Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Explore Technology Partners

Search by keyword OR filter by product and/or category.

Adaptive Shield

Adaptive Shield

Adaptive Shield's Integration with Tenable enriches understanding of device posture and user posture and their influence on one another. By correlating Tenable’s rich telemetry and contextualized vulnerability data within the Adaptive Shield’s SaaS security posture technology, joint users will gain context and visibility to easily see and manage the risks that stem from SaaS users and their associated devices.

This integration is built and supported by Adaptive Shield.

c checkClassification: Cloud Security

gear Integrates with: Lumin, Tenable.io

flag Supports Tenable FedRAMP: No

Analyst1

Analyst1

Analyst1 is a threat intelligence and cyber operations tool that orchestrates & automates rapid and comprehensive response actions. The Analysy1 integration with Tenable.sc automates the enrichment of Tenable vulnerability data to enable threat-based prioritized actions, allowing security teams to focus on what will provide the greatest reduction of cyber risk.

This integration is built and supported by Analyst1. Please contact [email protected] for support.

c checkClassification: Threat Intelligence

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

anecdotes.ai

anecdotes.ai

anecdotes’ customers use the Tenable.io integration to satisfy security operations and access management controls. With the plugin, joint customers can automatically provide compliance evidence such as vulnerability scan configurations, remediation of vulnerabilities and more. This integration is built and supported by anecdotes.ai.

c checkClassification: GRC

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Anomali

Anomali

Anomali offers an intelligence-driven threat detection and response solution which allows customers to detect and respond to threats usinig threat intelligence on a massive scale. Through the integration with Tenable, the Anomali Platform helps surface relevant threats, enabling you to prioritize your response and reduce risk based on your assets’ security posture or criticality.

This integration is built and supported by Anomali.

c checkClassification: Threat Intelligence

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

APCON

APCON

The APCON IntellaStore platform provides data aggregation, capture, storage, and onboard applications all in one box. IntellaStore captures all traffic of interest from anywhere in the network and provides full packet visibility to the Nessus Network Monitor running directly on the IntellaStore. The ability to have Nessus Network Monitor running on the same box that is tapping the data means data can be analyzed from one spot and threats can be identified faster.

This integration is built and supported by APCON.

c checkClassification: Network TAP/SPAN Monitoring

gear Integrates with: Nessus Network Monitor (NNM), Tenable.ot

flag Supports Tenable FedRAMP: No

Apple

Apple

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detect vulnerabilities on those devices.

This integration is built and supported by Tenable.

c checkClassification: Mobile Device Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

appNovi

appNovi

appNovi's security data visualization and analysis provide simple ways to communicate threats to technical and non-technical stakeholders. This integration aggregates your Tenable vulnerability data with netflow, infrastructure, and other data sources to identify contextually exploitable assets and their importance to the business. appNovi was founded by security practitioners to enable attack surface identification and mapping, support business-specific vulnerability management, and empower effective incident response.

This integration is built and supported by appNovi.

c checkClassification: CMDB, Cyber Asset Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Arcon

Arcon

Tenable’s integration with Arcon streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

This integration is built and supported by Tenable.

c checkClassification: Privileged Access Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Aruba, an HPE company

Aruba, an HPE company

Aruba's integration with Tenable enables automated vulnerability assessments when systems join the network, this ensures all systems are evaluated prior to accessing secure networks.

By combining Tenable.ot’s advanced threat detection, asset and vulnerability management—both at the network and device level, along with Aruba Networks ClearPass Access Control—the joint solution delivers complete visibility, security and control, across your IT and OT environments. This includes traditional Windows-based systems, Macs and mobile devices, as well as OT devices such as industrial controllers (PLCs, RTUs, DCS controllers).

The Tenable.sc integration is built and supported by Aruba.

The Tenable.ot integration is built and supported by Tenable.

c checkClassification: Access Control, Network Access Control

gear Integrates with: Tenable.ot, Tenable.sc

flag Supports Tenable FedRAMP: No

Asimily

Asimily

Asimily is a Healthcare focused and medical device solution to manage and secure devices. Currently Asimily solves for use cases around inventory, device relationships, risk monitoring and mitigation, patch and mitigation prioritization, forensic analysis, asset utilization, policy management, vendor management, device tracking, FDA recall monitoring and is adding more. As a part of the Patch and Mitigation Prioritization module, Asimily integrates with Tenable.sc and Tenable.io to fetch vulnerabilities for scanned devices that are then processed by the Asimily solution. In addition, the Tenable scanners are configured to avoid scanning certain medical devices based on Asimily device classification.

This integration is built and supported by Asimily. Please contact [email protected] for support.

c checkClassification: IoT Security

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

ASPIA InfoTech

ASPIA InfoTech

The ASPIA integration with tenable.io provides a centralized platform to streamline the complete vulnerability management process. ASPIA tracks vulnerabilities and visualizes the details by ingesting assets and vulnerabilities data from tenable to deliver a comprehensive view of organizations security posture. This integration is built and supported by ASPIA. Please contact [email protected] for support.

c checkClassification: SOAR, Vulnerability Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Atlassian

Atlassian

Tenable Vulnerability Management products integrate with Atlassian's Jira On Prem, Jira Cloud, Jira Core, Jira Software and Jira Service Desk to automatically open tickets for vulnerabilities that Tenable identifies and closes them once they have been resolved, providing a cohesive and trackable remediation process.  You can also integrate Tenable.cs with Atlassian Jira to create Jira tickets for violations encountered along with filters to visualize outstanding tickets.

The integration between Tenable.cs and Atlassian BitBucket On-prem allows you to scan your IaC files for known vulnerabilities in your code repositories via On-prem scanner from Tenable.cs before deployment.

The integration between Tenable.cs and BitBucket allows you to gain read only access to configuration files in your BitBucket repo to scan your IaC files for known vulnerabilities in your code repositories before deployment.

These integration are all built and supported by Tenable.

c checkClassification: Source Code Manager (SCM), Ticketing

gear Integrates with: Tenable.cs, Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: Yes

AuditBoard

AuditBoard

The AuditBoard integration with Tenable brings best-in-class experience to automatically collect vulnerability ingestion, asset inventory, and scan frequency on a regular cadence. This integration empowers security operations and compliance teams to collect evidence without burdening their business partners.

This integration is built and supported by AuditBoard.

c checkClassification: GRC, IRM Platform

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

AWS

AWS

Tenable.io is built on AWS and provides the industry's most comprehensive vulnerability management solution with the ability to predict which security issues to remediate first. The Tenable.io cloud connector for AWS automatically discovers assets in AWS cloud environments in real-time to ensure all instances are known and assessed for exposure with every change. Frictionless Assessment in Tenable.io continuously assesses EC2 instances for vulnerabilities in AWS without ever having to configure a scan, manage credentials or install agents. Quickly detect and respond to security issues as new vulnerabilities are disclosed and as your AWS environment changes.

In addition, Tenable integration with AWS Security Hub ensures all Tenable findings are available alongside your other security findings for a comprehensive view of your security state.

Tenable.ad is built to support Active Directory hosted on AWS.

The integration between Tenable.cs and AWS Cloud Resources provides the ability to scan cloud resources for security compliance. Tenable.cs can read AWS CloudFormation configuration files and provides the ability to scan for known vulnerabilities before deployment.Lastly, the AWS SNS Notification integration for Tenable.cs is another mechanism for users to get notified of violations in the system. From there, users can further configure them into their respective notification mediums such as opsgenie, slack, etc.

These integrations are built and supported by Tenable.

c checkClassification: Cloud Security, CSPM, IaC, Notifications/Alerts, Virtual Appliance

gear Integrates with: Tenable.ad, Tenable.cs, Tenable.io

flag Supports Tenable FedRAMP: No

Axonius

Axonius

Axonius' integration with Tenable synchronizes asset data into the content management database in order to provide a unified view of all devices.

This integration is built and supported by Axonious.

c checkClassification: CMDB, Cyber Asset Management

gear Integrates with: Nessus, Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

BeyondTrust

BeyondTrust

Tenable’s integration with BeyondTrust Password Safe and Privileged Identity streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

This integration is built and supported by Tenable.

c checkClassification: Privileged Access Management

gear Integrates with: Tenable.io, Tenable.ot, Tenable.sc

flag Supports Tenable FedRAMP: No

BlackBerry

BlackBerry

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detect vulnerabilities on those devices.

This integration is built and supported by Tenable.

c checkClassification: Mobile Device Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Blackpoint Cyber

Blackpoint Cyber

Blackpoint Cyber's integration with Tenable connects vulnerability data and asset information into Blackpoint's platform for increased visibility. This provides a complete understanding of every connected device and the ability to pinpoint targeted devices immediately.

This integration is built and supported by Blackpoint Cyber.

c checkClassification: SOAR

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

BMC

BMC

Automatically export Tenable vulnerability findings into BMC TrueSight and BMC Helix consoles to accelerate incident response and remediation in bulk.

This integration is built and supported by BMC.

c checkClassification: Automation, Patch Management

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Brinqa

Brinqa

Brinqa's integration with Tenable enables organizations to effectively connect asset and vulnerability information with business context and threat intelligence data to deliver a data-driven, risk-based program.

This integration is built and supported by Brinqa.

c checkClassification: Threat Intelligence, Vulnerability Management

gear Integrates with: Nessus, Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Caveonix

Caveonix

The Caveonix Cloud integration with Tenable.sc utilizes native APIs to enable bi-directional exchange of data for all cloud security findings and related data. This partnership allows clients to reduce risk exposure time windows by enabling rapid fixes through Robotic Process Automation (RPA) and prioritize remediations through risk analytics and scoring.

This integration is built and supported by Caveonix.

c checkClassification: CSPM

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Centrify

Centrify

Tenable’s integration with Centrify Privileged Access Service streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

This integration is built and supported by Tenable.

c checkClassification: Privileged Access Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Check Point CloudGuard

Check Point CloudGuard

The Tenable.io and CloudGuard integration provides clients with high fidelity cloud security posture management to ensure more accurate findings and prioritization based on public exposures. Check Point CloudGuard Cloud Security Posture Management capabilities enrich the Tenable.io host level vulnerability findings which can help clients best prioritize their remediation and patching efforts.

This integration is built and supported by Check Point.

c checkClassification: Cloud Security

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Cherwell

Cherwell

The Tenable.io Integration with Cherwell Service Management (CSM) enables your organization to consume Tenable vulnerabilities within CSM to create Security Events mapped to your Configuration Items (CIs). Once the Security Events are mapped, you can make decisions on how to proceed; whether tracking, ignoring, or a remediation chain of events. After the vulnerabilities are addressed and CIs are rescanned, the updated status will be sent back to CSM to close the loop. The integration will increase coordination between IT and Security teams to ensure organizations have clear visibility to security threats.

This integration is built and supported by Cherwell. Please contact [email protected] for support.

c checkClassification: Ticketing

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Chronicle, a subsidiary of Alphabet

Chronicle, a subsidiary of Alphabet

Chronicle leverages massive data and compute resources to analyze and fight cyber threats. The Backstory platform helps enterprise security teams investigate incidents and hunt for threats in their networks, at the speed of search, making sense of threat information and security telemetry on a global scale. Together, Chronicle and Tenable deliver deeper insights into security issues and improved ability to hunt and respond to threats in real time. Tenable is the first integration partner with Chronicle’s Backstory asset module.

This integration is built and supported by Chronicle.

c checkClassification: SIEM

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Cisco

Cisco

Firepower Management Center can automatically import vulnerability reports from Tenable.sc which improves the accuracy of the Firepower Network Host Map. This enhanced Host Map improves the fidelity of Firepower’s Intrusion Event Impact Level scoring which helps analysts to prioritize the Intrusion events that can most impact the business. In addition, the Tenable information helps improve Intrusion policy tuning, further reducing false positives.

The integration with Cisco Identity Services Engine (ISE) leverages Tenable vulnerability and compliance violation findings to trigger rule-based Network Access Control to remediate vulnerable systems.

This integration is built and supported by Cisco.

c checkClassification: Network Access Control, NGFW

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Cohesity

Cohesity

Discover cyber exposures and vulnerabilities within your production IT environment by leveraging backup data. Cohesity CyberScan powered by Tenable, makes it easy to assess your risk posture, and meet stringent security and compliance requirements by helping to ensure no known or previously addressed vulnerabilities are re-injected into the production environment while performing a recovery job.

This integration is built and supported by Cohesity.

c checkClassification: Data Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Corelight

Corelight

This integration pulls vulnerabilities from Tenable.sc and loads them via the Corelight input framework, which allows us to flag Suricata IDS alerts where the system being attacked is known to be vulnerable to the attack in question. This helps SOCs prioritize which events they should respond to first, as these attacks are the most likely to have been successful.

This integration was built and supported by Corelight.

c checkClassification: IDS/IPS

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Cortex XSOAR

Cortex XSOAR

Our integration combines Tenable’s comprehensive vulnerability management capabilities with the Cortex security orchestration and automation engine to help security teams standardize their incident response processes, execute repeatable tasks at scale, and accelerate time to detect and remediate vulnerabilities. Formerly Demisto

This integration is built and supported by Palo Alto Networks.

c checkClassification: SOAR

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Cyber Observer

Cyber Observer

Cyber Observer is a holistic cybersecurity management solution that delivers end-to-end real-time cybersecurity posture and awareness in a single-pane-of-glass. It continuously measures the status of an organization’s security environment by Critical Security Controls from relevant security tools. Cyber Observer empowers CISOs to make insightful decisions to ensure the organization’s cybersecurity.

This integration is built and supported by Cyber Observer

c checkClassification: Threat Intelligence, Vulnerability Management

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

CyberArk

CyberArk

Tenable’s integration with CyberArk streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.

This integration is built and supported by Tenable.

c checkClassification: Privileged Access Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

CyberSaint

CyberSaint

CyberStrong's integration with Tenable.io utilizes Tenable's vulnerability insights to map to controls and provide an unparalleled view into risk, IT compliance, and cyber resilience. CyberStrong is the only solution that can integrate with Tenable and other security solutions to fully automate compliance and risk assessments, leveraging patented AI/ML to ingest telemetry to continuously score controls and update risks in real-time without requiring an analyst to do it manually. Combined with executive risk reporting, Governance dashboards, and Board reports, CyberStrong and Tenable offer a single source of truth for enterprises as they look to manage risks in the digital age.

This integration is built and supported by CyberSaint. Please contact [email protected] for support.

c checkClassification: GRC, IRM Platform

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Cybersixgill

Cybersixgill

The Sixgill integration for Tenable brings Tenable's vulnerability insights into Sixgill's Investigative Portal, gaining instant personalized context and providing investigative abilities for security teams.

This integration is built and supported by Sixgill. Please contact [email protected] for support.

c checkClassification: Threat Intelligence

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

CyGov

CyGov

CyGov empowers security and risk teams to manage their cyber risk and compliance from a single centralized platform. The platform features smart questionnaires, automated data collection and analysis from various internal tools like Nessus and Tenable.io as well as external sources of threat intelligence. The platform helps CROs and CISOs drive actionable insights at every stage of the cyber-risk management cycle using a strong visual dashboard to collaborate across all types of enterprise environments.

This integration is built and supported by CyGov.

c checkClassification: IRM Platform

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Cymulate

Cymulate

Cymulate's integration with Tenable ingests vulnerabilities into their workflow for automating comprehensive security posture assessment.

This integration is built and supported by Cymulate. Please contact [email protected] for support.

c checkClassification: Breach & Attack Simulation

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Cynerio

Cynerio

The integration between Cynerio and Tenable enables healthcare organizations to manage risk across their entire IT environment – including traditional Enterprise IT, IoT, OT and IoMT. Together, we promote cross-organizational alignment and give hospitals the control, foresight, and adaptability they require to stay cyber-secure in a constantly evolving threat landscape. Cynerio gives healthcare organizations the power to stay compliant and proactively manage every connection on their own terms with real-time attack detection & response, and rapid risk reduction tools so that they can focus on healthcare’s top priority: delivering quality patient care.

This integration is built and supported by Cynerio.

c checkClassification: IoT Security

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Datadog

Datadog

Datadog monitors the Tenable Nessus web server and backend logs through the Datadog Agent. The integration allows you to visualize your Nessus scans in near real-time to see what users and IPs are accessing your Nessus web server. This integration is built and supported by DataDog. Please contact [email protected]com for support.

c checkClassification: Cloud SIEM

gear Integrates with: Nessus

flag Supports Tenable FedRAMP: No

Dell

Dell

Tenable solutions integrate with Dell KACE systems management appliances to identify missing patches on vulnerable systems, identify unmanaged systems that are vulnerable and require patching, and extend scanning to cover systems that cannot be directly scanned. Tenable can also audit systems running the Dell Force10 FTOS system.

This integration is built and supported by Tenable.

c checkClassification: Patch Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

DF Labs

DF Labs

DF Lab's integration with Tenable simplifies automation and orchestration of vulnerability scans and completed scan collection. Additionally, asset information can be automated to enrich the security incident response process.

This integration is built and supported by DF Labs.

c checkClassification: SOAR

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Elastic

Elastic

The Elastic integration for Tenable enables organizations to leverage vulnerability data from Tenable within Elastic Security to perform investigations and incident response. Elastic correlates data from Tenable with other data sources, including cloud, network and endpoint sources using robust detection rules to find threats quickly.

This integration is built and supported by Elastic.

c checkClassification: SIEM

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Expanse

Expanse

With the Expander-Tenable integration, joint customers can maximize the effectiveness of their organization’s Risk-based Vulnerability Management program by leveraging Expander’s network map as a system of record for Internet assets. The integration provides customers an out-of-the-box capability to seamlessly ingest Expander data into Tenable.io, enabling administrators to automate previously manual and tedious tasks, update stale asset lists, and attain more business context from Expander. By incorporating Expander data into Tenable, organizations can produce more in-depth vulnerability scans and remediate vulnerabilities associated with previously unknown assets.

This integration is built and supported by Expanse. Please contact [email protected] for support

c checkClassification: Asset Discovery

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

ForeScout

ForeScout

Integration with ForeScout CounterAct® allows the product to notify Tenable when new systems join the network, triggering immediate vulnerability assessment of newly detected devices and the ability to execute protective actions on vulnerable systems.

This integration is built and supported by Forescout.

c checkClassification: Network Access Control

gear Integrates with: Nessus, Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Fortinet

Fortinet

Fortinet FortiSOAR, the leading Security Orchestration, Automation, and Response Platform, integrates with Tenable.io to facilitate an orchestrated and automated vulnerability management solution. This integration enables analysts to prioritize investigations better and be able to automate or take on-demand containment and remediation actions like re-triggering a scan, isolate affected systems using EDR integrations and deploy patches for an in-time, informed and quick response cycle.

This integration is built and supported by Fortinet.

Tenable.ot and Fortinet’s FortiGate provide a joint solution designed to eliminate the traditional IT-OT security silos by integrating with the security, work flow, incident response and recovery procedures that can span across both environments.This helps reduce the time it takes to identify security related issues within the converged IT/OT infrastructure.

This integration is built and supported by Tenable.

c checkClassification: NGFW, SOAR

gear Integrates with: Tenable.io, Tenable.ot

flag Supports Tenable FedRAMP: No

FortMesa

FortMesa

This integration performs two-way synchronization of assets between Tenable and FortMesa, and allows Tenable to drive FortMesa vulnerability management flows. FortMesa is a cyber risk and security operations platform built for humans with automated documentation and simple certification. Establish security governance, find and manage system vulnerabilities, understand your risk and security posturing, then work your way toward right-sized security & compliance standards.

This integration is built and supported by FortMesa. Please contact [email protected] for support.

c checkClassification: GRC, Vulnerability Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Garland Technology

Garland Technology

By using Garland Technology and Tenable solutions together, organizations can have total visibility of all connected network assets. This ensures organizations have a greater understanding of their cyber exposure.

This integration is built and supported by Garland Technology.

c checkClassification: Network TAP/SPAN Monitoring

gear Integrates with: Nessus Network Monitor (NNM), Tenable.ot

flag Supports Tenable FedRAMP: No

Gigamon

Gigamon

By deploying Gigamon and Tenable solutions together, organizations that have encrypted traffic in their environments can regain visibility into what devices are connecting to their environment and continuously monitor network traffic to identify vulnerabilities and risk.

This integration is built and supported by Gigamon.

c checkClassification: Network TAP/SPAN Monitoring

gear Integrates with: Nessus Network Monitor (NNM), Tenable.ot

flag Supports Tenable FedRAMP: No

GitHub

GitHub

The integration between Tenable.cs and GitHub Actions provides the ability to scan your Infrastructure as Code (IaC) files for violations in your build pipeline to track violations, drifts and to set up alerts and escalations in your applications.

The integration between Tenable.cs and GitHub Repo allows you to scan your Infrastructure as Code (IaC) files for known vulnerabilities in your code repositories before deployment.

The integration between Tenable.cs and GitHub Enterprise On-prem allows you to scan your Infrastructure as Code (IaC) files for known vulnerabilities in your code repositories via On-prem scanner from Tenable.cs, before deployment.

These integrations are built and supported by Tenable.

c checkClassification: CI/CD, Source Code Manager (SCM)

gear Integrates with: Tenable.cs

flag Supports Tenable FedRAMP: No

GitLab

GitLab

The integration between Tenable.cs and GitLab Repo allows you to scan your IaC files for known vulnerabilities in your code repositories before deployment.

The integration between Tenable.cs and GitLab Enterprise OnPremise Repo allows you to scan your IaC files for known vulnerabilities in your code repositories via On-prem scanner from Tenable.cs.

These integrations are built and supported by Tenable.

c checkClassification: Source Code Manager (SCM)

gear Integrates with: Tenable.cs

flag Supports Tenable FedRAMP: No

Google Cloud Platform (GCP)

Google Cloud Platform (GCP)

The Tenable.io connector for GCP automatically and continuously discovers and tracks asset changes in Google cloud environments to ensure all instances are known and assessed for exposure with every change. With the life of cloud workloads commonly measured in hours, the GCP Connector solves the key challenge of achieving accurate visibility into cyber risk.

Tenable.ad is built to support active directory hosted on GCP.

Tenable.cs integrates with Google Cloud to scan cloud resources for security and compliance needs.

The connector, Active Directory and Tenable.cs integration is built and supported by Tenable.

In addition, Tenable’s integration with Google Cloud Security Command Center ensures all Tenable findings are available along side your other security findings for a comprehensive view of your security state. Add valuable vulnerability information to Google Cloud Security Command Center through a powerful integration with Tenable.io. This combination allows you to view vulnerability data in context of all other security and event information to provide a holistic view of your environment's security posture.

Support for Google Cloud Security Command Center can be found on GitHub

c checkClassification: Cloud Security, CSPM

gear Integrates with: Tenable.ad, Tenable.cs, Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Guardicore

Guardicore

With the Guardicore integration for Tenable, vulnerability data is continuously pulled from Tenable.io and used to label assets with their open CVEs and overall risk score. You can then use this in the segmentation policy, allowing you to limit the exposure of the vulnerable workloads and reduce the risk until the vulnerability is mitigated.

This integration is built and supported by Guardicore. Please contact supp[email protected] for support

c checkClassification: Network Segmentation

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Hackuity

Hackuity

Organizations are able to utilize the integration between Tenable.sc and Hackuity to centralize vulnerabilities and prioritize remediation plans using various correlated data such as assets, business criticalities and cyber threat intelligence.

This integration is built and supported by Hackuity.

c checkClassification: Threat Intelligence, Vulnerability Management

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

HashiCorp

HashiCorp

HashiCorp's Vault allows users to secure, store and tightly control access to tokens, passwords, certificates and encryption keys for protecting secrets and other sensitive data. Tenable's integration with HashiCorp allows customers to leverage passwords stored in HashiCorp's Vault KV store to perform authenticated scanning.

Tenable.cs integrates with Terraform Cloud Run task to help developers detect and fix compliance and security risks in their infrastructure as code to mitigate issues before cloud infrastructure is provisioned. Read the blog and view the Solution Overview for more information.

This integration is built and supported by Tenable.

c checkClassification: IaC, Privileged Access Management

gear Integrates with: Tenable.cs, Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

HCL BigFix

HCL BigFix

BigFix Insights for Vulnerability Remediation with Tenable dramatically shrinks the gap between your security and IT operations and automatically correlates the most appropriate remediation action based on prioritized vulnerabilities Tenable discovers.

This integration is built and supported by HCL BigFix.

c checkClassification: Patch Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Hyperproof

Hyperproof

Hyperproof automates the collection of data from Tenable to meet your various compliance needs. This includes various scenarios around your assets but can also be configured to return the scan history for a custom list of assets from Tenable. This evidence is used in most common compliance frameworks, and Hyperproof can support additional compliance scenarios.

This integration is built and supported by Hyperproof.

c checkClassification: GRC

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

IBM Security

IBM Security

The Tenable apps for QRadar and the QRadar Vulnerability Manager (QVM) integration combines Cyber Exposure insights from Tenable.io, Tenable.sc, Tenable.ot and Tenable.ad with QRadar’s log and flow consolidation capabilities to enable users to better correlate events, take action on flaws and meet compliance standards.

The Tenable plugin for MaaS360 provides a way for security teams to understand the cyber exposure of all their mobile devices being managed by MaaS360.

Tenable’s integration with IBM's Cloud Pak for Security enables joint customers to leverage vulnerability data from Tenable.io for holistic visibility into their cloud security posture. Cloud Pak for Security users gain data insights through federated search of Tenable’s vulnerability data without having to move it to one place, as well as orchestrate and prioritize where to take action across all of those systems.

The integrations for The Tenable App for Qradar, MaaS360 and Cloud Pak for Security are built and supported by Tenable.

The QRadar VM app is built and supported by IBM Security.

c checkClassification: Cloud Security, Mobile Device Management, SIEM

gear Integrates with: Tenable.ad, Tenable.io, Tenable.ot, Tenable.sc

flag Supports Tenable FedRAMP: Yes

Illumio

Illumio

Illumio consumes vulnerability data from Tenable to provide customers with visibility into vulnerable workloads, and their dependencies. This includes a view into the workloads with which the vulnerable system has communicated and the ability to search for workloads with which the vulnerable system is able to communicate. Illumio then enables customers to create automated security policy to limit what systems may communicate with the vulnerable system, providing a compensating control until the vulnerability can be patched.

This integration is built and supported by Illumio.

c checkClassification: Network Segmentation

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Infoblox

Infoblox

Integration with Infoblox IP Address Management allows the product to trigger immediate vulnerability assessment via Tenable when new systems join the network or during an incident to identify compromised systems.

This integration is built and supported by Infoblox.

c checkClassification: DDI

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

IntSights

IntSights

IntSights provides enterprises with the only all-in-one External Threat Protection solution that enables security teams to gain visibility and control over threats outside the wire. The IntSights integration pulls vulnerability data from Tenable into the IntSights Risk Analyzer module to help find and mitigate external threats that directly target your organization.

This integration is built and supported by Intsights.

c checkClassification: Threat Intelligence

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Jenkins

Jenkins

The integration between Tenable.cs and Jenkins CI provides the ability to scan your IaC files for violations in your build pipeline to track violations, drifts and set up alerts and escalations in your applications.

This integration is built and supported by Tenable.

c checkClassification: Build System, CI/CD

gear Integrates with: Tenable.cs, Tenable.io

flag Supports Tenable FedRAMP: No

JetPatch

JetPatch

The JetPatch integration for Tenable allows Security and IT teams to simplify the remediation process and offer customers a complete vulnerability management solution. Given the sheer volume of new patches, it is paramount for customers to be able to execute remediation according to their Tenable Vulnerability data. This integration is built and supported by JetPatch.

c checkClassification: Patch Management

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

JFrog

JFrog

This integration is built and supported by Tenable.

c checkClassification: Container Registry

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

JupiterOne

JupiterOne

The JupiterOne integration with Tenable allows you to understand your attack surface by importing Tenable findings to navigate the relationships of all your cyber assets. Cloud resources, ephemeral devices, identities, access rights, code, pull requests, and much more are collected, graphed, and monitored automatically. Determine the blast radius for any attack vector and fast-track investigation and response with the ability to query and get results in less than 30 seconds.

This integration is built and supported by JupiterOne.

c checkClassification: Cloud Security, CMDB, Cyber Asset Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

K2

K2

The integration between K2 Cyber Security and Tenable.io Web Application Scanning (WAS) provides a utility accessing Tenable.io’s API to produce a single unified report detailing the vulnerabilities discovered by Tenable.io and K2 Security Platform. K2 appends details to the Tenable report, adding additional information on detected vulnerabilities, including the exact file name and line of code in the file where the vulnerability exists, enabling quicker remediation of the vulnerability in the code. K2 Cyber Security’s integration with Tenable can help organizations speed up their application deployment process by quickly locating and identifying the exact code location of discovered vulnerabilities discovered by Tenable WAS and the additional vulnerabilities found by K2 Security Platform, resulting in faster remediation.

This integration is built and supported by K2. Please contact [email protected] for support

c checkClassification: Application Security

gear Integrates with: Tenable.io - Web App Scanning

flag Supports Tenable FedRAMP: No

Kenna

Kenna

Kenna (formerly Risk I/O) takes in vulnerability scan results from Nessus to correlate with other assessment information to help customers prioritize issues.

This integration is built and supported by Kenna.

c checkClassification: Threat Intelligence, Vulnerability Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Kion

Kion

The Tenable.sc and Kion (formerly cloudtamer.io )integration gives customers a single destination to collect and act on cloud-centric compliance findings. Tenable.sc retrieves vulnerabilities discovered within AWS accounts and creates a Kion compliance check. Findings from these checks display on the Kion compliance overview, centralizing efforts to detect, report, and remediate issues.

This integration is built and supported by cloudtamer.io. Please contact [email protected] for support.

c checkClassification: Cloud Security

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

LinkShadow

LinkShadow

LinkShadow Integrates with Tenable.sc to get a risk-based view of the IT security to identify, investigate and prioritize vulnerabilities rapidly. This Integration empowers LinkShadow with high-end visibility on the vulnerable assets, user behavior and associated risk in your environment.

This integration is built and supported by LinkShadow. For support please contact [email protected].

c checkClassification: UEBA

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

LogicGate

LogicGate

This integration, powered by LogicGate Risk Cloud™, allows organizations to ingest Vulnerabilities in a seamless and automated manner for proper mitigation of Cybersecurity Risk. A user will be able to link their organization’s Vulnerabilities identified by Tenable.io to applicable Workflows in Risk Cloud to holistically manage the entire lifecycle of vulnerabilities from approvals, to treatment and to connect it to your broader GRC program. With this integration, an organization will be able to obtain a holistic view of their Threat Vectors in relation to their overarching GRC strategy. This integration is built and supported by LogicGate.

c checkClassification: GRC, IRM Platform

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

LogPoint

LogPoint

The LogPoint integration fetches vulnerability data from Tenable and combines the results with observations from other systems to provide actionable insight into your infrastructure’s security risks. The vulnerability reports allow you to quickly and accurately identify, investigate and prioritize vulnerabilities and misconfigurations in your IT environment.

This integration is built and supported by LogPoint. Please contact [email protected] for support.

c checkClassification: SIEM

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

LogRhythm

LogRhythm

LogRhythm empowers organizations on six continents to detect, respond to and neutralize damaging cyber threats rapidly. The LogRhythm platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments. Among other accolades, LogRhythm is positioned as a Leader in Gartner’s SIEM Magic Quadrant.

This integration is built and supported by LogRythm.

c checkClassification: SIEM

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Lumeta

Lumeta

Lumeta's integration with Tenable synchronizes vulnerability and asset data into the content management database in order to provide a unified view of all devices.

This integration is built and supported by Lumeta.

c checkClassification: Threat Intelligence, Vulnerability Management

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

ManageEngine

ManageEngine

This Patch Manager Plus integration for Tenable.io lets you import vulnerability and asset data from Tenable.io, find appropriate patches and deploy the same through Patch Manager Plus to remediate the identified vulnerability.

These integrations are built and supported by ManageEngine.

c checkClassification: Patch Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

McAfee

McAfee

The joint solution offers visibility, security and control for industrial networks, enabling security professionals to effectively detect and mitigate threats to the safety, reliability and continuity of industrial processes.

This integration is built and supported by Tenable

c checkClassification: SIEM

gear Integrates with: Tenable.ot

flag Supports Tenable FedRAMP: No

Medigate

Medigate

Medigate exports detailed visibility contexts for connected IoT and IoMT devices on Healthcare Delivery Organizations' Networks and correlates this visibility data to assets managed by Tenable.io. Medigate also ingests Tenable's vulnerability data for connected assets and present this information consolidated with Clinical vulnerabilities and risk assessment for all hospital's connected devices on Medigate's dashboard. This allows Tenable's and Medigate's mutual customer to better assess risk and prioritize remediation and mitigation steps for connected medical devices and IoT in the clinical setting.

This integration is built and supported by Medigate.

c checkClassification: IoT Security

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

MetricStream

MetricStream

The MetricStream IT & Cyber Risk integration with Tenable.sc provides a single system to automatically monitor and capture all asset and network vulnerabilities, and route them through a systematic process of investigation and remediation. With the joint system, IT security managers will be able to accelerate the identification, prioritization, and remediation of vulnerabilities, thereby proactively reducing their cyber risk.

This integrations is built and supported by MetricStream.

c checkClassification: GRC, IRM Platform

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Microsoft

Microsoft

Tenable integrates with Microsoft WSUS and SCCM to identify mobile devices and associated vulnerabilities. Tenable scans Microsoft operating systems, applications and databases for vulnerabilities, then audits for hardening guidelines. Tenable's platform also audits for compliance and identifies malicious processes and malware targeting Microsoft systems and applications.

Our Azure Connector for Tenable.io automatically and continuously discovers and tracks asset changes in Microsoft Azure cloud environments to ensure all instances are known and assessed for exposure with every change.

Microsoft ActiveSync and Microsoft Intune integrates with Tenable to discover and audit security settings, plus identify vulnerabilities on mobile devices. Tenable also detects and audits Microsoft Azure cloud services to identify misconfigurations and identify entry points for attackers.

The integration between Tenable.io and Azure Security Center automatically imports cloud asset data from Azure, assesses them for vulnerabilities, and sends the results back to Azure for remediation. The Azure Security Center also integrates with Tenable.ad to combine Tenable's Active Directory insights with ASC's capabilities to enable users to better understand AD risk, take action on flaws and meet compliance standards.

The Azure Sentinel (SIEM) Integration with Tenable.ad combines Tenable's Active Directory insights with Sentinel's log and flow consolidation capabilities to enable users to better correlate events, take action on flaws and meet compliance standards.

The integrations between Tenable.cs and Azure Cloud Resources provides the ability to scan cloud resources for security compliance.

The integration between Tenable.cs and Azure DevOps and Resource Manager allows you to scan your configuration files for known vulnerabilities in your code repositories before deployment.

The integration between Tenable.cs and Microsoft Teams can inform scan summary and violations encountered to pre-configured channels.

Lastly, The Tenable.cs extension for Visual Studio Code (VS Code) seamlessly enables the scanning of your IaC files and folders through VS Code.

These integrations are built and supported by Tenable.

c checkClassification: CSPM, Mobile Device Management, Patch Management, SIEM

gear Integrates with: Tenable.ad, Tenable.cs, Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

MobileIron

MobileIron

Connects to the mobile device management to pull the information into Tenable's platform and inventories mobile data to detects vulnerabilities on those devices.

This integration is built and supported by Tenable.

c checkClassification: Mobile Device Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Noetic

Noetic

The Noetic integration for Tenable imports the vulnerability scan information, including assets identified by Tenable and the vulnerabilities detected on each asset, with description and severity. Noetic correlates and aggregates this data with other security and UT data sources, including EDR, CMDB, Cloud and network to build a comprehensive view of all assets, vulnerabilities and relevant business context in graph database. The connector also includes a workflow to initiate a scan against single or multiple hosts.

This integration is built and supported by Noetic. Contact [email protected] for support.

c checkClassification: Asset Discovery, CMDB

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Nucleus

Nucleus

Nucleus unifies your Tenable scans with the rest of your vulnerability and security data, correlating and enriching scan results alongside other business context and intelligence tools, allowing you to see the entire picture unique to your environment. Once identified and prioritized, users can automate workflows to act on the information, seeing risks through to remediation while tracking all inputs along the way.

This integration is built and supported by Nucleus. Please contact [email protected]

c checkClassification: Vulnerability Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Ordr

Ordr

Ordr Systems Control Engine (SCE) automatically discovers and accurately classifies every network-connected device across the enterprise. Ordr SCE integrates with Tenable.io and Tenable.sc asset groups, allowing Tenable to scan or exclude devices based on their classification and unique sensitivities. Enterprise and healthcare organizations can utilize these scan results to assess vulnerabilities and generate comprehensive policies to regulate and protect connected devices for using existing network and security infrastructure.

This integration is built and supported by Ordr.

c checkClassification: IoT Security

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Owl Cyber Defense Solutions, LLC

Owl Cyber Defense Solutions, LLC

Tenable and Owl work together to pass needed data while ensuring diode-based air-gaps between networks. A Tenable.ot sensor is located on the critical/OT network and forwards captured traffic to Tenable.ot, which resides outside of your OT network. Owl separates the two networks, but sensor to ISP traffic can securely pass through it.

This integration is built and supported by Tenable.

c checkClassification: Firewall (diode)

gear Integrates with: Tenable.ot

flag Supports Tenable FedRAMP: No

Palo Alto Networks

Palo Alto Networks

ICS asset information collected by Tenable.ot is sent to the Palo Alto Networks firewall Dynamic Asset Group (DAG) so policies can be set and updated with the benefit of accurate asset identification and categorization.

This integration is built and supported by Palo Alto Networks.

c checkClassification: NGFW

gear Integrates with: Tenable.ot

flag Supports Tenable FedRAMP: No

Patchdeck

Patchdeck

Patchdeck is a cloud-based patch management solution that allows IT teams to manage and patch Windows, Linux and Mac clients from a single, secure and easy-to-use dashboard. With the Patchdeck integration for Tenable.io, users can map patches to existing vulnerabilities and ensure urgent security patches are deployed in a timely and efficient manner. this integration is built and supported by Patchdeck.

c checkClassification: Patch Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Plixer

Plixer

The integration between Tenable.io and Plixer combines Tenables vulnerability insights with with managed and unmanaged (IoT) device discovery, profiling and network traffic analytics data from Plixer’s Network Detection and Response (NDR) solution. The integration also allows customers to view Tenable information on a specific device from the UI of the Plixer platform.

This integration is built and supported by Plixer.

c checkClassification: IoT Security

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Prisma™ Cloud

Prisma™ Cloud

Prisma Cloud is a comprehensive cloud native security platform with the industry’s broadest security and compliance coverage—for applications, data, and the entire cloud native technology stack—throughout the development lifecycle and across multi and hybrid cloud environments. Prisma Cloud's integrated approach enables security operations and DevOps teams to stay agile, collaborate effectively and accelerate cloud native application development and deployment securely.

This integration is built and supported by Palo Alto Networks.

c checkClassification: Cloud Security, Vulnerability Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Puppet

Puppet

Puppet Remediate works side by side, integrating with Tenable.io and Tenable.sc, to help streamline the vulnerability data handover between InfoSec and IT Ops for vulnerability prioritization and remediation. Tenable helps you find vulnerabilities on your cloud and on-prem infrastructure, while Puppet helps you fix those vulnerabilities. With Puppet Remediate you can make changes to your infrastructure by running Tasks over SSH and WinRM.

This integration is built and supported by Puppet.

c checkClassification: Automation

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Qmulos

Qmulos

This integration ingests configuration scan results and other log data from Tenable.sc to populate dashboards in Qmulos’ Q-Compliance product. Q-Compliance is an integrated risk management solution powered by Splunk that provides a data-driven approach based on real-time events collected from the IT assets of the enterprise to automatically assess your risk and compliance posture at scale. Using this integration, organizations can use data from Tenable.sc to continuously monitor and assess the effectiveness of their security controls that have been implemented with Tenable.sc.

This integration is built and supported by Qmulos. Please contact [email protected] for support.

c checkClassification: GRC

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Reciprocity Labs

Reciprocity Labs

The Tenable.io Connector for ZenGRC automatically pulls Tenable.io data into ZenGRC to serve as evidence that your vulnerability identification and remediation program is operating effectively. By removing your compliance team's reliance on Tenable.io admins to provide this evidence, the Tenable.io Connector for ZenGRC reduces audit fatigue for everyone involved in the evidence collection process and allows both your compliance and your security operations teams to stay focused on what they do best.

The integration is built and supported by Reciprocity Labs. Please contact [email protected] for support.

c checkClassification: GRC

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

RedHat

RedHat

Tenable integrates with Red Hat Satellite to correlate patch status reported by Red Hat with the results of Tenable’s vulnerability scanning. By correlating patching with scan results, organizations can identify inconsistencies in their patching programs.

This integration is built and supported by Tenable.

c checkClassification: Patch Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

RedSeal

RedSeal

Automatically export Tenable vulnerability and compliance violation findings into the RedSeal cybersecurity analytics platform to correlate vulnerable system data with RedSeal access path data for issue remediation prioritization.

This integration is built and supported by RedSeal.

c checkClassification: Threat Intelligence, Vulnerability Management

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Rezilion

Rezilion

The Rezilion integration for Tenable allows customers to understand which vulnerabilities discovered by Tenable are exploitable in the specific runtime context of their environment. The Rezilion platform ingests vulnerability findings from Tenable and takes this feed to validate which vulnerabilities are associated with components that are loaded in memory and are actually exploitable.

This integration is built and supported by Rezilion.

c checkClassification: Vulnerability Management

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

RHD VM (ALFA Group)

RHD VM (ALFA Group)

RHD VM's integration with Tenable enhances the governance of Infrastructure and Application Vulnerabilities Lifecycle Management by adding an efficient remediation process, which can be readily customised according to specific needs. Through the enrichment of assets and vulnerabilities with business context and Threat Intelligence data, the integration helps security teams with remediation activities.

This integration is built and supported by by ALFA Group. Please contact [email protected] for support.  

c checkClassification: Vulnerability Management

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

RSA

RSA

The integration between Tenable.sc and RSA Archer combines business-driven security solutions to help customers comprehensively and rapidly link security incidents with business context to respond effectively and protect what matters most.

This integration is built and supported by RSA.

The interoperability between Tenable.ot and RSA NetWitness provides customers with a seamless solution to collect, analyze and report on all activity helping to reduce the time it takes to identify security related issues within your IT and OT network infrastructure including industrial controller and device activity, who accesses files, what privileged user activity takes place, and which potential threats exist on your devices and in your network.

This integration is built and supported by Tenable.

c checkClassification: GRC, SIEM

gear Integrates with: Tenable.ot, Tenable.sc

flag Supports Tenable FedRAMP: No

SafeBreach

SafeBreach

Integrating the Tenable.io solution with SafeBreach enables vulnerability scans to be correlated with attack simulation results to identify and prioritize vulnerabilities that are exploitable across your enterprise. Fix the vulnerabilities that pose the biggest business risk and focus your remediation on the areas that have the highest risk of exploitation by attackers. Run the attack simulations after remediation efforts to close the loop and ensure that vulnerabilities have been eliminated.

This integration is built and supported by SafeBreach.

c checkClassification: Breach & Attack Simulation

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

SaltStack

SaltStack

Automatically import vulnerability data from Tenable.io into SaltStack Protect to quickly remediate critical vulnerabilities and reduce Cyber Exposure from security vulnerabilities.

This integration is built and supported by SaltStack.

c checkClassification: Automation

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

SecurityGate.io

SecurityGate.io

SecurityGate.io’s integration with Tenable.sc provides an asset inventory view for all entities within client’s organization. The integration streamlines the vulnerability management process and provides a holistic view of assets, network activity, and events allowing an analyst to prioritize remediation and minimize risk.

This integration is built and supported by SecurityGate.io.

c checkClassification: IRM Platform

flag Supports Tenable FedRAMP: No

SecurityScorecard

SecurityScorecard

Integrating SecurityScorecard External Risk Ratings with Tenable Lumin adds an “outside-in” perspective of cyber health in a side-by-side comparison to Lumin’s Cyber Exposure Score (CES). With this addition, you can communicate both internal and external risk factors to the C-Suite and Board of Directors as well as others in your security organization with an easy-to-understand visualization of cyber exposure that translates technical data into actionable insights. This integration is built and supported by Tenable.

c checkClassification: Cyber Risk Ratings

gear Integrates with: Lumin

flag Supports Tenable FedRAMP: No

Seemplicity

Seemplicity

The Seemplicity integration for Tenable unifies your vulnerability data from Tenable with other security data to automate actionable connections between vulnerability findings and remediation teams that can be verified and measured. Shorten the time-to-remediation and backlog queue by using remediation queues, customized severity, prioritization, and SLA's.

This integration is built and supported by Seemplicity.

c checkClassification: Remediation Orchestration

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

ServiceNow

ServiceNow

Together, Tenable and ServiceNow Security Operations bring common visibility to organizations by automatically discovering IT, Cloud and IoT assets, continually assessing these systems for vulnerabilities, linking vulnerabilities with the asset’s business criticality, and prioritizing issues based on this data to accelerate remediation. Joint customers can run automated workflows to solve their most vulnerable items first, saving time and reducing potential exposure related to the vulnerability. In addition, the integration can trigger an automatic re-assessment of the asset to provide validation that the issues were sufficiently resolved, creating a complete, closed-loop remediation process.

These integrations are built and supported by Tenable.

c checkClassification: CMDB, Ticketing

gear Integrates with: Tenable.io, Tenable.ot, Tenable.sc

flag Supports Tenable FedRAMP: Yes

Siemens

Siemens

Tenable and Siemens have formed a strategic partnership to help energy, utilities and oil and gas companies with a new solution for industrial asset discovery and vulnerability management. Tenable.ot provides safe, reliable asset discovery and vulnerability detection purpose-built for industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. Using passive network monitoring based on Tenable’s Nessus Network Monitor, designed for critical systems which require a non-intrusive approach to vulnerability detection, the OT-native solution helps identify and prioritize OT risks so organizations can keep safety-critical production assets secure and fully functional. Delivered by Siemens as a security service, Tenable.ot helps customers understand the state of their assets at all times, providing them with the information they need to quickly and confidently assess, understand and ultimately reduce their cybersecurity risk.

flag Supports Tenable FedRAMP: No

Siemplify

Siemplify

Siemplify provides a holistic Security Operations Platform that empowers security analysts to work smarter and respond faster. Siemplify uniquely combines security orchestration and automation with a patented contextual investigation and case management to deliver intuitive, consistent and measurable security operations processes. Leading enterprises and MSSPs leverage Siemplify as their SOC Workbench, tripling analyst productivity by automating repetitive tasks and bringing together disparate security technologies.

This integration is built and supported by Siemplify.

c checkClassification: SIEM

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

Skybox Security

Skybox Security

The partnership between Tenable.ot and Skybox provides you with the visibility, security and control across your IT and OT operations. The joint solution enables monitoring across your IT and OT environments to ensure early and comprehensive threat detection and mitigation often missed by other point products.

This integration is built and supported by Skybox Security.

c checkClassification: SIEM

gear Integrates with: Tenable.ot

flag Supports Tenable FedRAMP: No

Slack

Slack

You can integrate Tenable.cs with Slack to notify scan summary and violations encountered to pre-configured Slack channels.

This integration is built and supported by Tenable.

c checkClassification: Notifications/Alerts

gear Integrates with: Tenable.cs

flag Supports Tenable FedRAMP: No

Snyk

Snyk

Tenable integrates the Snyk vulnerabilities database of open-source application and operating system vulnerabilities into Tenable.io Container Security for software composition analysis insights.

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Splunk

Splunk

The Tenable Integrations with Splunk combines Tenable's Cyber Exposure insights with Splunk's log and flow consolidation capabilities to enable users to better correlate events, take action on flaws and meet compliance standards. The Tenable application is Common Information Model (CIM) compatible for easy use with other Splunk apps. These integrations support Tenable.io, Tenable.sc, Tenable.ot and Tenable.ad

The integration for Splunk Enterprise is built and supported by Tenable.

Tenable also integrates with Splunk Phantom, a Security Orchestration Automation and Response (SOAR) solution. This integration is for Tenable.sc

The integration for Splunk Phantom is built and supported by Splunk.

c checkClassification: NGFW, SIEM, SOAR

gear Integrates with: Tenable.ad, Tenable.io, Tenable.ot, Tenable.sc

flag Supports Tenable FedRAMP: Yes

ST Engineering

ST Engineering

By integrating ST Engineering with Tenable.ot, you can trust that your internal and critical network is physically inaccessible from your external network while Tenable.ot monitors your sensitive network.

This integration is built and supported by ST Engineering.

c checkClassification: Firewall (diode)

gear Integrates with: Tenable.ot

flag Supports Tenable FedRAMP: No

Stellar Cyber

Stellar Cyber

Together Starlight and Tenable are working seamlessly through tight integration delivering on the promise to help security analysts scale through automation. The integration enables ingestion of Tenable Vulnerability Scanning data which is stored in Starlight's data lake for historical analysis, search, investigation and response. Starlight's Asset Management application dynamically discovers and manages assets from Tenable scanning results and automatically correlates the vulnerabilities of an asset, if any, with other security events discovered. Starlight raises the risk score of an asset with information from its own security events as well as the Tenable vulnerability scanning results, providing a single pane of glass for visibility of assets, their vulnerability and related security postures.

This integration is built and supported by Stellar Cyber.

c checkClassification: SIEM

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Sumo Logic

Sumo Logic

SumoLogic's support for ingestion of Tenable vulnerability data can now be automatically normalized in Cloud SIEM, allowing real-time correlation of Tenable vulnerabilities against other security events to provide security analysts with enhanced visibility to seamlessly monitor their on-premises, hybrid, and multi-cloud infrastructures.

This integration is built and supported by Sumo Logic. Please contact [email protected].

c checkClassification: SIEM

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Swimlane

Swimlane

Swimlane automates time-intensive, manual processes and operational workflows to deliver powerful, consolidated analytics, real-time dashboards and reporting from across your security infrastructure. Over-burdened and understaffed security operations are able to maximize their incident response capabilities and reduce risk by utlizing Swimlane and Tenable together.

This integration is built and supported by Swimlane.

c checkClassification: SOAR

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Symantec (A Broadcom Company)

Symantec (A Broadcom Company)

Tenable integrates with both Risk Fabric and Altiris products. Risk Fabric integrates vulnerability and threat data from Tenable solutions to help prioritize critical vulnerabilities and user-driven exposures to provide automated remediation recommendations. Altiris integrates to correlate patch status reported by Symantec with Tenable vulnerability data to help organization identify inconsistencies in their patching programs.

This integration is built and supported by Tenable.

c checkClassification: Patch Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

ThreatConnect

ThreatConnect

Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Centralize your intelligence, establish process consistency, scale operations, and measure your effectiveness in one place.

This integration is built and supported by ThreatConnect.

c checkClassification: SOAR, Threat Intelligence

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

ThreatNG

ThreatNG

The Tenable and ThreatNG integration facilitates continuous visibility of assets outside the perimeter by importing them into Tenable.io for further action, prioritization, and remediation. ThreatNG is a configurable solution that empowers organizations of all types and sizes to uncover, understand, manage, and quantify (via grading/scoring) their external digital footprint comprised of technical and business attack surface elements. This includes digital assets like Cloud Exposure, Code Exposure, Subdomains, and more with a configurable risk score for self-monitoring and third parties.

This integration is built and supported by ThreatNG.

c checkClassification: Asset Discovery, Threat Intelligence

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

ThreatQuotient

ThreatQuotient

ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform. By ingesting Tenable's rich Cyber Exposure data, ThreatQuotient accelerates and simplifies investigations and collaboration within and across teams and tools. Through automation, prioritization and visualization, ThreatQuotient’s solutions reduce noise and highlight top priority threats to provide greater focus and decision support for limited resources.

This integration is built and supported by ThreatQuotient.

c checkClassification: Threat Intelligence

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Thycotic

Thycotic

Integration with Thycotic Secret Server simplifies privileged system access to hosts for more accurate and faster vulnerability assessment.

This integration is built and supported by Tenable.

c checkClassification: Privileged Access Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Trellix

Trellix

Trellix XDR leverages Tenable.io’s industry-leading asset risk analysis capability by seamlessly connecting Tenable.io with Helix. This powerful combination raises alert levels in Helix based on this deep asset knowledge so analysts catch what they might otherwise have missed.

This integration is built and supported by Trellix.

c checkClassification: SOAR

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

Tufin

Tufin

The Tufin integration with Tenable analyzes user-selected network segments for asset vulnerabilities with existing access containing the service/protocol that makes them a candidate for exploitation. Vulnerability information from Tenable.io and Tenable.sc is made available in the vulnerable asset profiles in Tufin that are used to determine the patches that are required to remediate. The context provides users with the ability to design mitigating controls or initiate access change requests to prevent the exploitation of a vulnerable and accessible asset.

This integration is built and supported by Tufin. Please contact [email protected] for support.

c checkClassification: Automation

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Visium

Visium

Visium’s Integration with Tenable enables context-based threat awareness benefits of CyGraph – quickly and intuitively understand threats, root causes and mitigation steps in real-time.  The CyGraph API connector for Tenable automatically and continuously ingests Tenable data displaying critical information to save money and protect digital reputations. By combining CyGraph with the asset, and vulnerability information from Tenable, users are better able to assess relationships between nodes and applications for risk monitoring and mitigation.

This integration is built and supported by Visum. Please contact [email protected] for support.

c checkClassification: Vulnerability Management

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

VMware Workspace ONE

VMware Workspace ONE

Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detects vulnerabilities on those devices. Formerly VMWare AirWatch

This integration is built and supported by Tenable.

c checkClassification: Mobile Device Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Vulcan Cyber

Vulcan Cyber

Vulcan Cyber integration with Tenable enables users to focus on remediation and get fix done. Vulcan remediation intelligence prioritizes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then, the platform orchestrates and measures the rest of the remediation process with integrations and inputs into patch and ticketing systems & tools, while allowing full visibility, monitoring, and tracking capabilities.

This integration is built and supported by Vulcan Cyber. Please contact [email protected] for support.

c checkClassification: Remediation Orchestration

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

W@tchtower

[email protected]

[email protected] integrates with Tenable.sc to bring your vulnerability data into The [email protected] Platform, relate it to other key information like IOCs and make it available in interactive investigation tools, incident tickets, workflows and dashboards. With [email protected] and Tenable together, you can readily prioritize vulnerability patching according to the threats you are currently facing.

This integration is built and supported by [email protected] Please contact [email protected] for support.

c checkClassification: SOAR

gear Integrates with: Tenable.sc

flag Supports Tenable FedRAMP: No

WALLIX

WALLIX

The WALLIX Bastion PAM solution integrated with Tenable enables customers to reduce their attack surface, meet regulatory compliance requirements with simplified management of privileged access.

This integration is built and supported by Tenable.

c checkClassification: Privileged Access Management

gear Integrates with: Tenable.io, Tenable.sc

flag Supports Tenable FedRAMP: No

Waterfall Security

Waterfall Security

By integrating Waterfall USG with Tenable.ot, you can trust that your internal and critical network is physically inaccessible from your external network while Tenable.ot monitors your sensitive network.

c checkClassification: Firewall (diode)

gear Integrates with: Tenable.ot

flag Supports Tenable FedRAMP: No

XM Cyber

XM Cyber

XM Cyber's integration with Tenable provides attack path intelligence pinpointing the key entities, assets, or devices that many attack paths can traverse through to breach the organization's critical assets. This results in cost effective remediation, where the highest risks to the organization's security posture are prioritized and fixed first. This integration is built and supported by XM Cyber.

c checkClassification: Breach & Attack Simulation

gear Integrates with: Tenable.io

flag Supports Tenable FedRAMP: No

ZeroNorth

ZeroNorth

ZeroNorth provides orchestrated risk management by combining with Tenable.io WAS to create a single Application Security platform, enabling full visibility into vulnerabilities for your entire application stack.

This integration is built and supported by ZeroNorth. Please contact [email protected] for support.

c checkClassification: Application Security

gear Integrates with: Nessus, Tenable.io

flag Supports Tenable FedRAMP: No

Join the Cyber Exposure Partner Ecosystem

The Cyber Exposure partner ecosystem is part of the Tenable™ Assure partner program, a new program designed to make it easier than ever for Tenable technology and channel partners to build and deliver innovative solutions to customer problems. Features of the program include the elimination of partner levels and fees and the creation of a self-service capability for building integrations with Tenable.io and Tenable.sc. Tenable is committed to working with the technology ecosystem to maintain integrations which keep pace with changes over time. For questions, please reach out to [email protected].

tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Tenable.io Web Application Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web Application Scanning trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.cs Cloud Security.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable.io Container Security

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try Tenable Lumin

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable.io Vulnerability Management, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable.cs

Enjoy full access to detect and fix cloud infrastructure misconfigurations and view runtime vulnerabilities. Sign up for your free trial now.

Your Tenable.cs Cloud Security trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.io Web Application Scanning.

Contact a Sales Rep to Buy Tenable.cs

Contact a Sales Representative to learn more about Tenable.cs Cloud Security and see how easy it is to onboard your cloud accounts and get visibility into both cloud misconfigurations and vulnerabilities within minutes.

Try Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Promotional pricing extended until December 31st.
Buy a multi-year license and save more.

Add Support and Training