Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable has partnered with market leading technology companies to pioneer the industry’s first Cyber Exposure ecosystem, to help the digital enterprises of today - and tomorrow - build resilient cybersecurity programs.

Read the Press Release

Integrated Solutions
to Solve Customer Problems

From ingesting third-party data to enriching third-party systems, the Cyber Exposure partner ecosystem connects disparate solutions and data to accelerate an organization’s ability to understand, manage and reduce cyber risk.

Tenable Ecosystem Third-Party Data
Assets
Vulnerabilities
Threats
Asset 15

Measure Cyber Exposure and benchmark against peers

Asset 2

Vulnerability Management On-Prem

Asset 3

Vulnerability Management in the Cloud

Nessus
Scanner
Nessus
Network
Monitor
Nessus
Agent
Industrial
Security
Container
Security
PCI ASV
Web App
Scanning
Tenable Ecosystem Third-Party Data
CMDB
IT Systems Management
GRC

THIRD party data integration

Tenable gains even more intelligence by integrating third party data into its platform including threat intelligence, asset data, and other indicators of security health. By adding context to the asset’s exposure, organizations can prioritize remediation based on the asset’s business criticality and the severity of the issue.

Enriching THIRD party systems

Tenable live Cyber Exposure data is integrated into third party Security and IT Operations tools including ticketing, CMDBs, and systems management to prioritize remediation, enhance IT service delivery and integrate Cyber Exposure into your organization’s overall IT risk and compliance framework.


Partner Spotlight:

Read the Press Release

Cyber Exposure Ecosystem:
Featured Technology Partners

ServiceNow | Security Operations

Together, Tenable and ServiceNow Security Operations bring common visibility to organizations by automatically discovering IT, Cloud and IoT assets, continually assessing these systems for vulnerabilities, linking vulnerabilities with the asset’s business criticality, and prioritizing issues based on this data to accelerate remediation. Joint customers can run automated workflows to solve their most vulnerable items first, saving time and reducing potential exposure related to the vulnerability. In addition, the integration can trigger an automatic re-assessment of the asset to provide validation that the issues were sufficiently resolved, creating a complete, closed-loop remediation process.

Solution Brief Infographic
AirWatch by VMware | MDM

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detects vulnerabilities on those devices.

Amazon Web Services (AWS) | Cloud Infrastructure and SIEM

The Tenable.io connector for AWS automatically and continuously discovers and tracks asset changes in AWS cloud environments to ensure all instances are known and assessed for exposure with every change. With the life of cloud workloads commonly measured in hours, the AWS Connector solves the key challenge of achieving accurate visibility into cyber risk. In addition, Tenable’s integration with AWS Security Hub ensures all Tenable findings are available along side your other security findings for a comprehensive view of your security state.

APCON | Network Monitoring

The APCON IntellaStore platform provides data aggregation, capture, storage, and onboard applications all in one box. IntellaStore captures all traffic of interest from anywhere in the network and provides full packet visibility to the Nessus Network Monitor running directly on the IntellaStore. The ability to have Nessus Network Monitor running on the same box that is tapping the data means data can be analyzed from one spot and threats can be identified faster.

Apple | MDM

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detects vulnerabilities on those devices.

Aruba, a Hewlett Packard Enterprise company | NAC

Aruba's integration with Tenable enables automated vulnerability assessments when systems join the network. This ensures all systems are evaluated prior to accessing secure networks.

Atlassian | Security Operations

Tenable integrates with Atlassian's Jira Core, Jira Software and Jira Service Desk to automatically open tickets for vulnerabilities that Tenable identifies and close them once they have been resolved, providing a cohesive and trackable remediation process.

Autonomic Software | Patch Management

Autonomic Software, Tenable, and McAfee have partnered to provide a robust, streamlined solution for closed-loop remediation. Using McAfee ePO as the main console, Tenable vulnerability findings are correlated to all assets, allowing Autonomic Software to provide a feature-rich patch management process based on Tenable findings.

Axonius | CMDB

Axonius' integration with Tenable synchronizes vulnerability and asset data into the content management database in order to provide a unified view of all devices.

Bay Dynamics | Security Intelligence

Bay Dynamics Risk Fabric integrates vulnerability and threat data from Tenable solutions to provide organizations with the critical context necessary to prioritize their leading risks. Using advanced analytics, backed by patented machine learning, Risk Fabric identifies and prioritizes those user-driven exposures that command immediate attention, providing automated remediation recommendations to enable targeted response. Risk Fabric further connects security, risk and line of business teams to optimize available resources.

BeyondTrust | Privileged Access Management

Tenable’s integration with Bomgar BeyondTrust streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

Bomgar/Lieberman | Privileged Access Management

Tenable’s integration with Bomgar Lieberman RED streamlines privileged access to use in credentialed vulnerability scans, which provides a more comprehensive understanding of your cyber exposure.

BMC | SecOps

Automatically export Tenable vulnerability and compliance violation findings into the BMC SecOps Response Service to accelerate incident response.

Blackpoint Cyber | SOAR

Blackpoint Cyber's integration with Tenable connects vulnerability data and asset information into Blackpoint's platform for increased visibility. This provides a complete understanding of every connected device and the ability to pinpoint targeted devices immediately.

Brinqa | TVM

Brinqa's integration with Tenable enables organizations to effectively connect asset and vulnerability information with business context and threat intelligence data to deliver a data-driven, risk-based program.

Chronicle, a subsidiary of Alphabet | Security Telemetry

Chronicle leverages massive data and compute resources to analyze and fight cyber threats. The Backstory platform helps enterprise security teams investigate incidents and hunt for threats in their networks, at the speed of search, making sense of threat information and security telemetry on a global scale. Together, Chronicle and Tenable deliver deeper insights into security issues and improved ability to hunt and respond to threats in real time. Tenable is also the first partner to integrate with Chronicle’s Backstory asset module.

Cisco | NAC

Integration with Cisco Identity Services Engine (ISE) leverages Tenable vulnerability and compliance violation findings to trigger rule-based Network Access Control to remediate vulnerable systems.

Cohesity | Data Management

Discover cyber exposures and vulnerabilities within your production IT environment by leveraging backup data. Cohesity CyberScan powered by Tenable, makes it easy to assess your risk posture, and meet stringent security and compliance requirements by helping to ensure no known or previously addressed vulnerabilities are re-injected into the production environment while performing a recovery job.

Cyber Observer | Threat and Vulnerability Management

Cyber Observer is a holistic cybersecurity management solution that delivers end-to-end real-time cybersecurity posture and awareness in a single-pane-of-glass. It continuously measures the status of an organization’s security environment by Critical Security Controls from relevant security tools. Cyber Observer empowers CISOs to make insightful decisions to ensure the organization’s cybersecurity.

CyberArk | Privileged Access Management

Tenable’s integration with CyberArk streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

Solution Brief
CyberSponse | SOAR

CyberSponse, the leading Security Orchestration, Automation, and Response Platform, integrates with Tenable to facilitate an orchestrated and automated vulnerability management solution. Analysts are able to enrich the incoming SIEM alert with asset vulnerabilities, giving a better picture of the threat. A holistic picture of the security incident enables analysts to prioritize investigations better and be able to automate or take on-demand containment and remediation actions like re-triggering a scan, isolate affected systems using EDR integrations, deploy patches, etc., for an in-time, informed and quick response cycle.

CyGov | Integrated Risk Management

CyGov empowers security and risk teams to manage their cyber risk and compliance from a single centralized platform. The platform features smart questionnaires, automated data collection and analysis from various internal tools like Nessus and Tenable.io as well as external sources of threat intelligence.The platform helps CROs and CISOs drive actionable insights at every stage of the cyber-risk management cycle using a strong visual dashboard to collaborate across all types of enterprise environments.

Cymulate | Simulation

Cymulate's integration with Tenable ingests vulnerabilities into their workflow for automating comprehensive security posture assessment.

Dell | Patch Management

Tenable solutions integrate with Dell KACE systems management appliances to identify missing patches on vulnerable systems, identify unmanaged systems that are vulnerable and require patching, and extend scanning to cover systems that cannot be directly scanned. Tenable can also audit systems running the Dell Force10 FTOS system.

Demisto | SOAR

Our integration combines Tenable’s comprehensive vulnerability management capabilities with Demisto’s security orchestration and automation to help security teams standardize their incident response processes, execute repeatable tasks at scale, and accelerate time to detect and remediate vulnerabilities.

DF Labs | SOAR

DF Lab's integration with Tenable simplifies automation and orchestration of vulnerability scans and completed scan collection. Additionally, asset information can be automated to enrich the security incident response process.

ForeScout | NAC

Integration with ForeScout CounterAct® allows the product to notify Tenable when new systems join the network, triggering immediate vulnerability assessment of newly detected devices and the ability to execute protective actions on vulnerable systems.

Garland Technology | Networking

By using Garland Technology and Tenable solutions together, organizations can have total visibility of all connected network assets. This ensures organizations have a greater understanding of their cyber exposure.

Gigamon | Networking

By deploying Gigamon and Tenable solutions together, organizations that have encrypted traffic in their environments can regain visibility into what devices are connecting to their environment and continuously monitor network traffic to identify vulnerabilities and risk.

Good powered by Blackberry | MDM

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detect vulnerabilities on those devices.

Google Cloud Platform (GCP) | Cloud Infrastructure and SIEM

The Tenable.io connector for GCP automatically and continuously discovers and tracks asset changes in GCP cloud environments to ensure all instances are known and assessed for exposure with every change. Tenable integrates with GCP Cloud Security Command Center (CSCC), which allows a customer to view their Tenable security findings within a central GCP console. This provides security teams with the visibility they need to manage Cyber Exposure across the entire modern attack surface.

IBM | SIEM

Automatically export Tenable vulnerability and compliance findings into IBM QRadar, and import QRadar alerts into Tenable to trigger on-demand scans to correlate vulnerable systems with SIEM alert activity for greater analysis accuracy and issue prioritization.

Infoblox | IP Address Management

Integration with Infoblox IP Address Management allows the product to trigger immediate vulnerability assessment via Tenable when new systems join the network or during an incident to identify compromised systems.

Kenna | TVM

Kenna (formerly Risk I/O) takes in vulnerability scan results from Nessus to correlate with other assessment information to help customers prioritize issues.

LogRhythm | Security Intelligence

LogRhythm empowers organizations on six continents to detect, respond to and neutralize damaging cyber threats rapidly. The LogRhythm platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments. Among other accolades, LogRhythm is positioned as a Leader in Gartner’s SIEM Magic Quadrant.

Lumeta | CMDB

Lumeta's integration with Tenable synchronizes vulnerability and asset data into the content management database in order to provide a unified view of all devices.

McAfee | Endpoint Security

Automatic exporting of Tenable vulnerability and configuration data into McAfee ePolicy Orchestrator™ (ePO) increases visibility and enriches context around the security posture of McAfee managed endpoints.

Solution Brief
Medigate | IoT

Medigate exports detailed visibility contexts for connected IoT and IoMT devices on Healthcare Delivery Organizations' Networks and correlates this visibility data to assets managed by Tenable.io. Medigate also ingests Tenable's vulnerability data for connected assets and present this information consolidated with Clinical vulnerabilities and risk assessment for all hospital's connected devices on Medigate's dashboard. This allows Tenable's and Medigate's mutual customer to better assess risk and prioritize remediation and mitigation steps for connected medical devices and IoT in the clinical setting.

Microfocus/HPE Enterprise | SIEM

Automatically export Tenable vulnerability and compliance violation findings into ArcSight and correlate vulnerable systems with SIEM alert activity for greater analysis accuracy and issue prioritization.

Microsoft | SIEM and Patch Management

Tenable integrates with Microsoft WSUS and SCCM to identify mobile devices and associated vulnerabilities. Tenable scans Microsoft operating systems, applications and databases for vulnerabilities, then audits for hardening guidelines. Tenable's platform also audits for compliance and identifies malicious processes and malware targeting Microsoft systems and applications. Our Azure Connector for Tenable.io automatically and continuously discovers and tracks asset changes in Microsoft Azure cloud environments to ensure all instances are known and assessed for exposure with every change. In addition, Microsoft Exchange/ActiveSync and Microsoft Intune integrates with Tenable to discover and audit security settings, plus identify vulnerabilities on mobile devices. Tenable also detects and audits Microsoft Azure cloud services to identify misconfigurations and identify entry points for attackers.

MobileIron | MDM

Connects to the mobile device management to pull the information into Tenable's platform and inventories mobile data to detects vulnerabilities on those devices.

Prisma™ Public Cloud | TVM

Prisma™ Public Cloud provides continuous visibility, security, and compliance monitoring across public multi-cloud deployments. By collecting and analyzing a variety of data sources across public cloud environments, it helps customers comprehensively detect, investigate and remediate misconfigurations, compliance violations and security threats.

Red Hat | Patch Management

Tenable integrates with Red Hat Satellite to correlate patch status reported by Red Hat with the results of Tenable’s vulnerability scanning. By correlating patching with scan results, organizations can identify inconsistencies in their patching programs.

Redseal | TVM

Automatically export Tenable vulnerability and compliance violation findings into the RedSeal cybersecurity analytics platform to correlate vulnerable system data with RedSeal access path data for issue remediation prioritization.

RSA | GRC

RSA’s business-driven security solutions help customers comprehensively and rapidly link security incidents with business context to respond effectively and protect what matters most. With award-winning solutions for rapid detection and response, identity and access assurance, consumer fraud protection, and business risk management, RSA customers can thrive in an uncertain, high-risk world. It’s time for Business-Driven Security.

Siemens | Operational Technology

Tenable and Siemens have formed a strategic partnership to help energy, utilities and oil and gas companies with a new solution for industrial asset discovery and vulnerability management. ‘Industrial Security’ from Tenable provides safe, reliable asset discovery and vulnerability detection purpose-built for industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. Using passive network monitoring based on Tenable’s Nessus Network Monitor, designed for critical systems which require a non-intrusive approach to vulnerability detection, the OT-native solution helps identify and prioritize OT risks so organizations can keep safety-critical production assets secure and fully functional. Delivered by Siemens as a security service, ‘Industrial Security’ helps customers understand the state of their assets at all times, providing them with the information they need to quickly and confidently assess, understand and ultimately reduce their cybersecurity risk.

Solution Brief
Siemplify | SOAR

Siemplify provides a holistic Security Operations Platform that empowers security analysts to work smarter and respond faster. Siemplify uniquely combines security orchestration and automation with a patented contextual investigation and case management to deliver intuitive, consistent and measurable security operations processes. Leading enterprises and MSSPs leverage Siemplify as their SOC Workbench, tripling analyst productivity by automating repetitive tasks and bringing together disparate security technologies.

Solution Brief
Splunk | SIEM

Splunk® Enterprise automatically collects Tenable vulnerability and configuration issues, correlating vulnerable systems with SIEM alert activity to help validate threats. The Tenable application is Common Information Model (CIM) compatible for easy use with other Splunk apps.

Solution Brief
Swimlane | SOAR

Swimlane automates time-intensive, manual processes and operational workflows to deliver powerful, consolidated analytics, real-time dashboards and reporting from across your security infrastructure. Over-burdened and understaffed security operations are able to maximize their incident response capabilities and reduce risk by utlizing Swimlane and Tenable together.

Symantec | Patch Management

Tenable integrates with Symantec Altiris to correlate patch status reported by Symantec with the results of Tenable’s vulnerability scanning. By correlating patching with scan results, organizations can identify inconsistencies in their patching programs.

Syncurity | SOAR

Syncurity's integration with Tenable speeds up the process to kick off ad-hoc vulnerability scans, and enables rapid alert enrichment with recent scan data.

ThreatConnect | Threat Intelligence

Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Centralize your intelligence, establish process consistency, scale operations, and measure your effectiveness in one place.

ThreatQuotient | Threat Intelligence

ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform. By ingesting Tenable's rich Cyber Exposure data, ThreatQuotient accelerates and simplifies investigations and collaboration within and across teams and tools. Through automation, prioritization and visualization, ThreatQuotient’s solutions reduce noise and highlight top priority threats to provide greater focus and decision support for limited resources.

Thycotic | Privileged Account Management

Integration with Thycotic Secret Server simplifies privileged system access to hosts for more accurate and faster vulnerability assessment.

Solution Brief
ZeroNorth | Continuous Application Security Platform

ZeroNorth provides orchestrated risk management by combining with Tenable.io WAS to create a single Application Security platform, enabling full visibility into vulnerabilities for your entire application stack.

Join the Cyber Exposure Partner Ecosystem

The Cyber Exposure partner ecosystem is part of the Tenable™ Assure partner program, a new program designed to make it easier than ever for Tenable technology and channel partners to build and deliver innovative solutions to customer problems. Features of the program include the elimination of partner levels and fees and the creation of a self-service capability for building integrations with Tenable.io. Tenable is committed to working with the technology ecosystem to maintain integrations which keep pace with changes over time.

Join Now

Join the Cyber Exposure Partner Ecosystem

Fill out the form below or email us at [email protected].

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.