Your role
Network security leadership, risk management, leadership, security supervisor
Network security professionals and competent
Network security executives and professionals
Architects and leaders in the cloud and network security practitioner practitioners, compliance and risk management
Consultants and penetration testers
Network security professionals and competent
Network security leaders, leaders Active Directory, compliance professionals
Network security (IT/OT) or compliance professionals and compliance
Use cases
Management of continuous exposure
Continuing vulnerability management
Calculation, and compare the network security risk
Cloud security and vulnerability management, risk management and compliance
Vulnerability assessment on a regular basis
Continuing vulnerability management
The Active Directory security
OT safety, IT/OT fusion, risk management and compliance
Deployment type
The cloud management
The cloud management
The cloud management
The cloud management
local
local
Cloud or local
local
Number of assets
Millions of scale of assets
Millions of scale of assets
Millions of scale of assets
Millions of scale of assets
Thousands of magnitude IP
Hundreds of magnitude IP
100000 objects
Each monitoring device of 1000
Asset types
Traditional IT, cloud, container, Web applications, mobile, identity system, oriented to the assets of the Internet
Traditional IT, mobile assets, public clouds, Web applications, Docker containers
Traditional IT, mobile assets, public clouds
Cloud, IaC, image, Kubernetes, containers, virtual machine
Traditional IT
Traditional IT, operation technology and mobile assets
All AD object
Industrial control systems assets (PLC, DCS, IED, HMI, SCADA, etc.)
Data acquisition sensor
Active scanning, scanning agent, passive network monitoring, Web application scan, a public cloud connectors, Docker image inspection, no agency assessment, field scanning, Active Directory evaluation
Active scanning, scanning agent, passive network monitoring, public cloud connector
Using the Tenable. Sc and Tenable. IO scan results
Public cloud connector, no agency assessment, cloud security situational scanning, Docker image examination, CICD connector, connector, Kubernetes source code management.
Active scanning
Active scanning, scanning agent, passive network monitoring
No agent, passive scanning, Active Directory
Passive monitoring, active inquiry
Bug priority analysis
CVSS, Cyber Exposure score (CES), vulnerability rating priority (VPR), asset importance ratings (ACR), attack path analysis, the suggested solutions
CVSS, vulnerability rating priority (VPR)
Cyber Exposure score (CES), vulnerability rating priority (VPR), asset importance ratings (ACR), evaluation of maturity score and CVSS
CVSS, vulnerability rating priority (VPR), asset importance ratings (ACR)
A: CVSS
CVSS, vulnerability rating priority (VPR)
CVSS vulnerability priority rating (VPR), assets importance ratings (ACR), MITRE, ATT&CK
With the tenable. Sc integration get CVSS, CVE, VPR
Platform function
The unity of the assets and loopholes visibility, flexible asset-based license, custom report and dashboard, scanning strategy management, the group and role based access, asset management, continuous monitoring, Cyber Exposure score and trend analysis, internal and external benchmarking, according to the business environment rating, asset importance analysis, Cyber Exposure to reduce the score
A custom report, scanning strategy management, based on the group and the control panel access and jobs, asset management, continuous monitoring
Cyber Exposure score and trend analysis, internal and external benchmark, according to business background score, asset importance analysis, Cyber Exposure to reduce effect of grading
Cloud security strategy, it scans and execution, vulnerability scanning agent, compliance reporting, cloud assets, IaC scanning and automatic restoration, CICD scanning, scanning the source code management repository, alarm, work order
Based on the custom reports
Custom reports, scanning strategy management, based on the group and the control panel and access, asset management, continuous monitoring and host activity analysis, abnormal behavior analysis
Found existing weaknesses and rate, and eliminate the AD attack paths, and detection of sustained attack
A single management platform visibility, threat detection and protection, asset tracking, vulnerability management, configuration control
Regulatory and compliance report
Configuration compliance review, SCAP and OVAL, scanning PCI DSS authorized service providers (ASV), cloud compliance evaluation
Configuration compliance review, SCAP and OVAL, scanning PCI DSS authorized service providers (ASV)
From Tenable. IO and Tenable. Sc
Support for more than 20 industry standards and compliance, including CIS, SOC2, NIST, GDPR, HIPAA
Configuration compliance review, SCAP and OVAL, informal PCI DSS is examined
Rich strategy and compliance report, according to industry standards and regulations preset checks
Strategy and compliance report
NERC, NIST, NIS, AWIA
Third party integration
Preset integration capabilities for custom integration and build open API and SDK
Preset integration capabilities for custom integration and build open API and SDK
Pre-built integration
Pre-built integration
Report the export API
Preset integration capabilities for custom integration and build open API and SDK
Preset integration capabilities, open API
Pre-built integration