supported by Tenable.

Classification: Privileged Access Management

Integrates with: Tenable.io, Tenable.sc

CyGov

CyGov

CyGov empowers security and risk teams to manage their cyber risk and compliance from a single centralized platform. The platform features smart questionnaires, automated data collection and analysis from various internal tools like Nessus and Tenable.io as well as external sources of threat intelligence. The platform helps CROs and CISOs drive actionable insights at every stage of the cyber-risk management cycle using a strong visual dashboard to collaborate across all types of enterprise environments.

This integration is built and supported by CyGov.

Classification: IRM Platform

Integrates with: Tenable.sc

Cymulate

Cymulate

Cymulate's integration with Tenable ingests vulnerabilities into their workflow for automating comprehensive security posture assessment.

This integration is built and supported by Cymulate. Please contact [email protected] for support.

Classification: Breach & Attack Simulation

Integrates with: Tenable.io, Tenable.sc

Dell

Dell

Tenable solutions integrate with Dell KACE systems management appliances to identify missing patches on vulnerable systems, identify unmanaged systems that are vulnerable and require patching, and extend scanning to cover systems that cannot be directly scanned. Tenable can also audit systems running the Dell Force10 FTOS system.

Classification: Patch Management

Integrates with: Tenable.io, Tenable.sc

DF Labs

DF Labs

DF Lab's integration with Tenable simplifies automation and orchestration of vulnerability scans and completed scan collection. Additionally, asset information can be automated to enrich the security incident response process.

This integration is built and supported by DF Labs.

Classification: SIEM/SOAR

Integrates with: Tenable.io

ForeScout

ForeScout

Integration with ForeScout CounterAct® allows the product to notify Tenable when new systems join the network, triggering immediate vulnerability assessment of newly detected devices and the ability to execute protective actions on vulnerable systems.

This integration is built and supported by Forescout.

Classification: Network Access Control, SIEM/SOAR

Integrates with: Nessus, Tenable.io, Tenable.sc

Fortinet

Fortinet

Fortinet FortiSOAR, the leading Security Orchestration, Automation, and Response Platform, integrates with Tenable to facilitate an orchestrated and automated vulnerability management solution. This integration enables analysts to prioritize investigations better and be able to automate or take on-demand containment and remediation actions like re-triggering a scan, isolate affected systems using EDR integrations and deploy patches for an in-time, informed and quick response cycle.

This integration is built and supported by Fortinet.

Classification: SIEM/SOAR

Integrates with: Tenable.io

FortMesa

FortMesa

This integration performs two-way synchronization of assets between Tenable and FortMesa, and allows Tenable to drive FortMesa vulnerability management flows. FortMesa is a cyber risk and security operations platform built for humans with automated documentation and simple certification. Establish security governance, find and manage system vulnerabilities, understand your risk and security posturing, then work your way toward right-sized security & compliance standards.

This integration is built and supported by FortMesa. Please contact te[email protected] for support.

Classification: GRC, Vulnerability Management

Integrates with: Tenable.io

Garland Technology

Garland Technology

By using Garland Technology and Tenable solutions together, organizations can have total visibility of all connected network assets. This ensures organizations have a greater understanding of their cyber exposure.

This integration is built and supported by Garland Technology.

Classification: Network Access Control

Integrates with: Nessus

Gigamon

Gigamon

By deploying Gigamon and Tenable solutions together, organizations that have encrypted traffic in their environments can regain visibility into what devices are connecting to their environment and continuously monitor network traffic to identify vulnerabilities and risk.

This integration is built and supported by Gigamon.

Classification: Network Access Control

Integrates with: Nessus

Google Cloud Platform (GCP)

Google Cloud Platform (GCP)

The Tenable.io connector for GCP automatically and continuously discovers and tracks asset changes in Google cloud environments to ensure all instances are known and assessed for exposure with every change. With the life of cloud workloads commonly measured in hours, the GCP Connector solves the key challenge of achieving accurate visibility into cyber risk. In addition, Tenable’s integration with Google Cloud Security Command Center ensures all Tenable findings are available along side your other security findings for a comprehensive view of your security state. Add valuable vulnerability information to Google Cloud Security Command Center through a powerful integration with Tenable.io. This combination allows you to view vulnerability data in context of all other security and event information to provide a holistic view of your environment's security posture.

These integrations are built and supported by Tenable.

Classification: Cloud Security

Integrates with: Tenable.io, Tenable.sc

HashiCorp

HashiCorp

HashiCorp's Vault allows users to secure, store and tightly control access to tokens, passwords, certificates and encryption keys for protecting secrets and other sensitive data. Tenable's integration with HashiCorp allows customers to leverage passwords stored in HashiCorp's Vault KV store to perform authenticated scanning.

This integration is built and supported by Tenable.

Classification: Privileged Access Management

Integrates with: Tenable.io, Tenable.sc

IBM Security

IBM Security

The Tenable® App for QRadar, coupled with the QRadar Vulnerability Manager (QVM) integration combines Tenable’s Cyber Exposure insights with QRadar’s log and flow consolidation capabilities to enable users to better correlate events, take action on flaws and meet compliance standards.

The Tenable plugin for MaaS360 provides a way for security teams to understand the cyber exposure of all their mobile devices being managed by MaaS360.

Tenable’s integration with IBM's Cloud Pak for Security enables joint customers to leverage vulnerability data from Tenable.io for holistic visibility into their cloud security posture. Cloud Pak for Security users gain data insights through federated search of Tenable’s vulnerability data without having to move it to one place, as well as orchestrate and prioritize where to take action across all of those systems.

These integrations are built and supported by Tenable.

Classification: Mobile Device Management, SIEM/SOAR

Integrates with: Tenable.io, Tenable.sc

Infoblox

Infoblox

Integration with Infoblox IP Address Management allows the product to trigger immediate vulnerability assessment via Tenable when new systems join the network or during an incident to identify compromised systems.

This integration is built and supported by Infoblox.

Classification: DDI

Integrates with: Tenable.io, Tenable.sc

IntSights

IntSights

IntSights provides enterprises with the only all-in-one External Threat Protection solution that enables security teams to gain visibility and control over threats outside the wire. The IntSights integration pulls vulnerability data from Tenable into the IntSights Risk Analyzer module to help find and mitigate external threats that directly target your organization.

This integration is built and supported by Intsights.

Classification: Threat Intelligence

Integrates with: Tenable.io

Jenkins

Jenkins

This integration is built and supported by Tenable.

Classification: Build System

Integrates with: Tenable.io

JFrog

JFrog

This integration is built and supported by Tenable.

Classification: Container Registry

Integrates with: Tenable.io

K2

K2

The integration between K2 Cyber Security and Tenable.io Web Application Scanning (WAS) provides a utility accessing Tenable.io’s API to produce a single unified report detailing the vulnerabilities discovered by Tenable.io and K2 Security Platform. K2 appends details to the Tenable report, adding additional information on detected vulnerabilities, including the exact file name and line of code in the file where the vulnerability exists, enabling quicker remediation of the vulnerability in the code. K2 Cyber Security’s integration with Tenable can help organizations speed up their application deployment process by quickly locating and identifying the exact code location of discovered vulnerabilities discovered by Tenable WAS and the additional vulnerabilities found by K2 Security Platform, resulting in faster remediation.

This integration is built and supported by K2. Please contact [email protected] for support

Classification: Application Security

Integrates with: Tenable.io - Web App Scanning

Kenna

Kenna

Kenna (formerly Risk I/O) takes in vulnerability scan results from Nessus to correlate with other assessment information to help customers prioritize issues.

This integration is built and supported by Kenna.

Classification: Threat Intelligence, Vulnerability Management

Integrates with: Tenable.sc

LogRhythm

LogRhythm

LogRhythm empowers organizations on six continents to detect, respond to and neutralize damaging cyber threats rapidly. The LogRhythm platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments. Among other accolades, LogRhythm is positioned as a Leader in Gartner’s SIEM Magic Quadrant.

This integration is built and supported by LogRythm.

Classification: SIEM/SOAR

Integrates with: Tenable.io, Tenable.sc

Lumeta

Lumeta

Lumeta's integration with Tenable synchronizes vulnerability and asset data into the content management database in order to provide a unified view of all devices.

This integration is built and supported by Lumeta.

Classification: Threat Intelligence, Vulnerability Management

Integrates with: Tenable.sc

Medigate

Medigate

Medigate exports detailed visibility contexts for connected IoT and IoMT devices on Healthcare Delivery Organizations' Networks and correlates this visibility data to assets managed by Tenable.io. Medigate also ingests Tenable's vulnerability data for connected assets and present this information consolidated with Clinical vulnerabilities and risk assessment for all hospital's connected devices on Medigate's dashboard. This allows Tenable's and Medigate's mutual customer to better assess risk and prioritize remediation and mitigation steps for connected medical devices and IoT in the clinical setting.

This integration is built and supported by Medigate.

Classification: IoT Security

Integrates with: Tenable.io

Microsoft

Microsoft

Tenable integrates with Microsoft WSUS and SCCM to identify mobile devices and associated vulnerabilities. Tenable scans Microsoft operating systems, applications and databases for vulnerabilities, then audits for hardening guidelines. Tenable's platform also audits for compliance and identifies malicious processes and malware targeting Microsoft systems and applications.

Our Azure Connector for Tenable.io automatically and continuously discovers and tracks asset changes in Microsoft Azure cloud environments to ensure all instances are known and assessed for exposure with every change. In addition, Microsoft Exchange/ActiveSync and Microsoft Intune integrates with Tenable to discover and audit security settings, plus identify vulnerabilities on mobile devices. Tenable also detects and audits Microsoft Azure cloud services to identify misconfigurations and identify entry points for attackers. Tenable.io automatically imports cloud asset data from Azure, assesses them for vulnerabilities, and sends the results back to Azure Security Center for remediation. This improves the speed and efficiency of managing, measuring and reducing cyber risk of cloud assets

These integrations are built and supported by Tenable.

Classification: Cloud Security, Mobile Device Management

Integrates with: Tenable.io, Tenable.sc

MobileIron

MobileIron

Connects to the mobile device management to pull the information into Tenable's platform and inventories mobile data to detects vulnerabilities on those devices.

This integration is built and supported by Tenable.

Classification: Mobile Device Management

Integrates with: Tenable.io, Tenable.sc

Ordr

Ordr

Ordr Systems Control Engine (SCE) automatically discovers and accurately classifies every network-connected device across the enterprise. Ordr SCE integrates with Tenable.io and Tenable.sc asset groups, allowing Tenable to scan or exclude devices based on their classification and unique sensitivities. Enterprise and healthcare organizations can utilize these scan results to assess vulnerabilities and generate comprehensive policies to regulate and protect connected devices for using existing network and security infrastructure.

This integration is built and supported by Ordr.

Classification: IoT Security

Integrates with: Tenable.io, Tenable.sc

Palo Alto Networks

Palo Alto Networks

ICS asset information collected by Tenable.ot is sent to the Palo Alto Networks firewall Dynamic Asset Group (DAG) so policies can be set and updated with the benefit of accurate asset identification and categorization.

This integration is built and supported by Palo Alto Networks.

Classification: NGFW

Integrates with: Tenable.ot

Prisma™ Cloud

Prisma™ Cloud

Prisma Cloud is a comprehensive cloud native security platform with the industry’s broadest security and compliance coverage—for applications, data, and the entire cloud native technology stack—throughout the development lifecycle and across multi and hybrid cloud environments. Prisma Cloud's integrated approach enables security operations and DevOps teams to stay agile, collaborate effectively and accelerate cloud native application development and deployment securely.

This integration is built and supported by Palo Alto Networks.

Classification: Cloud Security, Vulnerability Management

Integrates with: Tenable.io

Puppet

Puppet

Puppet Remediate works side by side, integrating with Tenable.io and Tenable.sc, to help streamline the vulnerability data handover between InfoSec and IT Ops for vulnerability prioritization and remediation. Tenable helps you find vulnerabilities on your cloud and on-prem infrastructure, while Puppet helps you fix those vulnerabilities. With Puppet Remediate you can make changes to your infrastructure by running Tasks over SSH and WinRM.

This integration is built and supported by Puppet.

Classification: Automation

Integrates with: Tenable.io, Tenable.sc

RedHat

RedHat

Tenable integrates with Red Hat Satellite to correlate patch status reported by Red Hat with the results of Tenable’s vulnerability scanning. By correlating patching with scan results, organizations can identify inconsistencies in their patching programs.

This integration is built and supported by Red Hat.

Classification: Patch Management

Integrates with: Tenable.io, Tenable.sc

RedSeal

RedSeal

Automatically export Tenable vulnerability and compliance violation findings into the RedSeal cybersecurity analytics platform to correlate vulnerable system data with RedSeal access path data for issue remediation prioritization.

This integration is built and supported by RedSeal.

Classification: Threat Intelligence, Vulnerability Management

Integrates with: Tenable.sc

RSA

RSA

RSA’s business-driven security solutions help customers comprehensively and rapidly link security incidents with business context to respond effectively and protect what matters most. With award-winning solutions for rapid detection and response, identity and access assurance, consumer fraud protection, and business risk management, RSA customers can thrive in an uncertain, high-risk world. It’s time for Business-Driven Security.

This integration is built and supported by RSA.

Classification: GRC

Integrates with: Nessus, Tenable.sc

SaltStack

SaltStack

Automatically import vulnerability data from Tenable.io into SaltStack Protect to quickly remediate critical vulnerabilities and reduce Cyber Exposure from security vulnerabilities.

This integration is built and supported by SaltStack.

Classification: Automation

Integrates with: Tenable.io

ServiceNow

ServiceNow

Together, Tenable and ServiceNow Security Operations bring common visibility to organizations by automatically discovering IT, Cloud and IoT assets, continually assessing these systems for vulnerabilities, linking vulnerabilities with the asset’s business criticality, and prioritizing issues based on this data to accelerate remediation. Joint customers can run automated workflows to solve their most vulnerable items first, saving time and reducing potential exposure related to the vulnerability. In addition, the integration can trigger an automatic re-assessment of the asset to provide validation that the issues were sufficiently resolved, creating a complete, closed-loop remediation process.

These integrations are built and supported by Tenable.

Classification: CMDB, Ticketing

Integrates with: Tenable.io, Tenable.sc

Siemens

Siemens

Tenable and Siemens have formed a strategic partnership to help energy, utilities and oil and gas companies with a new solution for industrial asset discovery and vulnerability management. ‘Industrial Security’ from Tenable provides safe, reliable asset discovery and vulnerability detection purpose-built for industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. Using passive network monitoring based on Tenable’s Nessus Network Monitor, designed for critical systems which require a non-intrusive approach to vulnerability detection, the OT-native solution helps identify and prioritize OT risks so organizations can keep safety-critical production assets secure and fully functional. Delivered by Siemens as a security service, ‘Industrial Security’ helps customers understand the state of their assets at all times, providing them with the information they need to quickly and confidently assess, understand and ultimately reduce their cybersecurity risk.

Classification: OT Security

Siemplify

Siemplify

Siemplify provides a holistic Security Operations Platform that empowers security analysts to work smarter and respond faster. Siemplify uniquely combines security orchestration and automation with a patented contextual investigation and case management to deliver intuitive, consistent and measurable security operations processes. Leading enterprises and MSSPs leverage Siemplify as their SOC Workbench, tripling analyst productivity by automating repetitive tasks and bringing together disparate security technologies.

This integration is built and supported by Siemplify.

Classification: SIEM/SOAR

Integrates with: Tenable.sc

Skybox Security

Skybox Security

The partnership between Tenable.ot and Skybox provides you with the visibility, security and control across your IT and OT operations. The joint solution enables monitoring across your IT and OT environments to ensure early and comprehensive threat detection and mitigation often missed by other point products.

This integration is built and supported by Skybox Security.

Classification: OT Security

Integrates with: Tenable.ot

Snyk

Snyk

Tenable integrates the Snyk vulnerabilities database of open-source application and operating system vulnerabilities into Tenable.io Container Security for software composition analysis insights.

Integrates with: Tenable.io

Splunk

Splunk

Splunk® Enterprise automatically collects Tenable vulnerability and configuration issues, correlating vulnerable systems with SIEM alert activity to help validate threats. The Tenable application is Common Information Model (CIM) compatible for easy use with other Splunk apps.

This integration is built and supported by Tenable.

Classification: SIEM/SOAR

Integrates with: Tenable.io, Tenable.sc

Stellar Cyber

Stellar Cyber

Together Starlight and Tenable are working seamlessly through tight integration delivering on the promise to help security analysts scale through automation. The integration enables ingestion of Tenable Vulnerability Scanning data which is stored in Starlight's data lake for historical analysis, search, investigation and response. Starlight's Asset Management application dynamically discovers and manages assets from Tenable scanning results and automatically correlates the vulnerabilities of an asset, if any, with other security events discovered. Starlight raises the risk score of an asset with information from its own security events as well as the Tenable vulnerability scanning results, providing a single pane of glass for visibility of assets, their vulnerability and related security postures.

This integration is built and supported by Stellar Cyber.

Classification: SIEM/SOAR

Integrates with: Tenable.io, Tenable.sc

Swimlane

Swimlane

Swimlane automates time-intensive, manual processes and operational workflows to deliver powerful, consolidated analytics, real-time dashboards and reporting from across your security infrastructure. Over-burdened and understaffed security operations are able to maximize their incident response capabilities and reduce risk by utlizing Swimlane and Tenable together.

This integration is built and supported by LogRythm.

Classification: SIEM/SOAR

Integrates with: Tenable.io, Tenable.sc

Symantec (A Broadcom Company)

Symantec (A Broadcom Company)

Tenable integrates with both Risk Fabric and Altris products. Risk Fabric integrates vulnerability and threat data from Tenable solutions to help prioritize critical vulnerabilities and user-driven exposures to provide automated remediation recommendations. Altris integrates to correlate patch status reported by Symantec with Tenable vulnerability data to help organization identify inconsistencies in their patching programs.

This integration is built and supported by Tenable.

Classification: Patch Management

Integrates with: Tenable.io, Tenable.sc

ThreatConnect

ThreatConnect

Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Centralize your intelligence, establish process consistency, scale operations, and measure your effectiveness in one place.

This integration is built and supported by ThreatConnect.

Classification: Threat Intelligence

Integrates with: Tenable.sc

ThreatQuotient

ThreatQuotient

ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform. By ingesting Tenable's rich Cyber Exposure data, ThreatQuotient accelerates and simplifies investigations and collaboration within and across teams and tools. Through automation, prioritization and visualization, ThreatQuotient’s solutions reduce noise and highlight top priority threats to provide greater focus and decision support for limited resources.

This integration is built and supported by ThreatQuotient.

Classification: Threat Intelligence

Integrates with: Tenable.io

Thycotic

Thycotic

Integration with Thycotic Secret Server simplifies privileged system access to hosts for more accurate and faster vulnerability assessment.

This integration is built and supported by Tenable.

Classification: Privileged Access Management

Integrates with: Tenable.io, Tenable.sc

Tufin

Tufin

The Tufin integration with Tenable analyzes user-selected network segments for asset vulnerabilities with existing access containing the service/protocol that makes them a candidate for exploitation. Vulnerability information from Tenable.io and Tenable.sc is made available in the vulnerable asset profiles in Tufin that are used to determine the patches that are required to remediate. The context provides users with the ability to design mitigating controls or initiate access change requests to prevent the exploitation of a vulnerable and accessible asset.

This integration is built and supported by Tufin. Please contact [email protected] for support.

Classification: Automation

Integrates with: Tenable.io, Tenable.sc

VMware Workspace ONE

VMware Workspace ONE

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detects vulnerabilities on those devices.

This integration is built and supported by Tenable.

Classification: Mobile Device Management

Integrates with: Tenable.io, Tenable.sc

W@tchtower

[email protected]

[email protected] integrates with Tenable.sc to bring your vulnerability data into The [email protected] Platform, relate it to other key information like IOCs and make it available in interactive investigation tools, incident tickets, workflows and dashboards. With [email protected] and Tenable together, you can readily prioritize vulnerability patching according to the threats you are currently facing.

This integration is built and supported by [email protected]. Please contact [email protected] for support.

Classification: SIEM/SOAR

Integrates with: Tenable.sc

Waterfall Security

Waterfall Security

By integrating Waterfall USG with Tenable.ot, you can trust that your internal and critical network is physically inaccessible from your external network while Tenable.ot monitors your sensitive network.

Classification: OT Security

Integrates with: Tenable.ot

ZeroNorth

ZeroNorth

ZeroNorth provides orchestrated risk management by combining with Tenable.io WAS to create a single Application Security platform, enabling full visibility into vulnerabilities for your entire application stack.

This integration is built and supported by ZeroNorth. Please contact [email protected] for support.

Classification: SIEM/SOAR

Integrates with: Nessus, Tenable.io

Join the Cyber Exposure Partner Ecosystem

The Cyber Exposure partner ecosystem is part of the Tenable™ Assure partner program, a new program designed to make it easier than ever for Tenable technology and channel partners to build and deliver innovative solutions to customer problems. Features of the program include the elimination of partner levels and fees and the creation of a self-service capability for building integrations with Tenable.io. Tenable is committed to working with the technology ecosystem to maintain integrations which keep pace with changes over time.

Join Now

Join the Cyber Exposure Partner Ecosystem

Fill out the form below or email us at [email protected].

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.