top of page

New Tenable Integration Provides Greater Flexibility for Cybersecurity Deployments

Tenable has integrated its Tenable One Exposure Management Platform with Tenable Security Center 6.1, allowing for support of on-premises and hybrid deployments. This new integration will offer customers greater flexibility in choosing where to deploy their vulnerability management assets.


Tenable One brings together several cybersecurity features, including vulnerability management, cloud security, external attack surface management, identity exposure, web app scanning, and attack path analysis data, to identify critical weaknesses before attackers can exploit them. This integration now makes Tenable the only vendor that can offer exposure management for both on-premises and hybrid deployment models, enabling on-premises customers to transition to the cloud more quickly while streamlining exposure management for hybrid vulnerability management deployments.


The integration offers Tenable One customers access to both Tenable Vulnerability Management and Tenable Security Center, allowing them to deploy their vulnerability management assets either on-premises or in the cloud or both, for a hybrid approach. Tenable Security Center customers can use Tenable One to get a single view of all their exposure data across the attack surface, with cyber risk analytics that make it easier for organizations to prioritize remediation activity and communicate cyber risk to executive stakeholders.


Moreover, Tenable Security Center Plus and Security Center Director have also been integrated to offer enhanced visibility and simplified management value. As Glen Pendley, Tenable's Chief Technology Officer, explains, "Tenable's platform approach with Tenable One is expanding its reach throughout the security stack and creating not only economies of scale but also flexibility for customers." The new integration is set to provide customers with greater flexibility, allowing them to make the most of Tenable's advanced exposure management features while addressing the growing challenge of cybersecurity threats.

Kommentare


bottom of page