Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Partners with Thycotic to Simplify Credential Management for Authenticated Assessments

June 20, 2016

Columbia, MD

Technology integration between Tenable and Thycotic increases efficiency for vulnerability assessments using privileged accounts

Tenable Network Security®, Inc., a global leader transforming security technology for the business needs of tomorrow, today announced a technology alliance partnership with Thycotic, a provider of privileged account management (PAM) solutions for more than 3,500 organizations worldwide, bringing customers a more simplified and secure credentials management solution.

Security administrators are often bogged down with the logistical details of conducting credentialed network vulnerability assessments, from gaining access to privileged accounts to navigating through constantly changing usernames and passwords. This technology integration removes the credential management burden that accompanies vulnerability management practices.

“Tenable is committed to helping organizations of all sizes prioritize threats and weaknesses and reduce exposure and loss across all IT environments,” said Matt Alderman, vice president of strategy, Tenable Network Security. “Password management for credentialed scans can be challenging, and without authenticated scans, customers can miss local vulnerabilities, misconfigurations and other security issues that expose hosts to compromise. This integration helps our customers more easily manage credentials to run authenticated scans, giving them the visibility they need to manage security threats across all of their assets.”

The integration between Tenable Nessus® and Thycotic’s Secret Server makes managing credentialed scans seamless and secure. Accounts are centralized and securely stored in Thycotic Secret Server, and Tenable requests them at run time, ensuring customers have the correct access every time without the hassles of manual credential management.

“Thycotic is committed to protecting our customers’ privileged accounts, while still being a fast to deploy, easy to use, scalable enterprise-class solution,” said Ben Yoder, product manager, Thycotic.  “In partnership with Tenable, we can now enable organizations to easily perform credentialed scans to find the most accurate vulnerability information without compromising accountability or control of privileged credentials.”

For more information on how organizations can assess and remediate vulnerabilities and deploy secure solutions with Tenable, visit the Vulnerability Management Solutions page.


For more information on Thycotic, visit www.thycotic.com.

About Tenable

Tenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 20 percent of the Global 2000 and large government agencies. Learn more at tenable.com.

Contact Information:

Cayla Baker
[email protected]
(443) 539-6476

Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.