Your Role
Cyber Security Leader, Risk Management Leader, Security Director
Cyber Security Practitioner and Leader
Cyber Security Leader and Practitioner
Cloud and Cyber Security Architects and Leaders, Risk Management Practitioners, Compliance Practitioners
Consultant, Penetration Tester
Cyber Security Practitioner and Leader
Cyber Security Leaders, Active Directory Leaders, Compliance Practitioners
Cyber Security (IT/OT) or Compliance Practitioner and Compliance
Use Case
Continuous Exposure Management
Continuous Vulnerability Management
Calculate, Communicate & Compare Your Cyber Exposure
Cloud Security Posture and Vulnerability Management, Risk Management, Compliance
Periodic Vulnerability Assessment
Continuous Vulnerability Management
Active Directory Security
OT Security, IT/OT Convergence, Risk Management, Compliance
Deployment Type
Cloud-managed
Cloud-managed
Cloud-managed
Cloud-managed
On-prem
On-prem
Cloud or On-prem
On-prem
Number of Assets
1,000,000s of Assets
1,000,000s of Assets
1,000,000s of Assets
1,000,000s of Assets
1,000s of IPs
100,000s of IPs
100,000s of Objects
1,000’s Per Monitoring Device
Type of Assets
Traditional IT, Cloud, Containers, Web Apps, Mobile, Identity Systems, Internet-facing Assets
Traditional IT, Mobile, Public Cloud, Web Apps, Docker Containers
Traditional IT, Mobile, Public Cloud
Cloud, IaC, Images, Kubernetes, Containers, Virtual Machines
Traditional IT
Traditional IT, Operational Technology, Mobile
All AD Objects
Industrial Control System Assets (PLC, DCS, IED, HMI, SCADA and more)
Data Collection Sensors
Active Scanning, Agent Scanning, Passive Network Monitoring, Web App Scanning, Public Cloud Connectors, Docker Image Inspection, Agentless Assessment, Domain Scanning, Active Directory Assessment
Active Scanning, Agent Scanning, Passive Network Monitoring, Public Cloud Connectors
Utilize Scans from Tenable.sc and Tenable.io
Pulic Cloud Connectors, Agentless Assessment, Cloud Security Posture Scanning, Docker Image Inspection, CICD Connectors, Source Code Management Connectors, Kubernetes Connectors.
Active Scanning
Active Scanning, Agent Scanning, Passive Network Monitoring
Agentless, Passive Scanning, Active Directory Assessment
Passive Monitoring, Active Querying
Vulnerability Prioritization
CVSS, Cyber Exposure Scores (CES), Vulnerability Prioritization Rating (VPR), Asset Criticality Rating (ACR), Attack Path Analysis, Recommended Solutions
CVSS, Vulnerability Priority Rating (VPR)
Cyber Exposure Scores (CES), Vulnerability Prioritization Rating (VPR), Asset Criticality Rating (ACR), Assessment Maturity Scoring, CVSS
CVSS, Vulnerability Priority Rating (VPR), Asset Criticality Rating (ACR)
CVSS
CVSS, Vulnerability Priority Rating (VPR)
CVSS, Vulnerability Priority Rating (VPR), Asset Criticality Rating (ACR), MITRE, ATT&CK
CVSS, CVE, VPR through integration with tenable.sc
Platform Functionality
Unified Visibility of Assets and Vulnerabilities, Flexible Asset-based License, Customized Reporting & Dashboards, Scan Policy Management, Group & Role-Based Access, Asset Management, Continuous Monitoring, Cyber Exposure Scoring & Trend Analysis, Internal & External Benchmarking, Score By Business Context, Asset Criticality Analysis, Cyber Exposure Reduction Scoring
Customized Reporting & Dashboards, Scan Policy Management, Group & Role-based Access, Asset Management, Continuous Monitoring
Cyber Exposure Scoring & Trend Analysis, Internal & External Benchmarking, Score By Business Context, Asset Criticality Analysis, Cyber Exposure Reduction Scoring
Cloud Security Policy Scanning & Enforcement, Agentless Vulnerability Scanning, Compliance Reporting, Cloud Asset Discovery, IaC Scanning and Auto-remediation, CICD scanning, Source Code Management Repositoty Scanning, Alerting, Ticketing
Basic Customized Reporting
Customized Reporting & Dashboards, Scan Policy Management, Group & Role-based Access, Asset Management, Continuous Monitoring, Host Activity Analytics, Anomalous Behavior Analytics
Discovers, and scores existing weaknesses, uncovers and eliminates AD attack paths, and detects ongoing attacks
Single Pane of Glass Visibility, Threat Detection and Mitigation, Asset Tracking, Vulnerability Management, Configuration Control
Regulatory & Compliance Reporting
Configuration Compliance Audits, SCAP and OVAL Audits, PCI DSS Approved Scanning Vendor (ASV), Cloud Compliance Assessments
Configuration Compliance Audits, SCAP and OVAL Audits, PCI DSS Approved Scanning Vendor (ASV)
From Tenable.io and Tenable.sc
Over 20 industry standards and compliance benchmarks supported including CIS, SOC2, NIST, GDPR, HIPAA
Configuration Compliance Audits, SCAP and OVAL Audits, Unofficial PCI DSS Audits
Extensive Policy and Compliance Reports with Pre-defined Checks Against Industry Standards and Regulations
Policy and Compliance Reports
NERC, NIST, NIS, AWIA
Third-Party Integrations
Pre-built Integrations, Open APIs and SDKs for Custom Integrations
Pre-built Integrations, Open APIs and SDKs for Custom Integrations
Pre-built Integrations
Pre-built Integrations
Report Export API
Pre-built Integrations, Open APIs and SDKs for Custom Integrations
Pre-built Integrations, Open APIs
Pre-built Integrations