Our Technology ecosystem is a backbone of our success, and we’re excited to have achieved this milestone of over 300... this momentum symbolizes the next level of cyber risk management and mitigation for our customers at a time when they need it most.
Platinum technology partners
AWS
Together with AWS, Tenable offers a comprehensive portfolio that helps prevent attacks by identifying the vulnerabilities, configuration issues, and malware that hackers could use to penetrate your AWS environment. Tenable is built on AWS and works seamlessly to secure your AWS assets.These integrations are built and supported by Tenable.
BeyondTrust
Tenable’s integration with BeyondTrust Password Safe streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.This integration is built and supported by Tenable.
CyberArk
Tenable’s integration with CyberArk streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.This integration is built and supported by Tenable.
Google Cloud Platform (GCP)
Tenable integrates with Google Cloud Platform (GCP) to help joint customers get a holistic view of their Tenable findings with all of the context of security and event information in a single place.The connector, Tenable Identity Exposure and Tenable Cloud Security integration is built and supported by Tenable.
Microsoft
Tenable and Microsoft have several integrations to support joint customers in securing their organizations. These integrations span across Microsoft Azure, Microsoft Sentinel, Azure Security Center and more. Combine Tenable insights with your Microsoft systems to increase overall security, gain efficiency, track changes, and more.For more information, please check out Integration Details below.These integrations are built and supported by Tenable.
ServiceNow
Together, Tenable and ServiceNow Security Operations bring common visibility to organizations by automatically discovering IT, Cloud, OT and IoT assets, continually assessing these systems for vulnerabilities, linking vulnerabilities with the asset’s business criticality, and prioritizing issues based on this data to accelerate remediation. Joint customers can run automated workflows to solve their most vulnerable items first, saving time and reducing potential exposure related to the vulnerability. In addition, integrations can trigger an automatic re-assessment of the asset to provide validation that the issues were sufficiently resolved, creating a complete, closed-loop remediation process.Tenable for ITSM, Service Graph Connector for Tenable and Tenable One Connectors are built and supported by Tenable. Vulnerability Response Integration with Tenable (integrates with Tenable Vulnerability Management, Tenable Security Center, Tenable Web App Scanning and Tenable Cloud Security) is built and supported by ServiceNow.
Siemens Energy
Tenable and Siemens have formed a strategic partnership to help energy, utilities and oil and gas companies with a new solution for industrial asset discovery and vulnerability management. Tenable OT Security provides safe, reliable asset discovery and vulnerability detection purpose-built for industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. Using passive network monitoring based on Tenable’s Nessus Network Monitor, designed for critical systems which require a non-intrusive approach to vulnerability detection, the OT-native solution helps identify and prioritize OT risks so organizations can keep safety-critical production assets secure and fully functional. Delivered by Siemens as a security service, Tenable OT Security helps customers understand the state of their assets at all times, providing them with the information they need to quickly and confidently assess, understand and ultimately reduce their cybersecurity risk.
Splunk
Tenable® is Splunk's strategic vulnerability management provider and an Elite Build partner. The Tenable® integrations with Splunk combine Tenable’s Exposure insights with Splunk’s correlation capabilities for complete visibility into all assets across the modern attack surface and their potential vulnerabilities, misconfigurations and unpatched components in a unified threat detection, investigation, and response single analytics platform. The integrations for Splunk Enterprise is built and supported by Tenable.The integration for Splunk SOAR is built and supported by Splunk.Gold technology partners
Adaptiva
OneSite Patch integrates with Tenable Vulnerability Management and Tenable Security Center to quickly identify, investigate, prioritize and patch your most critical endpoint vulnerabilities at scale. IT administrators can precisely define their desired patching rules, including phased deployments, approvals, testing and notifications — then OneSite Patch for Tenable fully automates patch management to fix vulnerabilities before they happen.This integration is built and supported by Adaptiva.
Synack
Synack’s integration with Tenable Vulnerability Management imports Tenable scanning results into the Synack PTaaS Platform. Triage of scan results in the Synack Platform guides security testing by the Synack Red Team, delivering detailed exploitability analysis, remediation recommendations, and patch verification.This integration is built and supported by Synack.Explore all technology partners
7Dev
The integration of Linux Control Center (LCC) with Tenable Vulnerability Management and Tenable Security Center offers seamless, centralized management of detected vulnerabilities, enabling IT and security teams to view, prioritize, and address risks efficiently in one platform. This solution optimizes workflows by automating vulnerability import and patch pre-testing, reducing operational risks. With added support for virtualized snapshots, LCC ensures quick recovery options, enhancing security resilience across corporate environments.This integration is built and supported by 7Dev.
Action1
The Action1 and Tenable integration connects to the Tenable API to retrieve asset and vulnerability data and correlates it with endpoint and vulnerability information in Action1. It analyzes the combined datasets to identify patchable and non-patchable vulnerabilities, unrecognized CVEs, and assets missing from either platform. The integration generates detailed comparison reports and delivers them to administrators, helping teams validate coverage, prioritize remediation, and maintain compliance.This integration is built and supported by Action1.
Adaptiva
OneSite Patch integrates with Tenable Vulnerability Management and Tenable Security Center to quickly identify, investigate, prioritize and patch your most critical endpoint vulnerabilities at scale. IT administrators can precisely define their desired patching rules, including phased deployments, approvals, testing and notifications — then OneSite Patch for Tenable fully automates patch management to fix vulnerabilities before they happen.This integration is built and supported by Adaptiva.
Adaptive Shield
Adaptive Shield's Integration with Tenable enriches understanding of device posture and user posture and their influence on one another. By correlating Tenable’s rich telemetry and contextualized vulnerability data within the Adaptive Shield’s SaaS security posture technology, joint users will gain context and visibility to easily see and manage the risks that stem from SaaS users and their associated devices.This integration is built and supported by Adaptive Shield.
Analyst1
Analyst1 is a threat intelligence and cyber operations tool that orchestrates & automates rapid and comprehensive response actions. The Analysy1 integration with Tenable Security Center automates the enrichment of Tenable vulnerability data to enable threat-based prioritized actions, allowing security teams to focus on what will provide the greatest reduction of cyber risk.This integration is built and supported by Analyst1.
anecdotes.ai
anecdotes’ customers use the Tenable Vulnerability Management integration to satisfy security operations and access management controls. With the plugin, joint customers can automatically provide compliance evidence such as vulnerability scan configurations, remediation of vulnerabilities and more. This integration is built and supported by anecdotes.ai.
Anomali
Anomali offers an intelligence-driven threat detection and response solution which allows customers to detect and respond to threats using threat intelligence on a massive scale. Through the integration with Tenable, the Anomali Platform helps surface relevant threats, enabling you to prioritize your response and reduce risk based on your assets’ security posture or criticality.This integration is built and supported by Anomali.
APCON
The APCON IntellaStore platform provides data aggregation, capture, storage, and onboard applications all in one box. IntellaStore captures all traffic of interest from anywhere in the network and provides full packet visibility to the Nessus Network Monitor running directly on the IntellaStore. The ability to have Nessus Network Monitor running on the same box that is tapping the data means data can be analyzed from one spot and threats can be identified faster. This integration is built and supported by APCON.
appNovi
appNovi's security data visualization and analysis provide simple ways to communicate threats to technical and non-technical stakeholders. This integration aggregates your Tenable vulnerability data with netflow, infrastructure, and other data sources to identify contextually exploitable assets and their importance to the business. appNovi was founded by security practitioners to enable attack surface identification and mapping, support business-specific vulnerability management, and empower effective incident response.This integration is built and supported by appNovi.
AppViewX
The AppViewX and Tenable integration enables automated discovery and continuous monitoring of certificates across the network by leveraging Tenable's vulnerability insights. This integration helps identify certificates with weak configurations, expired or expiring status and known vulnerabilities, allowing AppViewX to orchestrate remediation workflows such as renewal, replacement or revocation. As a result, our joint solution strengthens your overall security posture by ensuring certificate compliance and reducing manual intervention.This integration is built and supported by AppViewX.
Archer
The integration between Tenable Security Center and Archer combines business-driven security solutions to help customers comprehensively and rapidly link security incidents with business context to respond effectively and protect what matters most.This integration is built and supported by Archer.
Arcon
Tenable’s integration with Arcon streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.This integration is built and supported by Tenable.
Armis
Armis discovers all assets whether they are IT, OT, IoT and IoMT and provides intelligence regarding the specifics of each device. Leveraging the Armis Asset Intelligence Engine, and AI technology, information is appended and expected behaviors are learned. This deep situational awareness with full context is sent to Tenable to remediate risk and solve vulnerabilities based on risk.This integration is built and supported by Armis.Consolidate Armis’ IoT asset and risk data with broader risk insights for a unified exposure view in Tenable One.Tenable One Connectors are built and supported by Tenable.
ArmorCode
ArmorCode’s Tenable integration empowers you to shift from chasing vulnerabilities to reducing risk. Unify Tenable vulnerability findings with all your security data across code, cloud, applications, and infrastructure. Prioritize based on risk with advanced threat intelligence and business context, while also leveraging AI and automation to remediate faster.This integration is built and supported by ArmorCode.
Aruba, an HPE company
Aruba's integration with Tenable enables automated vulnerability assessments when systems join the network, this ensures all systems are evaluated prior to accessing secure networks.By combining Tenable OT Security’s advanced threat detection, asset and vulnerability management—both at the network and device level, along with Aruba Networks ClearPass Access Control—the joint solution delivers complete visibility, security and control, across your IT and OT environments. This includes traditional Windows-based systems, Macs and mobile devices, as well as OT devices such as industrial controllers (PLCs, RTUs, DCS controllers).The Tenable Security Center integration is built and supported by Aruba.The Tenable OT Security integration is built and supported by Tenable.
Asimily
Asimily is a Healthcare focused and medical device solution to manage and secure devices. Currently Asimily solves for use cases around inventory, device relationships, risk monitoring and mitigation, patch and mitigation prioritization, forensic analysis, asset utilization, policy management, vendor management, device tracking, FDA recall monitoring and is adding more. As a part of the Patch and Mitigation Prioritization module, Asimily integrates with Tenable Security Center and Tenable Vulnerability Management to fetch vulnerabilities for scanned devices that are then processed by the Asimily solution. In addition, the Tenable scanners are configured to avoid scanning certain medical devices based on Asimily device classification.This integration is built and supported by Asimily.
ASPIA InfoTech
The ASPIA integration with Tenable Vulnerability Management provides a centralized platform to streamline the complete vulnerability management process. ASPIA tracks vulnerabilities and visualizes the details by ingesting assets and vulnerabilities data from tenable to deliver a comprehensive view of organizations security posture.This integration is built and supported by ASPIA.
Atlassian
Tenable integrates with Atlassian's Jira On Prem, Jira Cloud, Jira Core, Jira Software and Jira Service Desk to automatically open tickets for vulnerabilities that Tenable identifies and closes them once they have been resolved, providing a cohesive and trackable remediation process. <!--td {border: 1px solid #ccc;}br {mso-data-placement:same-cell;}--> Integrate your Jira projects with Tenable Cloud Security to create issues in Jira related to specific Tenable findings. Tenable Cloud Security supports integration with both Jira Software and Jira Software Cloud.These integrations are built and supported by Tenable.
AuditBoard
The AuditBoard integration with Tenable brings best-in-class experience to automatically collect vulnerability ingestion, asset inventory, and scan frequency on a regular cadence. This integration empowers security operations and compliance teams to collect evidence without burdening their business partners.This integration is built and supported by AuditBoard.
Averlon
The Averlon–Tenable integration enables security teams to accelerate remediation by turning Tenable’s exposure insights into prioritized, actionable outcomes. Averlon ingests Tenable findings alongside signals from code, cloud and infrastructure to construct contextual attack chains, assess exploitability, and automate triage, mitigation and remediation workflows. Together, we help teams reduce risk faster—at scale. This integration is built and supported by Averlon.
AWS
Together with AWS, Tenable offers a comprehensive portfolio that helps prevent attacks by identifying the vulnerabilities, configuration issues, and malware that hackers could use to penetrate your AWS environment. Tenable is built on AWS and works seamlessly to secure your AWS assets.These integrations are built and supported by Tenable.
Axonius
Axonius' integration with Tenable synchronizes asset data into the content management database in order to provide a unified view of all devices.This integration is built and supported by Axonius.Consolidate your asset inventory with broader risk data for a complete view of your entire digital landscape in Tenable One.Tenable One Connectors are built and supported by Tenable.
Bacon Unlimited
Bacon Unlimited’s integration with Tenable Vulnerability Management and Tenable Security Center allows joint customers to see all vulnerabilities on their endpoints, remediate all actionable vulnerabilities, and report on current and past success. In addition, Bacon shares all assets with Tenable to ensure that unknown assets become known. Together, Tenable and Bacon offer the most comprehensive solution for remediating vulnerabilities on the market today.The integration is built and supported by Bacon Unlimited.
BeyondTrust
Tenable’s integration with BeyondTrust Password Safe streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.This integration is built and supported by Tenable.
Bitahoy
Bitahoy provides AI-assisted reporting and vulnerability prioritization based on business insights. This integration imports your vulnerabilities from Tenable Security Center into Bitahoy to enrich it with data from your company's documentation and knowledge base. This way, Bitahoy can provide additional information like time-to-fix, affected business processes, compliance issues, and more.This integration is built and supported by Bitahoy.
BitSight
Consolidate BitSight’s external cyber risk intelligence with broader risk data for a unified exposure view in Tenable One.Tenable One Connectors are built and supported by Tenable.
Black Duck
Consolidate Black Duck’s web application DAST, static application security testing (SAST) and software composition analysis (SCA) security data with broader risk insights for a unified view of application exposure in Tenable One.Tenable One Connectors are built and supported by Tenable.
BlackBerry
Connects to the mobile device management to pull information into Tenable's platform and inventories mobile data to detect vulnerabilities on those devices.This integration is built and supported by Tenable.
Blackpoint Cyber
Blackpoint Cyber's integration with Tenable connects vulnerability data and asset information into Blackpoint's platform for increased visibility. This provides a complete understanding of every connected device and the ability to pinpoint targeted devices immediately.This integration is built and supported by Blackpoint Cyber.
Blink Ops
Together, Blink and Tenable empower enterprises to build, collaborate, and scale workflows that can quickly detect vulnerabilities across an organization's digital footprint. When Tenable detects new vulnerabilities, security teams can trigger automated workflows in the Blink platform to gather additional information and alert the relevant team(s) for fast remediation.This integration is built and supported by Blink Ops.
BMC
Automatically export Tenable vulnerability findings into BMC TrueSight and BMC Helix consoles to accelerate incident response and remediation in bulk.This integration is built and supported by BMC.
Bright Security
Consolidate Bright's dynamic application & API security testing (DAST) data with broader risk insights for a comprehensive view of security risks across web applications in Tenable One.Tenable One Connectors are built and supported by Tenable.
Brinqa
Brinqa's integration with Tenable enables organizations to effectively connect asset and vulnerability information with business context and threat intelligence data to deliver a data-driven, risk-based program.This integration is built and supported by Brinqa.
Caveonix
The Caveonix Cloud integration with Tenable Security Center utilizes native APIs to enable bi-directional exchange of data for all cloud security findings and related data. This partnership allows clients to reduce risk exposure time windows by enabling rapid fixes through Robotic Process Automation (RPA) and prioritize remediations through risk analytics and scoring.This integration is built and supported by Caveonix.
Centraleyes
Centraleyes is a next-generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. The platform addresses the main pain points of GRC by providing no-code deployment with single-day implementation and onboarding, automation and orchestration of data collection and analysis from various internal tools like Tenable Nessus and Tenable Vulnerability Management, and real-time dashboards and reports that enable its customers to make smarter strategic decisions. This is truly cyber risk management reimagined.This integration is built and supported by Centraleyes.
Check Point CloudGuard
The Tenable Vulnerability Management and CloudGuard integration provides clients with high fidelity cloud security posture management to ensure more accurate findings and prioritization based on public exposures. Check Point CloudGuard Cloud Security Posture Management capabilities enrich the Tenable host level vulnerability findings which can help clients best prioritize their remediation and patching efforts.This integration is built and supported by Check Point.
Cisco
Cisco Meraki Dashboard is a centralized cloud-based platform used to manage and monitor Cisco Meraki devices. It provides a web-based interface for configuring, troubleshooting, and securing global networking and IoT deployments. Tenable’s integration with the Cisco Meraki Dashboard API allows users to leverage our vulnerability management solutions against devices that are managed in their Meraki environment including security appliances, switches, routers, and other supported devices.This integration is built and supported by Tenable.Firepower Management Center can automatically import vulnerability reports from Tenable Security Center which improves the accuracy of the Firepower Network Host Map. This enhanced Host Map improves the fidelity of Firepower’s Intrusion Event Impact Level scoring which helps analysts to prioritize the Intrusion events that can most impact the business. In addition, the Tenable information helps improve Intrusion policy tuning, further reducing false positives.The integration with Cisco Identity Services Engine (ISE) leverages Tenable vulnerability and compliance violation findings to trigger rule-based Network Access Control to remediate vulnerable systems.This integration is built and supported by Cisco.
Claroty
Consolidate Claroty’s OT, IoT and XIoT asset and risk data with broader risk insights for a unified exposure view in Tenable One.This integration is built and supported by Tenable.
Cloudflare
Tenable continuously connects with and ingests Cloudflare external attack surface assets into Tenable Attack Surface Management. The integration helps to enrich and expand our asset visibility for externally accessible assets and disposition assets more effectively by leveraging Cloudflare's asset visibility.The integration is built and supported by Tenable.
Cohesity
Discover cyber exposures and vulnerabilities within your production IT environment by leveraging backup data. Cohesity CyberScan powered by Tenable, makes it easy to assess your risk posture, and meet stringent security and compliance requirements by helping to ensure no known or previously addressed vulnerabilities are re-injected into the production environment while performing a recovery job.This integration is built and supported by Cohesity.
Corelight
This integration pulls vulnerabilities from Tenable Security Center and loads them via the Corelight input framework, which allows us to flag Suricata IDS alerts where the system being attacked is known to be vulnerable to the attack in question. This helps SOCs prioritize which events they should respond to first, as these attacks are the most likely to have been successful.This integration was built and supported by Corelight.
Cortex
Tenable integrates with Cortex Xpanse and Xsoar to increase visibility into unknown assets and standardize their incident response processes.These integrations are built and supported by Palo Alto Networks.Consolidate Cortex XDR’s extended detection and response data with broader risk insights for a comprehensive view of security risks across endpoints and networks in Tenable One.Tenable One Connectors are built and supported by Tenable.
Criminal IP
Achieve a heightened comprehension of your cybersecurity posture by importing asset data from Criminal IP and subjecting it to thorough scans within Tenable Vulnerability Management. This dual-tool integration empowers users with imported IP assets, enriched with essential information including Network, Device, Safety of inbound and outbound Traffic, and connected domains, undergo real-time scans for vulnerabilities and malicious elements utilizing the Tenable scanner that allows for comprehensive assessment of asset security and vulnerability.This integration is built and supported by AI Spera.
CyberArk
Tenable’s integration with CyberArk streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.This integration is built and supported by Tenable.
Cyberator
The Cyberator-Tenable integration enables organizations to automatically import vulnerability data from Tenable into Cyberator’s centralized GRC platform. This allows security teams to correlate vulnerabilities with business processes, track remediation progress, and ensure SLAs are met. By combining Tenable’s deep vulnerability insights with Cyberator’s governance and compliance workflows, organizations can more effectively prioritize, manage, and mitigate risks.This integration is built and supported by Zartech.
CyberSaint
CyberStrong's integration with Tenable Vulnerability Management utilizes Tenable's vulnerability insights to map to controls and provide an unparalleled view into risk, IT compliance, and cyber resilience. CyberStrong is the only solution that can integrate with Tenable and other security solutions to fully automate compliance and risk assessments, leveraging patented AI/ML to ingest telemetry to continuously score controls and update risks in real-time without requiring an analyst to do it manually. Combined with executive risk reporting, Governance dashboards, and Board reports, CyberStrong and Tenable offer a single source of truth for enterprises as they look to manage risks in the digital age.This integration is built and supported by CyberSaint.
Cybersixgill
The Sixgill integration for Tenable brings Tenable's vulnerability insights into Sixgill's Investigative Portal, gaining instant personalized context and providing investigative abilities for security teams.This integration is built and supported by Sixgill.
Cymulate
Cymulate's integration with Tenable ingests vulnerabilities into their workflow for automating comprehensive security posture assessment.This integration is built and supported by Cymulate.
Cynerio
The integration between Cynerio and Tenable enables healthcare organizations to manage risk across their entire IT environment – including traditional Enterprise IT, IoT, OT and IoMT. Together, we promote cross-organizational alignment and give hospitals the control, foresight, and adaptability they require to stay cyber-secure in a constantly evolving threat landscape. Cynerio gives healthcare organizations the power to stay compliant and proactively manage every connection on their own terms with real-time attack detection & response, and rapid risk reduction tools so that they can focus on healthcare’s top priority: delivering quality patient care.This integration is built and supported by Cynerio.
Cyver
Cyver Core integrates seamlessly with Tenable Vulnerability Management to streamline the entire vulnerability assessment workflow. Through this integration, users can initiate Tenable scans directly from the Cyver Core platform, automatically retrieve and centralize discovered vulnerabilities, and instantly convert results into structured pentest reports. Cyver Core’s automation and collaboration features enable teams to publish findings to clients faster, reduce manual effort, and maintain a fully digitized, end-to-end vulnerability management and reporting process.This integration is built and supported by Cyver.
Darktrace
The Darktrace and Tenable Vulnerability Management integration fetches device CVE data via API every 24 hours, providing contextual information on devices covered by both vendors. In Darktrace / Network, this data is accessible within the Device Summary; devices are also tagged with the highest severity category of a CVE currently detected by Tenable, helping to prioritize vulnerabilities effectively. To take it a step further, ingested data can be utilized through Darktrace / Proactive Exposure Management to improve existing attack path modeling and risk prioritization capabilities. Joint customers leveraging the integration have a bolstered understanding of their risk exposure and have a strengthened overall security posture.This integration is built and supported by Darktrace.
Datadog
Datadog monitors the Tenable Nessus web server and backend logs through the Datadog Agent. The integration allows you to visualize your Nessus scans in near real-time to see what users and IPs are accessing your Nessus web server. Integrate Datadog with Tenable Cloud Security to send push notifications related to identified security findings detected by Tenable. This helps provide visibility into, and enhances communication of your cloud security posture on a continuous basis.The integration with Tenable Nessus is built and supported by DataDog. The integration with Tenable Cloud Security is built and supported by Tenable.
Delinea
Delinea combines the expertise of two industry leaders in a comprehensive PAM solution for enterprises with complex IT environments. Protect your privileged accounts with our enterprise-grade Privileged Access Management (PAM) solution. Available both on-premises or in the cloud.The Tenable integration with Delinea Secret Server simplifies privileged system access to hosts for more accurate and faster credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.These integrations are built and supported by Tenable.
Dell
Tenable solutions integrate with Dell KACE systems management appliances to identify missing patches on vulnerable systems, identify unmanaged systems that are vulnerable and require patching, and extend scanning to cover systems that cannot be directly scanned. Tenable can also audit systems running the Dell Force10 FTOS system.This integration is built and supported by Tenable.
DeNexus
CISOs and cybersecurity teams use DeNexus to collaborate with CFOs and executives on cybersecurity investment decisions. The integrated solution enables joint customers to model the financial impact of cyber events, including Annual Expected Loss and Value at Risk, accurate and credible indicators of industrial OT cyber risk exposure, probability of loss, financial impact of cyber events, and the ROI-based mitigation options to reduce cyber risk over time. This integration is built and supported by DeNexus.
Detectify
Consolidate Detectify’s web vulnerability scanning data with broader risk insights for a comprehensive view of application risk in Tenable One.Tenable One Connectors are built and supported by Tenable.
DigiCert
DigiCert’s integration with Tenable empowers organizations to elevate their digital security by streamlining certificate discovery and management across their entire infrastructure. This powerful integration delivers key benefits, including: holistic certificate discovery across all assets, strengthened security posture through proactive measures, unified visibility and comprehensive reporting and seamless, automated remediation of certificate issues. With this integration, organizations can confidently manage their security infrastructure, ensuring every certificate is effectively monitored, secured, and maintained.This integration is built and supported by DigiCert.
Diligent
The partnership between Diligent IT Risk Management (ITRM) and Tenable Vulnerability Management (VM) provides Diligent customers with real-time insights into their organization’s security posture and advanced capabilities to help identify, assess, and prioritize the highest cyber risks across their IT assets. Diligent’s Asset Manager application has integrated with Tenable Vulnerability Management to import vulnerability data, display it on a comprehensive dashboard for information security teams to analyze and provide a holistic view of cyber risk directly to leadership and the Board.This integration is built and supported by Diligent.
Docker
Integrate Docker-based pipelines with Tenable Cloud Security to: 1) Scan your infrastructure-as-code (IaC) pipeline for security issues. 2) Sync the code associated with your cloud resources, to trace those resources back to their origins (Cloud to Code).This integration is built and supported by Tenable.
Elastic
The Elastic integration for Tenable enables organizations to leverage vulnerability data from Tenable within Elastic Security to perform investigations and incident response. Elastic correlates data from Tenable with other data sources, including cloud, network and endpoint sources using robust detection rules to find threats quickly. This integration is built and supported by Elastic.
Entrust
With its unified cryptographic management platform, Entrust combines the rich capabilities to operate PKI, certificate lifecycle management, key and secrets management, and HSMs – all from a single cohesive system that is quantum-secure.Entrust’s Tenable Vulnerability Management plugin allows you to easily add certificate asset information from your TVM deployment to Entrust Cryptographic Security Platform to help complete your cryptographic estate visibility.This integration is built and supported by Entrust.
FireMon
FireMon's integration with Tenable synchronizes vulnerability and asset data into the content management database in order to provide a unified view of all devices. This integration is built and supported by FireMon.
ForeScout
Integration with ForeScout CounterAct® allows the product to notify Tenable when new systems join the network, triggering immediate vulnerability assessment of newly detected devices and the ability to execute protective actions on vulnerable systems.This integration is built and supported by Forescout.
Fortinet
Fortinet FortiSOAR, the leading Security Orchestration, Automation, and Response Platform, integrates with Tenable Vulnerability Management to facilitate an orchestrated and automated vulnerability management solution. This integration enables analysts to prioritize investigations better and be able to automate or take on-demand containment and remediation actions like re-triggering a scan, isolate affected systems using EDR integrations and deploy patches for an in-time, informed and quick response cycle.This integration is built and supported by Fortinet.Tenable OT Security and Fortinet’s FortiGate provide a joint solution designed to eliminate the traditional IT-OT security silos by integrating with the security, work flow, incident response and recovery procedures that can span across both environments.This helps reduce the time it takes to identify security related issues within the converged IT/OT infrastructure.This integration is built and supported by Tenable.
FortMesa
This integration performs two-way synchronization of assets between Tenable and FortMesa, and allows Tenable to drive FortMesa vulnerability management flows. FortMesa is a cyber risk and security operations platform built for humans with automated documentation and simple certification. Establish security governance, find and manage system vulnerabilities, understand your risk and security posturing, then work your way toward right-sized security & compliance standards.This integration is built and supported by FortMesa.
Forward Networks
Forward Enterprise by Forward Networks is transforming the management of large-scale networks. With its advanced software, Forward delivers a digital twin of the network, enabling operators to ensure the network remains secure, reliable, and agile.Enhanced Security with Tenable Security Center and Forward Exposure AnalysisForward Exposure Analysis elevates security by helping teams prioritize vulnerability remediation. It achieves this by integrating host vulnerability data from Tenable Security Center with Forward Networks' sophisticated modeling and connectivity capabilities. This powerful combination allows security teams to swiftly identify any impacted hosts with critical vulnerabilities that can be accessed from the Internet or other critical exposure points.This integration is built and supported by Forward Networks.
Fudo Security
Tenable’s integration with Fudo streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.This integration is built and supported by Tenable.
Garland Technology
By using Garland Technology and Tenable solutions together, organizations can have total visibility of all connected network assets. This ensures organizations have a greater understanding of their cyber exposure.This integration is built and supported by Garland Technology.
Gigamon
By deploying Gigamon and Tenable solutions together, organizations that have encrypted traffic in their environments can regain visibility into what devices are connecting to their environment and continuously monitor network traffic to identify vulnerabilities and risk.This integration is built and supported by Gigamon.
GitHub
<!--td {border: 1px solid #ccc;}br {mso-data-placement:same-cell;}--> Integrate GitHub actions with Tenable Cloud Security to scan your infrastructure-as-code (IaC) pipeline for security issues and sync the code associated with your cloud resources to trace those resources back to their origins.These integrations are built and supported by Tenable.
GitLab
Integrate a GitLab pipeline with Tenable Cloud Security to scan your infrastructure-as-code (IaC) pipeline for security issues.These integrations are built and supported by Tenable.
Google Cloud Platform (GCP)
Tenable integrates with Google Cloud Platform (GCP) to help joint customers get a holistic view of their Tenable findings with all of the context of security and event information in a single place.The connector, Tenable Identity Exposure and Tenable Cloud Security integration is built and supported by Tenable.
Google SecOps
Google SecOps provides a holistic Security Operations Platform (SOAR) that empowers security analysts to work smarter and respond faster. Google SecOps uniquely combines security orchestration and automation with a patented contextual investigation and case management to deliver intuitive, consistent and measurable security operations processes. Leading enterprises and MSSPs leverage Google SecOps as their SOC Workbench, tripling analyst productivity by automating repetitive tasks and bringing together disparate security technologies. Google SecOps also leverages massive data and compute resources to analyze and fight cyber threats with their SIEM capabilities. The platform helps enterprise security teams investigate incidents and hunt for threats in their networks, at the speed of search, making sense of threat information and security telemetry on a global scale. Together, Google and Tenable deliver deeper insights into security issues and improved ability to hunt and respond to threats in real time.These integrations are supported by Google.
Google Workspace
Integrate Google Workspace with Tenable Cloud Security to reveal a complete inventory of identities in your environment.This integration is built and supported by Tenable.
Guardicore
With the Guardicore integration for Tenable, vulnerability data is continuously pulled from Tenable Vulnerability Management and Tenable Security Cetner and used to label assets with their open CVEs and overall risk score. You can then use this in the segmentation policy, allowing you to limit the exposure of the vulnerable workloads and reduce the risk until the vulnerability is mitigated.This integration is built and supported by Guardicore.
Gutsy
Gutsy, the industry's first security process fabric, integrates with Tenable so users can unify intel from across their detection tools and environments and adds a layer of process intelligence to better manage and prioritize vulnerabilities as well as the processes they use to detect, triage and remediate those risks.The integration is built and supported by Gutsy.HackerOne
Consolidate HackerOne’s vulnerability disclosure data with broader risk insights for a comprehensive view of security risks identified through crowd-sourced ethical hacking in Tenable One.Tenable One Connectors are built and supported by Tenable.
Hackuity
Organizations are able to utilize the integration between Tenable Security Center and Hackuity to centralize vulnerabilities and prioritize remediation plans using various correlated data such as assets, business criticalities and cyber threat intelligence. This integration is built and supported by Hackuity.
HashiCorp
HashiCorp's Vault allows users to secure, store and tightly control access to tokens, passwords, certificates and encryption keys for protecting secrets and other sensitive data. Tenable's integration with HashiCorp allows customers to leverage passwords stored in HashiCorp's Vault KV store to perform authenticated scanning.Integrate a Terraform Cloud Run Task with Tenable Cloud Security to scan your infrastructure-as-code (IaC) pipeline for security issues.This integration is built and supported by Tenable.
HCL BigFix
BigFix Insights for Vulnerability Remediation with Tenable dramatically shrinks the gap between your security and IT operations and automatically correlates the most appropriate remediation action based on prioritized vulnerabilities Tenable discovers.This integration is built and supported by HCL BigFix.
Hyperproof
Hyperproof automates the collection of data from Tenable to meet your various compliance needs. This includes various scenarios around your assets but can also be configured to return the scan history for a custom list of assets from Tenable. This evidence is used in most common compliance frameworks, and Hyperproof can support additional compliance scenarios.This integration is built and supported by Hyperproof.
IBM Security
Tenable and IBM Security have a great partnership and continue to invest in our joint solutions. In addition to the joint value from integrations with Qradar, MaaS360, and Cloud Pak for Security, IBM selected Tenable as the recommended replacement for IBM QVM customers. Whether you choose to stay on-prem or move to the cloud, Tenable partners closely with IBM and can help you easily transition products to make the biggest impact for the least amount of effort. For more information, visit here.The integrations for The Tenable App for Qradar, MaaS360 and Cloud Pak for Security are built and supported by Tenable.The QRadar VM app is built and supported by IBM Security.
Illumio
Illumio consumes vulnerability data from Tenable to provide customers with visibility into vulnerable workloads, and their dependencies. This includes a view into the workloads with which the vulnerable system has communicated and the ability to search for workloads with which the vulnerable system is able to communicate. Illumio then enables customers to create automated security policy to limit what systems may communicate with the vulnerable system, providing a compensating control until the vulnerability can be patched.This integration is built and supported by Illumio.
Infoblox
Infoblox is the company that unites networking and security to deliver better performance and protection by providing visibility and control over who and what connects to your network and identifying threats through intelligent DNS.The integration of Infoblox IP Address Management (IPAM), Threat Defense, and SOC Insights with Tenable enhances vulnerability management by triggering vulnerability scans and assessments. This includes scanning new devices as they join the network or during incidents to identify and address compromised systems swiftly.By combining Infoblox’s and Tenable’s capabilities, this integration empowers organizations to:Improve Visibility: Gain a complete, real-time view of all network assets.Accelerate Threat Detection: Leverage DNS-based intelligence to detect and respond to vulnerabilities faster.Enable Automation: Reduce manual processes through automated workflows and data exchange.Together, Infoblox and Tenable ensure your organization stays ahead by identifying, prioritizing, and mitigating vulnerabilities efficiently and effectively.This integration is built and supported by Infoblox.
IntSights
IntSights provides enterprises with the only all-in-one External Threat Protection solution that enables security teams to gain visibility and control over threats outside the wire. The IntSights integration pulls vulnerability data from Tenable into the IntSights Risk Analyzer module to help find and mitigate external threats that directly target your organization.This integration is built and supported by Intsights.
Ivanti
Ivanti Neurons for RBVM ingests asset and vulnerability data from Tenable. That data is then continuously correlated with threat intelligence, business asset criticality, and pen test and research-based findings to measure risk and prioritize remediation activities. This integration lets you quickly arrive at a fully informed plan of attack for the highest-risk vulnerabilities identified by your Tenable products. The Tenable Vulnerability Management Integration with ITSM Enterprise enables your organization to consume Tenable vulnerabilities to create Security Events mapped to your Configuration Items (CIs). Once the Security Events are mapped, you can make decisions on how to proceed; whether tracking, ignoring, or a remediation chain of events. After the vulnerabilities are addressed and CIs are rescanned, the updated status will be sent back to ITSM to close the loop. The integration will increase coordination between IT and Security teams to ensure organizations have clear visibility to security threats.These integrations are built and supported by Ivanti.Tenable also supports an integration that connects MDM for EPMM & Neurons to pull mobile device information from Ivanti into Tenable's device inventory and enable vulnerability detection on identified mobile devices.This integration is built and supported by Tenable.
Jamf
Consolidate JAMF’s Apple device management data with broader risk insights for a comprehensive view of security risks across macOS and iOS devices in Tenable One.Tenable One Connectors are built and supported by Tenable.
Jenkins
Integrate your Jenkins pipeline with Tenable Cloud Security to 1) scan your infrastructure-as-code (IaC) pipeline for security issues, and 2) sync the code associated with your cloud resources to trace those resources back to their origins.This integration is built and supported by Tenable.
JetPatch
The JetPatch integration for Tenable allows Security and IT teams to simplify the remediation process and offer customers a complete vulnerability management solution. Given the sheer volume of new patches, it is paramount for customers to be able to execute remediation according to their Tenable Vulnerability data. This integration is built and supported by JetPatch.
JupiterOne
The JupiterOne integration with Tenable allows you to understand your attack surface by importing Tenable findings to navigate the relationships of all your cyber assets. Cloud resources, ephemeral devices, identities, access rights, code, pull requests, and much more are collected, graphed, and monitored automatically. Determine the blast radius for any attack vector and fast-track investigation and response with the ability to query and get results in less than 30 seconds.This integration is built and supported by JupiterOne.
K2
The integration between K2 Cyber Security and Tenable Web Application Scanning (WAS) provides a utility accessing Tenable's API to produce a single unified report detailing the vulnerabilities discovered by Tenable and K2 Security Platform. K2 appends details to the Tenable report, adding additional information on detected vulnerabilities, including the exact file name and line of code in the file where the vulnerability exists, enabling quicker remediation of the vulnerability in the code. K2 Cyber Security’s integration with Tenable can help organizations speed up their application deployment process by quickly locating and identifying the exact code location of discovered vulnerabilities discovered by Tenable WAS and the additional vulnerabilities found by K2 Security Platform, resulting in faster remediation.This integration is built and supported by K2.
Kenna
Kenna (formerly Risk I/O) takes in vulnerability scan results from Tenable Nessus to correlate with other assessment information to help customers prioritize issues.This integration is built and supported by Kenna.
Kion
The Tenable Security Center and Kion (formerly cloudtamer.io) integration gives customers a single destination to collect and act on cloud-centric compliance findings. Tenable Security Center retrieves vulnerabilities discovered within AWS accounts and creates a Kion compliance check. Findings from these checks display on the Kion compliance overview, centralizing efforts to detect, report, and remediate issues.This integration is built and supported by Kion.
Kovrr
Kovrr enables enterprises to financially quantify their cyber risk exposure, on-demand. We transform cyber security data from Tenable Vulnerability Management into financially quantified Cyber Risk Management Decisions (such as investments into Cyber Security Control and programs, Cyber Insurance, Capital Management, Board Reporting etc). The integration with Tenable Vulnerability Management utilizes data on a customer's assets, technologies, services, vulnerabilities and other cyber risk related information. Assets and vulnerabilities are imported through the Export Assets and Export Vulnerabilities API endpoints in Tenable Vulnerability Management, which are queried for data, and their permissions level.This integration is built and supported by Kovrr.
Legit Security
Legit ingests Tenable vulnerabilities to provide unified risk management, combining and correlating the vulnerability data with other 3rd party tools and Legit’s own code-to cloud context. Through this integration, customers get a single pane of glass for application risk, centralized policy management, risk scoring and context to help reduce noise and remediate issues fast.This integration is built and supported by Legit Security.
LinkShadow
LinkShadow Integrates with Tenable Security Center to get a risk-based view of the IT security to identify, investigate and prioritize vulnerabilities rapidly. This Integration empowers LinkShadow with high-end visibility on the vulnerable assets, user behavior and associated risk in your environment.This integration is built and supported by LinkShadow.
Liongard
DarkLight's Cyio automatically ingests Tenable Vulnerability Management assessment results without user involvement. Cyio identifies, quantifies, and prioritizes risks and assets based on threats, likelihood of exploitation, and the potential impact to your business. With the application of threat intelligence and industry-based best practices, Cyio customers remediate and navigate risks from a business-wide perspective or focus on a single device, network, or software.This integration is built and supported by DarkLight.
LogicGate
This integration, powered by LogicGate Risk Cloud™, allows organizations to ingest Vulnerabilities in a seamless and automated manner for proper mitigation of Cybersecurity Risk. A user will be able to link their organization’s Vulnerabilities identified by Tenable Vulnerability Management and Tenable Security Center to applicable Workflows in Risk Cloud to holistically manage the entire lifecycle of vulnerabilities from approvals, to treatment and to connect it to your broader GRC program. With this integration, an organization will be able to obtain a holistic view of their Threat Vectors in relation to their overarching GRC strategy. This integration is built and supported by LogicGate.
LogPoint
The LogPoint integration fetches vulnerability data from Tenable and combines the results with observations from other systems to provide actionable insight into your infrastructure’s security risks. The vulnerability reports allow you to quickly and accurately identify, investigate and prioritize vulnerabilities and misconfigurations in your IT environment.This integration is built and supported by LogPoint.
LogRhythm
LogRhythm empowers organizations on six continents to detect, respond to and neutralize damaging cyber threats rapidly. The LogRhythm platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments. Among other accolades, LogRhythm is positioned as a Leader in Gartner’s SIEM Magic Quadrant.This integration is built and supported by LogRythm.
ManageEngine
The Patch Manager Plus integration for Tenable Vulnerability Management and Tenable Security Center lets you import vulnerability and asset data, find appropriate patches and deploy the same through Patch Manager Plus to remediate the identified vulnerability.These integrations are built and supported by ManageEngine.
Matrix42
neo42 has developed the TenableConnector to close security gaps between Tenable Security Center and Matrix42 Enterprise Service Management. It uses thresholds to monitor the lifecycle of existing vulnerabilities and notifies those responsible in the event of a breach. neo42 provides IT consulting in the fields Enterprise Service Management, Unified Endpoint Management and Software Asset Management as well as implementation and subsequent support. neo42 is a long standing partner of Matrix42 and continuously develops clever solutions for the Matrix42 environment.This integration is built and supported by neo42.
McAfee
The joint solution offers visibility, security and control for industrial networks, enabling security professionals to effectively detect and mitigate threats to the safety, reliability and continuity of industrial processes.This integration is built and supported by Tenable.
Medigate
Medigate by Claroty exports detailed visibility contexts for connected IoT and IoMT devices on Healthcare Delivery Organizations' Networks and correlates this visibility data to assets managed by Tenable Vulnerability Management. Medigate by Claroty also ingests Tenable's vulnerability data for connected assets and present this information consolidated with Clinical vulnerabilities and risk assessment for all hospital's connected devices on Medigate by Claroty's dashboard. This allows Tenable's and Medigate by Claroty's mutual customer to better assess risk and prioritize remediation and mitigation steps for connected medical devices and IoT in the clinical setting.This integration is built and supported by Medigate by Claroty.
MetricStream
The MetricStream IT & Cyber Risk integration with Tenable Security Center provides a single system to automatically monitor and capture all asset and network vulnerabilities, and route them through a systematic process of investigation and remediation. With the joint system, IT security managers will be able to accelerate the identification, prioritization, and remediation of vulnerabilities, thereby proactively reducing their cyber risk.This integrations is built and supported by MetricStream.
Microsoft
Tenable and Microsoft have several integrations to support joint customers in securing their organizations. These integrations span across Microsoft Azure, Microsoft Sentinel, Azure Security Center and more. Combine Tenable insights with your Microsoft systems to increase overall security, gain efficiency, track changes, and more.For more information, please check out Integration Details below.These integrations are built and supported by Tenable.
Noetic Cyber
The Noetic Cyber integration for Tenable imports the vulnerability scan information, including assets identified by Tenable and the vulnerabilities detected on each asset, with description and severity. Noetic correlates and aggregates this data with other security and IT data sources, including EDR, CMDB, Cloud and network to build a comprehensive view of all assets, vulnerabilities and relevant business context in graph database. The connector also includes a workflow to initiate a scan against single or multiple hosts.This integration is built and supported by Noetic.
Nucleus
Nucleus unifies your Tenable scans with the rest of your vulnerability and security data, correlating and enriching scan results alongside other business context and intelligence tools, allowing you to see the entire picture unique to your environment. Once identified and prioritized, users can automate workflows to act on the information, seeing risks through to remediation while tracking all inputs along the way.This integration is built and supported by Nucleus.
Nutanix
Tenable integrates with Nutanix to enumerate virtual environments during scans to collect host software versions, assisting with patch management and vulnerability detection.This integration is built and supported by Tenable.
Offensive Security Manager (OSM)
The Offensive Security Manager (OSM) platform enhances Tenable by ingesting its exposure data to AI-powered OSM Agent. OSM ingests Tenable findings to OSM Agentic AI Platform to enable agentic AI cyber security operation in customer environment. This integration preserves Tenable as the authoritative data source, and exposure assessment layer while OSM acts as the AI Powered Agent layer that improves operational efficiency.This integration is built and supported by Kuzey.
OneLogin by One Identity
Integrate your OneLogin account with Tenable Cloud Security to reveal a complete inventory of OneLogin groups and users in your environment.This integration is built and supported by Tenable.
Onyxia
Tenable integrates with Onyxia's Cybersecurity Management Platform to enable organizations to effectively measure and manage their vulnerability and risk exposure and connect it with business goals. With Onyxia, users can leverage AI and predictive insights to make data-driven decisions to significantly improve their security posture and reduce potential threats that can damage their organization.This integration is built and supported by Onyxia.
Opscura
By using Opscura's drop-in solution with Tenable, organizations can dramatically cut deployment times, capturing all of the devices and data in the network without re-architecting or adding new wires.Opscura's segmentation capabilities enable companies to take immediate action based on Tenable findings, expanding from Tenable's world class visibility and detection into protection as well.This integration is built and supported by Opscura.
Orca Security
Consolidate Orca’s cloud security data with broader risk insights for a comprehensive view of security risks across cloud environments in Tenable One.Tenable One Connectors are built and supported by Tenable.
Ordr
Ordr Systems Control Engine (SCE) automatically discovers and accurately classifies every network-connected device across the enterprise. Ordr SCE integrates with Tenable Vulnerability Management and Tenable Security Center asset groups, allowing Tenable to scan or exclude devices based on their classification and unique sensitivities. Enterprise and healthcare organizations can utilize these scan results to assess vulnerabilities and generate comprehensive policies to regulate and protect connected devices for using existing network and security infrastructure.This integration is built and supported by Ordr.Consolidate Ordr's OT asset and risk data with broader risk insights for a unified exposure view in Tenable One.Tenable One Connectors are built and supported by Tenable.
Owl Cyber Defense Solutions, LLC
Tenable and Owl work together to pass needed data while ensuring diode-based air-gaps between networks. A Tenable OT Security sensor is located on the critical/OT network and forwards captured traffic to Tenable OT Security, which resides outside of your OT network. Owl separates the two networks, but sensor to ISP traffic can securely pass through it.This integration is built and supported by Tenable.
Ox Security
OX’s integration with Tenable enables teams to move from cloud exposure visibility to developer-driven remediation. Tenable Cloud Security findings are unified with OX’s code-to-cloud asset graph to correlate vulnerabilities, misconfigurations, and permission risks to the originating service, repository, and code owner. Risks are validated using reachability and exploitability analysis and automatically delivered into developer workflows with full context, enabling prioritized action and faster remediation.This integration is built and supported by Ox.
Palo Alto Networks
ICS asset information collected by Tenable OT Security is sent to the Palo Alto Networks firewall Dynamic Asset Group (DAG) so policies can be set and updated with the benefit of accurate asset identification and categorization.This integration is built and supported by Tenable.
Ping Identity
Integrate your Ping Identity environment with Tenable Cloud Security to reveal a complete inventory of Ping Identity groups and users in your environment.This integration is built and supported by Tenable.
PlexTrac
Bring your Tenable data into PlexTrac via hourly syncs to aggregate with the rest of your pentest, offensive assessment, and scanner data for streamlined reporting, remediation tracking, and further analysis. Optionally, configure multiple Tenable integrations at either the client or departmental level. Identify underlying issues within your aggregated data and prioritize based on business risk by applying a configurable contextual scoring equation. This integration is built and supported by PlexTrac.
Plixer
The integration between Tenable Vulnerability Management and Plixer combines Tenable's vulnerability insights with with managed and unmanaged (IoT) device discovery, profiling and network traffic analytics data from Plixer’s Network Detection and Response (NDR) solution. The integration also allows customers to view Tenable information on a specific device from the UI of the Plixer platform.This integration is built and supported by Plixer.
Prisma™ Cloud
Prisma Cloud is a comprehensive cloud native security platform with the industry’s broadest security and compliance coverage—for applications, data, and the entire cloud native technology stack—throughout the development lifecycle and across multi and hybrid cloud environments. Prisma Cloud's integrated approach enables security operations and DevOps teams to stay agile, collaborate effectively and accelerate cloud native application development and deployment securely. Integrate Prisma with Tenable Cloud Security to gain an additional layer of contextual insights into your data resources. For example, you can see at-risk identities that have access to sensitive data.This integration is built and supported by Palo Alto Networks.Consolidate Prisma Cloud's cloud resource-type assets and risk data with broader risk insights for a unified view of cloud exposure in Tenable One.Tenable One Connectors are built and supported by Tenable.
ProfiTAP
By combining Network TAPs and Packet Brokers, Profitap provides precise and optimized access to network traffic for OT security. This best-practice approach streamlines data delivery to the Tenable ICP, reducing bottlenecks and enhancing visibility.This integration is built and supported by ProfiTAP.
Purplemet
Consolidate Purplemet’s website-type assets and risk data with broader risk insights for a comprehensive view of security risks across environments in Tenable One.Tenable One Connectors are built and supported by Tenable.
Qi An Xin
Tenable’s integration with Qi An Xin streamlines privileged access to use in credentialed vulnerability scans which provides a more comprehensive understanding of your cyber exposure.This integration is built and supported by Tenable.
Qmulos
This integration ingests configuration scan results and other log data from Tenable Security Center to populate dashboards in Qmulos’ Q-Compliance product. Q-Compliance is an integrated risk management solution powered by Splunk that provides a data-driven approach based on real-time events collected from the IT assets of the enterprise to automatically assess your risk and compliance posture at scale. Using this integration, organizations can use data from Tenable Security Center to continuously monitor and assess the effectiveness of their security controls that have been implemented with Tenable Security Center.This integration is built and supported by Qmulos.
Qualys
Consolidate Qualys’ IT and web app assets and vulnerability data with broader risk insights for a unified exposure view in Tenable One.Tenable One Connectors are built and supported by Tenable.
Reciprocity Labs
The Tenable Vulnerability Management Connector for ZenGRC automatically pulls Tenable data into ZenGRC to serve as evidence that your vulnerability identification and remediation program is operating effectively. By removing your compliance team's reliance on Tenable admins to provide this evidence, the Tenable Vulnerability Management Connector for ZenGRC reduces audit fatigue for everyone involved in the evidence collection process and allows both your compliance and your security operations teams to stay focused on what they do best.The integration is built and supported by Reciprocity Labs.
Recorded Future
The Recorded Future integration with Tenable Vulnerability Management simplifies and enhances vulnerability management by automating the population of vulnerability watchlists directly from Tenable scan results. This integration eliminates manual effort, enabling security teams to track, prioritize, and respond to critical vulnerabilities efficiently. Users can filter vulnerabilities by severity, state, source, and scan folder, ensuring that key threats are identified and addressed proactively.This integration is built and supported by Recorded Future.
Red Hat
Tenable integrates with Red Hat® Satellite to correlate patch status reported by Red Hat and Red Hat® OpenShift® to detect misconfigurations in the environment. Tenable also integrates with Ansible to empower joint customers to respond to vulns with automated processes.These integrations are built and supported by Tenable.Consolidate Red Hat Insights' asset and risk data in Tenable One.Tenable One Connectors are built and supported by Tenable.
RedSeal
Automatically export Tenable vulnerability and compliance violation findings into the RedSeal cybersecurity analytics platform to correlate vulnerable system data with RedSeal access path data for issue remediation prioritization.This integration is built and supported by RedSeal.
RegScale
RegScale’s integration with Tenable Vulnerability Management intelligently manages the entire vulnerability lifecycle, from investigation to remediation to continuously updating documentation. RegScale allows security and GRC teams to track whether their controls are effective for zero-day vulnerabilities, measure how well vulnerabilities are being addressed, reduce audit fatigue around evidence collection, and enable development, compliance, and security teams to work better together. Integrating RegScale with Tenable increases visibility and communication across the entire organization without the need for human intervention or direct staff access to critical systems, facilitating faster and more seamless vulnerability management.This is integration is built and supported by RegScale.
Rezilion
The Rezilion integration for Tenable allows customers to understand which vulnerabilities discovered by Tenable are exploitable in the specific runtime context of their environment. The Rezilion platform ingests vulnerability findings from Tenable and takes this feed to validate which vulnerabilities are associated with components that are loaded in memory and are actually exploitable.This integration is built and supported by Rezilion.
RHD VM (ALFA Group)
RHD VM's integration with Tenable enhances the governance of Infrastructure and Application Vulnerabilities Lifecycle Management by adding an efficient remediation process, which can be readily customised according to specific needs. Through the enrichment of assets and vulnerabilities with business context and Threat Intelligence data, the integration helps security teams with remediation activities.This integration is built and supported by by ALFA Group.
Ridge Security
RidgeBot® integrates with Tenable VM to continuously validate vulnerability findings—reducing false positives, providing actionable reports, prioritizing remediation efforts toward exploitable vulnerabilities and accelerating remediation to minimize breach exposure.This integration is built and supported by Ridge Security.
RiskRecon
Consolidate RiskRecon’s risk assessment data with broader risk insights for a comprehensive view of cybersecurity risks from external vendors and website assets in Tenable One.Tenable One Connectors are built and supported by Tenable.
RSA
The interoperability between Tenable OT Security and RSA NetWitness provides customers with a seamless solution to collect, analyze and report on all activity helping to reduce the time it takes to identify security related issues within your IT and OT network infrastructure including industrial controller and device activity, who accesses files, what privileged user activity takes place, and which potential threats exist on your devices and in your network.This integration is built and supported by Tenable.
runZero
runZero's Tenable Security Center integration helps customers gain more value by empowering customers to better prioritize risks with a combination of vulnerability data and a comprehensive asset inventory. The integration sheds light on asset and network context for vulnerabilities and allows organizations to respond quicker. Deploy runZero and the integration with Tenable Security Center easily! This integration is built and supported by runZero.
Safe Security
SAFE collects cyber security findings from Tenable Vulnerability Management and other tools to help organizations quantify their cyber risk in dollar terms. This helps organizations get visibility of their overall cyber risk, leveraging their existing tools and plan appropriate risk reduction strategies based on the financial ROI.This integration is built and supported by Safe Security.
SafeBreach
Integrating the Tenable Vulnerability Management solution with SafeBreach enables vulnerability scans to be correlated with attack simulation results to identify and prioritize vulnerabilities that are exploitable across your enterprise. Fix the vulnerabilities that pose the biggest business risk and focus your remediation on the areas that have the highest risk of exploitation by attackers. Run the attack simulations after remediation efforts to close the loop and ensure that vulnerabilities have been eliminated.This integration is built and supported by SafeBreach.
SaltStack
Automatically import vulnerability data from Tenable Vulnerability Management into SaltStack Protect to quickly remediate critical vulnerabilities and reduce Cyber Exposure from security vulnerabilities.This integration is built and supported by SaltStack.
SecurityGate.io
SecurityGate.io’s integration with Tenable Security Center provides an asset inventory view for all entities within client’s organization. The integration streamlines the vulnerability management process and provides a holistic view of assets, network activity, and events allowing an analyst to prioritize remediation and minimize risk.This integration is built and supported by SecurityGate.io.
SecurityScorecard
Consolidate supply chain asset and risk data from SecurityScorecard with broader risk insights for a unified exposure view in Tenable One.Tenable One Connectors are built and supported by Tenable.
Seemplicity
The Seemplicity integration for Tenable unifies your vulnerability data from Tenable with other security data to automate actionable connections between vulnerability findings and remediation teams that can be verified and measured. Shorten the time-to-remediation and backlog queue by using remediation queues, customized severity, prioritization, and SLA's. This integration is built and supported by Seemplicity.
senhasegura
The senhasegura PAM Core integrated with Tenable enables customers to reduce their attack surface, meet regulatory compliance requirements with simplified management of privileged access. This integration is built and supported by Tenable.
SentinelOne
Consolidate SentinelOne’s endpoint asset and risk data with broader risk insights for a complete exposure view in Tenable One.Tenable One Connectors are built and supported by Tenable.
ServiceNow
Together, Tenable and ServiceNow Security Operations bring common visibility to organizations by automatically discovering IT, Cloud, OT and IoT assets, continually assessing these systems for vulnerabilities, linking vulnerabilities with the asset’s business criticality, and prioritizing issues based on this data to accelerate remediation. Joint customers can run automated workflows to solve their most vulnerable items first, saving time and reducing potential exposure related to the vulnerability. In addition, integrations can trigger an automatic re-assessment of the asset to provide validation that the issues were sufficiently resolved, creating a complete, closed-loop remediation process.Tenable for ITSM, Service Graph Connector for Tenable and Tenable One Connectors are built and supported by Tenable. Vulnerability Response Integration with Tenable (integrates with Tenable Vulnerability Management, Tenable Security Center, Tenable Web App Scanning and Tenable Cloud Security) is built and supported by ServiceNow.
Siemens Energy
Tenable and Siemens have formed a strategic partnership to help energy, utilities and oil and gas companies with a new solution for industrial asset discovery and vulnerability management. Tenable OT Security provides safe, reliable asset discovery and vulnerability detection purpose-built for industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. Using passive network monitoring based on Tenable’s Nessus Network Monitor, designed for critical systems which require a non-intrusive approach to vulnerability detection, the OT-native solution helps identify and prioritize OT risks so organizations can keep safety-critical production assets secure and fully functional. Delivered by Siemens as a security service, Tenable OT Security helps customers understand the state of their assets at all times, providing them with the information they need to quickly and confidently assess, understand and ultimately reduce their cybersecurity risk.
Skyhawk
Skyhawk’s integration with Tenable enriches Tenable Vulnerability Management with Skyhawk’s adversary analysis for efficient preemptive unified vulnerability management. In the era of AI autonomous and accelerated attacks, Skyhawk is able to focus customers on the 1% of risk that matters the most.This integration is built and supported by Skyhawk.
Slack
Integrate your Slack workspace with Tenable Cloud Security to send notifications to Slack channels when specific findings are created in Tenable Cloud Security, and as part of the Just-in-Time (JIT) workflow to allow users to easily request/approve access natively via Slack.This integration is built and supported by Tenable.
Snowflake
Organizations use Snowflake's Data Cloud to unite siloed data, discover and securely share data, and execute diverse analytic workloads across multiple clouds and geographies. With Tenable One and Snowflake, customers can easily centralize all vulnerability and threat data in one place to unlock a holistic view of their entire attack surface and glean actionable insights with out-of-the-box dashboards and risk scoring. Tenable One is Powered by Snowflake and delivers a truly scalable, global exposure management platform to help customers prevent likely attacks, and accurately communicate cyber risk to support optimal business performance.
Splunk
Tenable® is Splunk's strategic vulnerability management provider and an Elite Build partner. The Tenable® integrations with Splunk combine Tenable’s Exposure insights with Splunk’s correlation capabilities for complete visibility into all assets across the modern attack surface and their potential vulnerabilities, misconfigurations and unpatched components in a unified threat detection, investigation, and response single analytics platform. The integrations for Splunk Enterprise is built and supported by Tenable.The integration for Splunk SOAR is built and supported by Splunk.
ST Engineering
By integrating ST Engineering with Tenable OT Security, you can trust that your internal and critical network is physically inaccessible from your external network while Tenable OT Security monitors your sensitive network.This integration is built and supported by ST Engineering.
Stellar Cyber
Together Starlight and Tenable are working seamlessly through tight integration delivering on the promise to help security analysts scale through automation. The integration enables ingestion of Tenable Vulnerability Scanning data which is stored in Starlight's data lake for historical analysis, search, investigation and response. Starlight's Asset Management application dynamically discovers and manages assets from Tenable scanning results and automatically correlates the vulnerabilities of an asset, if any, with other security events discovered. Starlight raises the risk score of an asset with information from its own security events as well as the Tenable vulnerability scanning results, providing a single pane of glass for visibility of assets, their vulnerability and related security postures.This integration is built and supported by Stellar Cyber.
Sumo Logic
Sumo Logic's support for ingestion of Tenable vulnerability data can now be automatically normalized in Cloud SIEM, allowing real-time correlation of Tenable vulnerabilities against other security events. Additionally, asset information can be automated to enrich the security incident response process in Cloud SOAR. Cloud SOAR simplifies the automation and orchestration of vulnerability scans and incident response processes.This integration is built and supported by Sumo Logic.
Superna
Superna introduces Data Attack Surface Management (DASM), an integration with Tenable Vulnerability Management and Tenable Security Center —an advanced solution that transforms how organizations assess and mitigate data risks. By integrating vulnerability intelligence with real time user data access behavior, classification of sensitive data, Data overexposure and Data Recovery protection DASM provides a holistic view of the data attack surface, enabling security teams to proactively address high-risk hosts and users before threats escalate. Superna's intelligent data risk scoring empowers organizations to identify the most vulnerable endpoints, take targeted security actions, and reduce their overall data attack surface—ensuring proactive threat mitigation for critical data assets.This integration is built and supported by Superna.
Swimlane
Swimlane automates time-intensive, manual processes and operational workflows to deliver powerful, consolidated analytics, real-time dashboards and reporting from across your security infrastructure. Over-burdened and understaffed security operations are able to maximize their incident response capabilities and reduce risk by utlizing Swimlane and Tenable together.This integration is built and supported by Swimlane.
Symantec (A Broadcom Company)
Tenable integrates with both Risk Fabric and Altiris products. Risk Fabric integrates vulnerability and threat data from Tenable solutions to help prioritize critical vulnerabilities and user-driven exposures to provide automated remediation recommendations. Altiris integrates to correlate patch status reported by Symantec with Tenable vulnerability data to help organization identify inconsistencies in their patching programs.This integration is built and supported by Tenable.
Synack
Synack’s integration with Tenable Vulnerability Management imports Tenable scanning results into the Synack PTaaS Platform. Triage of scan results in the Synack Platform guides security testing by the Synack Red Team, delivering detailed exploitability analysis, remediation recommendations, and patch verification.This integration is built and supported by Synack.
Synqly
Synqly delivers the first on-demand product integration platform for security and infrastructure vendors.This integration is built and supported by Synqly.
ThreatConnect
Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect’s Intelligence-Powered Security Operations (IPSO) platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Centralize your intelligence, establish process consistency, scale operations, and measure your effectiveness in one place with the Tenable Security Center integration.ThreatConnect Risk Quantifier (RQ) enables organizations to automate cyber risk quantification.With the Tenable Vulnerability Management integration, you can quickly and easily ingest your organization’s assets and vulnerability management data to identify, quantify, and prioritize CVE’s based on financial risk exposure and leverage enhanced vulnerability management data from Tenable to get CVE remediation recommendations based on financial exposure to the organization.The integrations are built and supported by ThreatConnect.
ThreatNG
The Tenable and ThreatNG integration facilitates continuous visibility of assets outside the perimeter by importing them into Tenable Vulnerability Management for further action, prioritization, and remediation. ThreatNG is a configurable solution that empowers organizations of all types and sizes to uncover, understand, manage, and quantify (via grading/scoring) their external digital footprint comprised of technical and business attack surface elements. This includes digital assets like Cloud Exposure, Code Exposure, Subdomains, and more with a configurable risk score for self-monitoring and third parties.This integration is built and supported by ThreatNG.
ThreatQuotient
ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform. By ingesting Tenable's rich Cyber Exposure data, ThreatQuotient accelerates and simplifies investigations and collaboration within and across teams and tools. Through automation, prioritization and visualization, ThreatQuotient’s solutions reduce noise and highlight top priority threats to provide greater focus and decision support for limited resources.This integration is built and supported by ThreatQuotient.
Tines
Tines partnership with Tenable enables customers to remediate vulnerability alerts from Tenable. Tines ingests your vulnerability alerts then deduplicates the alerts, enriches them with information from across your architecture, creates a ticket in your system with all the information, then, when complete, runs a final scan to confirm remediation. Together, Tines and Tenable offer visibility into vulnerabilities and the ability to remediate them effectively.This integration is built and supported by Tines.
Torq
Integrate Tenable Cloud Security with Torq to orchestrate and automate remediation of security findings of AWS, Microsoft Azure and Google Cloud.The integration is built and supported by Torq.
Trellix
Trellix XDR leverages Tenable Vulnerability Management’s industry-leading asset risk analysis capability by seamlessly connecting Tenable Vulnerability Management with Helix. This powerful combination raises alert levels in Helix based on this deep asset knowledge so analysts catch what they might otherwise have missed.This integration is built and supported by Trellix.
Trend Micro
The integration with TrendAI Vision One™ ingests vulnerability and asset exposure findings from Tenable into the Vision One platform, where they are correlated with threat, attack path, and behavioral telemetry. This enables security teams to contextualize vulnerabilities by real‑world risk, prioritize remediation based on exploitability and asset criticality, and manage exposure from a single, unified risk view.This integration is built and supported by Trend Micro.
Tromzo
Tromzo consolidates vulnerability and asset data from various Tenable and other security scanners across your environment into a single, centralized platform. This data is continuously enriched with real-time business and ownership context, enabling you to identify critical risks, assign ownership, and automate remediation workflows. With the Tenable integration into Tromzo, you can focus on addressing the most significant risks to your organization.This integration is built and supported by Tromzo.
Tufin
The Tufin integration with Tenable analyzes user-selected network segments for asset vulnerabilities with existing access containing the service/protocol that makes them a candidate for exploitation. Vulnerability information from Tenable Vulnerability Management and Tenable Security Center is made available in the vulnerable asset profiles in Tufin that are used to determine the patches that are required to remediate. The context provides users with the ability to design mitigating controls or initiate access change requests to prevent the exploitation of a vulnerable and accessible asset.This integration is built and supported by Tufin.
Vanta
The integration between Tenable and Vanta helps mutual customers streamline their compliance process and understand their security posture. Tenable's vulnerability data is pulled into Vanta to ensure your company stays in compliance and meets the established SLAs.This integration is built and supported by Vanta.
Vector0
Vector0's DarkWave Attack Surface Management platform integrates with Tenable Vulnerability Management to provide customers with a holistic view of all assets and vulnerabilities discovered by Tenable Vulnerability Management. In addition, DarkWave routinely checks customers' Tenable Vulnerability Management instance for new and changed data and leverages that to automatically mark items as remediated, resurface vulnerabilities that have been reintroduced, and even automates the reduction of false positives. Combining that data with DarkWave's asset discovery, monitoring, and scanning technology further enhances customers' view of their overall attack surface, allowing them to make strategic decisions that will significantly impact their overall security posture.The integration is built and supported by Vector0.
Veracode
Consolidate dynamic application security testing data (DAST) with broader risk insights for a comprehensive view of application risk in Tenable One.Tenable One Connectors are built and supported by Tenable.
Visium
Visium’s Integration with Tenable enables context-based threat awareness benefits of CyGraph – quickly and intuitively understand threats, root causes and mitigation steps in real-time. The CyGraph API connector for Tenable automatically and continuously ingests Tenable data displaying critical information to save money and protect digital reputations. By combining CyGraph with the asset, and vulnerability information from Tenable, users are better able to assess relationships between nodes and applications for risk monitoring and mitigation.This integration is built and supported by Visium.
VMware
Tenable integrates with VMware vCenter and vSphere to enumerate virtual environments during scans to collect host software versions, assisting with patch management and vulnerability detection.This integration is built and supported by Tenable.
W@tchtower
W@tchTower integrates with Tenable Security Center to bring your vulnerability data into The W@tchtower Platform, relate it to other key information like IOCs and make it available in interactive investigation tools, incident tickets, workflows and dashboards. With W@tchTower and Tenable together, you can readily prioritize vulnerability patching according to the threats you are currently facing.This integration is built and supported by W@tchtower.
WALLIX
The WALLIX Bastion PAM solution integrated with Tenable enables customers to reduce their attack surface, meet regulatory compliance requirements with simplified management of privileged access.This integration is built and supported by Tenable.
Waterfall Security
By integrating Waterfall USG with Tenable OT Security, you can trust that your internal and critical network is physically inaccessible from your external network while Tenable OT Security monitors your sensitive network.This integration is built and supported by Tenable.
Wiz
This integration enhances vulnerability management by giving you deeper visibility into how vulnerabilities relate to specific assets, helping to create a Unified Vulnerability Management view of your attack surface across any type of infrastructure - Cloud and On-prem, and improving your overall security posture. Wiz will retrieve vulnerabilities from Tenable to provide CVE-based vulnerabilities found across scanned assets and assets from Tenable to capture asset data from scans, including endpoints, servers, and network devices.This is built and supported by Wiz.Tenable builds and supports Tenable One Connectors to consolidate data across security vendors for a holistic, unified view of risk across your entire attack surface. Currently, we support Wiz CSPM, Wiz Issues and Wiz Vulnerability Management
XM Cyber
XM Cyber's integration with Tenable Vulnerability Management extends the power of Tenable Vulnerability Management's ecosystem by providing the critical assets that are defined in XM Cyber APM, and the choke points XM Cyber APM exposes. At the same time, XM Cyber APM's Vulnerability Management module is enriched with Tenable's vulnerabilities. The integration between XM Cyber and Tenable Security Center offers CxOs powerful and effective visibility along with compliance validation and controls, to secure and monitor Tenable Security Center. This integration is built and supported by XM Cyber.
Tenable One
Request a demo
The world’s leading AI-powered exposure management platform.
Thank You
Thank you for your interest in Tenable One.
A representative will be in touch soon.
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success