Tenable Vulnerability Management,
Understand the risk exposure, and learned that need priority repair which vulnerabilities
From a risk perspective, examine attack surface, quickly identify, research the key assets and loophole, and to analyze the priority.
Tenable Vulnerability Management,(formerly known as Tenable. IO)Through the cloud management and derived from Tenable Nessus support, provide the industry the most comprehensive coverage, and real-time continuous enterprise security situation assessment.Built-in priority analysis, threats, intelligence and real-time insight can help to understand their risk exposure, and an analysis of the priority repair measures actively.
To find, assess vulnerabilities and to analyze the priority
aware
By constantly to the environment in the known and unknown assets (even the uncertainties of the cloud or remote office staff assets) asset discovery and evaluation, to discover hidden holes.
Find and fix vulnerabilities in before the attack
With the industry's most extensive coverage CVE and configuration, quickly check the scan results and determine the risk exposure.Intuitive dashboard visual function and easy to understand the risk score, to ensure immediate access to insight and reduce risk.
Bug priority analysis
Through the threat of vulnerability data, intelligence and big data analysis combining automatic priority analysis, identify priority repair loopholes.Built-in priority analysis function to ensure quick fix high risk.
Faster response to block attacks
The risk score is easy to understand and rapidly begins to repair in the before the attack.With more than 200 integrated workflow automation and decisive action.
Through the Tenable One exposure management platform to provide
Tenable One,Exposure is a management platform to help enterprises to get the whole modern attack the visibility, focus on the prevention of potential attacks, and accurately convey the network security risks, and to support the enterprises to achieve the best performance.Tenable One platform provides a wide range of coverage, cover IT assets, cloud resources, containers, Web applications and identity system.
For detailsUse the magic faster response data
As a Tenable Vulnerability ManagementTenable One exposure management platformPart of the offer, also can be provided as a separate product.
- Using the on-line sensors for detection and evaluation
- Built-in threat intelligence
- Automatic bug priority analysis
- Real-time visualization of risk, and follow up loopholes, assets and repair
- Built-in vulnerability risk score to identify risks
- Fully documented API and pre-built integration
Common problems
Tenable Vulnerability Management is a risk based Vulnerability Management platform, provides a comprehensive network of visibility, which can predict attacks and rapid response to the key hole.Continuous detection and assessment is found on the network all assets and these assets hidden holes provided the necessary visibility.Built-in priority analysis, threat intelligence and real-time reports can help to understand their own risk, and take the initiative to block the attack path.The solution based on leading Tenable Nessus technology and hosted in the cloud, and provides the integrity of the assets and loopholes in the network visibility, so as to rapidly and accurately understand the risk, and learned that need priority repair which vulnerabilities.
Tenable Vulnerability Management and Tenable Security Center is a leading Vulnerability Management solution that can provide all assets and holes complete view on the network, to understand the network Security risk and learn to give priority to fix what loophole.The key difference between these two kinds of solution lies in the management way.Tenable Vulnerability Management,Hosted in the cloud, andTenable Security CenterIs a local solution.To fully understand the difference between the two products, please contactTenable certified partnerorTenable representativeFor more information.
Tenable Vulnerability Management can be used as key components provide Tenable One platform, also can be provided as a separate product.Tenable Vulnerability Management is Tenable One exposure Management platform provides Vulnerability Management functions, such as:
- Using the on-line sensors for detection and evaluation
- Built-in threat intelligence
- Automatic bug priority analysis
- Real-time visualization of risk, and follow up loopholes, assets and repair
- Built-in vulnerability risk score to identify risks
- Fully documented API and pre-built integration
Tenable One, is a comprehensive risk management platform, can technology assets, vulnerability and threat data can be converted to clear business insight and actionable intelligence, for safety management personnel and professional use.The platform is a combination of IT assets, cloud resources, containers, Web applications and identity system is the most extensive coverage, to Tenable hole cover rate and width of the Research as the foundation, and add the function of comprehensive analysis, with an analysis of the priority actions and communicate network security risk.
The following applications can follow Tenable Vulnerability Management buy together, also can buy alone, or as a Tenable One part of the bundle purchase:
- Tenable Vulnerability Management Web App Scanning(WAS) * : for the modern Web application provides a comprehensive vulnerability scanning, its accurate coverage holes can minimize false positives and omission, to ensure the security team to understand the Web application in real security risk.
- Tenable Lumin* : a visualization, analysis and measurement of solution, visualization to the network security risk, risk tracking with the loss of the time, and the benchmark results are compared with the same company.
- Tenable Cloud Security* : can analyze the loopholes and error distribution in the cloud infrastructure that helps protect the cloud resources, container image, cloud assets and infrastructure as a code (IaC).
- Tenable OT Security: to provide protection for industrial control network, from network threat, malicious insiders and human error.IT/OT provide unparalleled fusion operations visibility and leading security features, so as to maximize the visibility of operating environment, safety and control ability.
- Tenable ASV PCIASV: simplified process, including running scanning, settle, and conform to the requirements of the scan report.
- Tenable Identity Exposure* : enable customers to before the defects of the attacker using Active Directory to find and repair these defects, and real-time response to the attack.
* Tenable One platform contained in the application
Tenable is working to protect all customer data confidentiality, integrity, and availability.Tenable Vulnerability Management,数据在传输中和存储中均采用 TLS 加密密码进行加密。 应用程序基础设施层会应用 AES-256 加密。
Tenable cloud platform to build on the isolation of private network, and use a variety of network control mechanism, such as container isolation, inbound/internal flow limit, monitoring the flow rate, source and type of multiple network point.
Tenable also implements a variety of access control functions, to help customers control data access, and high frequency execution vulnerability, Docker container and Web application scanning, security assessments on a regular basis.
Relevant security measures adopted by detailed instructions, please checkTenable trust and ensure that web pageorProduct information data security and privacy.
Tenable Vulnerability Management, licensing, in the annual subscription and pricing by assets rather than IP addresses.Our proprietary assets counting algorithm using a variety of asset attributes programmatically identify only assets, thus reducing the repetition.
Assets include:
- The operating system or virtual devices connected to the network entities
- Has the FQDN Web application
- Activity (not terminated) cloud resources
Is.Tenable through powerfulService level agreement(SLA), in the industry take the lead in providing vulnerability management 99.95% uptime guarantee, if it fails to meet the SLA, provides service credit.
Tenable use the AWS platform and other advanced technology to ensure high availability for our customers.Tenable using fault tolerance and redundant components, to ensure that customers with minimal downtime for best service.
For containing Tenable Vulnerability Management, all the Tenable product technical document, please checkhttps://docs.tenable.com.
To deeply understand the Tenable Vulnerability Management, please visitTenable Vulnerability Management product page, the registeredFree evaluation, or to contact youTenable certified partnerorTenable representativeFor more information.
Want to buy Tenable Vulnerability Management, can with the localCertified partnerCommunication and contact with youTenable representativeOr visittenable.com.