What is Tenable Vulnerability Management?
Tenable Vulnerability Management (formerly Tenable.io) is a solution powered by Nessus technology and managed in the cloud that offers industry’s most comprehensive vulnerability coverage with the ability to predict the security issues needing to be remediate first. It applies advanced asset identification algorithm to give the most accurate information about dynamic assets and vulnerabilities in ever-changing environments.
Key Benefits:
1. Continuous visibility
Tenable Vulnerability management constantly track known and unkown assets as well as their vulnerabilities, making threats and unexpected network changes to be detected before they become breaches.
2. Enhance productivity
Tenable Vulnerability Management enables you to utilize the SaaS-based solution for running your initial assessments in under 5 minutes that is free from
3. Automate process
Tenable Vulnerability management let you import third party data, automate scans, and share data with your IT systems by leveraging a fully documented API and pre-built integration.
4. Prioritize Vulnerabilities
Tenable Vulnerability management integrates vulnerability data, threat intelligence and data science to easily understand risk scores to quickly identify the highest business risk.
5. Maximize return on investment
Tenable Vulnerability management which is the industry’s first asset based licensing model removes double or triple counting of assets with multiple IP addresses.
Key Capabilities:
1. Elastic Asset Licensing
Tenable Vulnerability Management practices asset-based licensing model.
This model :
- consume only a single license per unit asset, even if the asset has multiple IP addresses.
- allows scanning to continue when license counts are temporarily exceeded and automatically recovers licenses for rarely scanned assets or one-time bursts.
2. Comprehensive Assessment Options
Tenable Vulnerability Management provides unified visibility on the entire attack surfaces.
It maximize scan coverage across your infrastructure and reduce vulnerability blind spots by combining nessus Sensors, a mix of active scanners, agents, passive network monitoring, cloud connectors and CMDB integrations.
3. Accurate Asset-Based Vulnerability Tracking
Tenable Vulnerability Management gives the ability to track assets and vulnerability with the most accuracy. This is achieve through advanced asset identification algorithm that utilizes extensive set of attributes (such as Tenable ID, NetBIOS name, MAC address and much more.
4. Vulnerability Prioritization Based on Actual Risk
Tenable Vulnerability Management involves the combination of vulnerability data, threat intelligence and data
science to ease understanding on the risk score to prioritize vulnerability and remediation action.
5. Simplified Vulnerability Management
Tenable Vulnerability Management’s intuitive dashboard visualizations makes common tasks, including configuring scans, running an assessment, and analyzing results, easier. Additionally Pre-defined scan templates and configuration audit checks that are based on the best practices frameworks (CIS and and DISA STIG) enables you to safeguard your organization.
6. Automated Cloud Visibility
Tenable Vulnerability Management allows continuous visibility and assessments into public cloud environments. Cloud Connectors automatically identify assets in Amazon Web Services, Microsoft Azure, and Google Cloud Platform and monitor their status in real-time. Nessus Sensors helps assess cloud environments to detect vulnerabilities, malware, and configuration and compliance issues.
7. Operation Technology (OT) Visibility
The integration of Tenable Vulnerability Management and Tenable OT Security empowers you with a unified risk-based view of your converged infrastructure which include continuous visibility, threat detection and mitigation, adaptive assessment, vulnerability management and configuration control to protect against OT and IT threats.
8. Pre-Built Integrations and a Documented API and Integrated SDK
Tenable Vulnerability Management has pre-built integrations or ‘plugins’ that are available for popular credential management, SIEM, ticketing systems and other complementary solutions to ley you easily build an efficient vulnerability management process. You can also create your own integrations to Tenable Vulnerability Management by leveraging a fully documented API set and SDK. These tool do not involve additional cos to optimize the value of your vulnerability data.
9. SLA with Uptime Guarantee
Tenable gives the vulnerability management industry’s first and only uptime guarantee through a robust service level agreement (SLA) for Tenable Vulnerability Management. In case where SLA is not met, service credits are offered to the customers.
10. PCI-Certified Approved Scanning Vendor
Tenable Vulnerability Management is a PCI-Certified scanning vendor (ASV) solution that allows merchants and service providers to validate the security of their internet-facing systems in compliance with the external network vulnerability scanning requirements outlined in the PCI Data Security Standard (PCI DSS).
11. Backed by Tenable Research
Tenable Vulnerability Management is backed by Tenable Research to deliver world-class Cyber Exposure intelligence, data science insights, alerts, and security advisories. Frequent updates by Tenable Research helps you secure your organisation by providing frequent updates on the latest vulnerability checks, zero-day research, and configuration benchmarks.
E-SPIN Group in the enterprise ICT solution supply, consultancy, project management, training and maintenance for corporation and government agencies did business across the region and via the channel. Feel free to contact E-SPIN for your project requirement and inquiry.
This post was first published in 2020-Nov-30, updated 2023-May-30.