Facebook Google Plus Twitter LinkedIn YouTube RSS 菜单 搜索 资源——博客资源——在线研讨会资源——报告资源——事件icons_066 icons_067icons_068icons_069icons_070

Tenable has partnered with market leading technology companies to pioneer the industry’s first Cyber Exposure ecosystem, to help the digital enterprises of today - and tomorrow - build resilient cybersecurity programs.

Read the Press Release

Integrated Solutions
to Solve Customer Problems

From ingesting third-party data to enriching third-party systems, the Cyber Exposure partner ecosystem connects disparate solutions and data to accelerate an organization’s ability to understand, manage and reduce cyber risk.

THIRD party data integration

Tenable gains even more intelligence by integrating third party data into its platform including threat intelligence, asset data, and other indicators of security health.By adding context to the asset’s exposure, organizations can prioritize remediation based on the asset’s business criticality and the severity of the issue.

Enriching THIRD party systems

Tenable live Cyber Exposure data is integrated into third party Security and IT Operations tools including ticketing, CMDBs, and systems management to prioritize remediation, enhance IT service delivery and integrate Cyber Exposure into your organization’s overall IT risk and compliance framework.


Partner Spotlight:

“Organizations running operational technology face a foundational security challenge – the need to understand the entirety of their cyber exposure in the context of a modern attack surface that is constantly evolving.Joining forces with Siemens is a natural next step and together we provide a way for organizations to monitor and address their attack surface in totality, so they can see where they are vulnerable and protect those systems -- and the people who depend on them -- from threats.” Amit Yoran, CEO of Tenable Read the Press Release

Cyber Exposure Ecosystem:
Featured Technology Partners

Siemens|Operational Technology

Tenable and Siemens have formed a strategic partnership to help energy, utilities and oil and gas companies with a new solution for industrial asset discovery and vulnerability management.‘Industrial Security’ from Tenable provides safe, reliable asset discovery and vulnerability detection purpose-built for industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems.Using passive network monitoring based on Tenable’s Nessus Network Monitor, designed for critical systems which require a non-intrusive approach to vulnerability detection, the OT-native solution helps identify and prioritize OT risks so organizations can keep safety-critical production assets secure and fully functional.Delivered by Siemens as a security service, ‘Industrial Security’ helps customers understand the state of their assets at all times, providing them with the information they need to quickly and confidently assess, understand and ultimately reduce their cybersecurity risk.

Visit the Site
ServiceNow|SecOps & Ticketing

Automatically sync IT asset data from the ServiceNow® Security Operations platform with SecurityCenter to enrich asset discovery and vulnerability assessment, as well as import Tenable findings into ServiceNow to accelerate the IT remediation workflow.

Visit the Site
Amazon Web Services (AWS)|Cloud Infrastructure

The AWS Connector for Tenable.io automatically and continuously discovers and tracks asset changes in AWS cloud environments to ensure all instances are known and assessed for exposure with every change.With the life of cloud workloads commonly measured in hours, the AWS Connector solves a key challenge of achieving accurate visibility into cyber risk by creating a consolidated view of all on-prem and cloud-based assets.This empowers security teams to manage Cyber Exposure across the entire modern attack surface with a complete picture.

Visit the Site
Splunk|SIEM

Splunk® Enterprise automatically collects Tenable vulnerability and configuration issues, correlating vulnerable systems with SIEM alert activity to help validate threats.The Tenable application is Common Information Model (CIM) compatible for easy use with other Splunk apps.

Visit the Site
McAfee|Endpoint Security

Automatic exporting of Tenable vulnerability and configuration data into McAfee ePolicy Orchestrator™ (ePO) increases visibility and enriches context around the security posture of McAfee managed endpoints.

Visit the Site
CyberArk|Privileged Account Management

Tenable integration with CyberArk Application Identity Manager™ simplifies privileged access to hosts for more accurate and faster vulnerability assessment.

Visit the Site
ForeScout|NAC

Integration with ForeScout CounterAct® allows the product to notify Tenable when new systems join the network, triggering immediate vulnerability assessment of newly detected devices and the ability to execute protective actions on vulnerable systems.

Visit the Site
Infoblox|IP Address Management

Integration with Infoblox IP Address Management allows the product to trigger immediate vulnerability assessment via Tenable when new systems join the network or during incident response to identify compromised systems.

Visit the Site
Thycotic|Privileged Account Management

Integration with Thycotic Secret Server simplifies privileged system access to hosts for more accurate and faster vulnerability assessment.

Visit the Site
IBM|SIEM

Automatically export Tenable vulnerability and compliance findings into IBM QRadar and import QRadar alerts into Tenable to trigger on-demand scans to correlate vulnerable systems with SIEM alert activity for greater analysis accuracy and issue prioritization.

Visit the Site
BMC|SecOps

Automatically export Tenable vulnerability and compliance violation findings into the BMC SecOps Response Service to accelerate incident response.

Visit the Site
Redseal|TVM

Automatically export Tenable vulnerability and compliance violation findings into the RedSeal cybersecurity analytics platform to correlate vulnerable system data with RedSeal access path data for issue remediation prioritization.

Visit the Site
Microfocus/HPE Enterprise|SIEM

Automatically export Tenable vulnerability and compliance violation findings into ArcSight and correlate vulnerable systems with SIEM alert activity for greater analysis accuracy and issue prioritization.

Visit the Site
Cisco|NAC

Integration with Cisco Identity Services Engine (ISE) leverages Tenable vulnerability and compliance violation findings to trigger rule-based Network Access Control to remediate vulnerable systems.

Visit the Site
RSA|GRC

Export Tenable vulnerability and compliance violation findings to RSA Archer® GRC to aggregate vulnerable system data with additional IT controls data for a consolidated view of IT risk.

Visit the Site
APCON|Network Monitoring

The APCON IntellaStore platform provides data aggregation, capture, storage and onboard applications all in one box.IntellaStore captures all traffic of interest from anywhere in the network and provides full packet visibility to the Nessus Network Monitor running directly on the IntellaStore.The ability to have Nessus Network Monitor running on the same box that is tapping the data means data can be analyzed from one spot and threats can be identified faster.

Visit the Site

Join the Cyber Exposure Partner Ecosystem

The Cyber Exposure partner ecosystem is part of the Tenable™ Assure partner program, a new program designed to make it easier than ever for Tenable technology and channel partners to build and deliver innovative solutions to customer problems.Features of the program include the elimination of partner levels and fees and the creation of a self-service capability for building integrations with Tenable.io.Tenable is committed to working with the technology ecosystem to maintain integrations which keep pace with changes over time.

Join Now

Join the Cyber Exposure Partner Ecosystem

Fill out the form below or email us at [email protected].