Tenable Description

Tenable's Cyber Exposure Platform provides all the information, research and data that you need to find weaknesses in your entire attack surface. Tenable's market-leading vulnerability monitoring sensors allow you to see every asset on your attack surface, from cloud environments to operational technologies, containers to containers, remote workers to modern web apps. Tenable's machine learning-powered predictions reduce remediation efforts and allow you to concentrate on the most important risks. Communicating objective measures of risk and aligning business goals to security initiatives will help you drive improvements that reduce the likelihood of a cyber-related event affecting your business. These products include:

Tenable.ep
Tenable.io
Tenable.sc
Tenable.ad
Tenable.ot
- Tenable Lumin

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Tenable
Year Founded:
2002
Headquarters:
United States
Website:
www.tenable.com/products/tenable-io

Media

Tenable Screenshot 1
Recommended Products
Open source. Easy to use. Proven. Complete. Icon
Open source. Easy to use. Proven. Complete.

End to end big data that enables you to spend less time formatting data and more time analyzing it.

Discover HPCC Systems - the truly open source big data solution that allows you to quickly process, analyze and understand large data sets, even data stored in massive, mixed-schema data lakes. Designed by data scientists, HPCC systems is a complete integrated solution from data ingestion and data processing to data delivery. The free online introductory courses and a robust developer community allow you to get started quickly.

Product Details

Platforms
SaaS
Type of Training
Documentation
Customer Support
Online

Tenable Features and Options

Vulnerability Management Software

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Container Security Software

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection