Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Recherche Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Want to become a Tenable partner?

En savoir plus

AirWatch

AirWatch (by VMware) is an enterprise mobility management provider. Tenable integrates with AirWatch to detect vulnerabilities associated with mobile devices, operating systems, and associated applications, detect whether the devices are misconfigured, and check for out-of-compliance as well as audit for adherence with corporate policies and Tenable best practices.

Category:
Mobile

Amazon Web Services

Recognized as a Security Competency partner in the AWS Partner Network (APN), Tenable works with AWS in a variety of ways. Tenable solutions run in AWS; can scan AWS instances to detect vulnerabilities, malware and compliance issues (pre-authorized); can audit AWS infrastructure for adherence to AWS and security best practices; and can connect directly to AWS for CloudTrail event monitoring.

Category:
Cloud
Learn more: Solution Brief , Tenable.io How-To Guide , More

Apple

Tenable solutions integrate with Apple Profile Manager to detect and identify vulnerable, misconfigured mobile devices, and check for compliance and security best practices. They can detect whether devices are running latest or outdated and vulnerable applications, identify unauthorized devices, detect jail broken devices as well. Tenable also scans Apple OS X systems to detect vulnerabilities, misconfigurations, and out-of-compliance.
Category:
Mobile

Archer

Tenable solutions share asset, vulnerability, and malware data with RSA Archer Vulnerability Risk Management (VRM) as well as RSA Archer Threat Management and RSA Archer On-Demand Applications (ODAs) via the Archer Datafeed Manager.

This data sharing further enables organizations to proactively manage IT security risks and enhance their RSA Archer GRC investment. By combining Tenable and RSA Archer you can deliver the complete visibility and critical context needed to take informed and decisive action to protect your organization.

Category:
GRC
Learn more: SecurityCenter How-to Guide

Blue Coat

Tenable solutions can audit Bluecoat Proxy SG to ensure it’s correctly configured and hardened with over 80 checks in the areas of networking, monitoring, diagnostics, centralized management, and proxy intercepts. Tenable also aggregates web filtering content alerts for centralized viewing web alert filter indications without the need to log into multiple devices. It also processes and normalizes Blue Coat Admin events.

Category:
Email/Web

Cisco

As a strategic partner, Tenable integrates with multiple Cisco products. Tenable solutions discover and audit Cisco network and security infrastructure for misconfiguration, vendor hardening guidelines, checks for compliance and best practices. The also scan for malware identified by ThreatGrid. Tenable also pulls Cisco ISE user identity and device context to vulnerability scans as well as initiate quarantine actions to Cisco ISE for remediation of offending hosts. Sourcefire IPS and NGFW use vulnerability context from Tenable to add context to IPS alerts and help tune rules. Finally, Tenable also helps identify unprotected hosts not communicating through Cisco FW, Sourcefire NGIPS and NGFWs.

Category:
Identity/Access
Network
Learn more: Brève solution

Dell

Tenable solutions integrate with Dell KACE systems management appliances to identify missing patches on vulnerable systems, identify unmanaged systems that are vulnerable and require patching, and extend scanning to cover systems that cannot be directly scanned.  Tenable can also audit systems running the Dell Force10 FTOS system.

Category:
Network
Patch Management

Dropbox

Tenable solutions can provide visibility into usage of cloud-based file sharing services like Dropbox and identify which clients are accessing this service, helping ensure that the use of Dropbox aligns with the organization's acceptable usage and security policies.
Category:
Cloud

FireEye

Tenable Nessus® audits FireEye appliance to ensure they are hardened and provide up-to-date protection. SecurityCenter CV™ also aggregates and correlates FireEye device alerts such as infections, malware objects, malware callbacks, and more. Finally, SecurityCenter CV can identify endpoints not detected by FireEye appliances and help validate if FireEye malware detected by the sandbox successfully compromised the target.
Category:
Network

ForeScout Technologies

ForeScout Technologies is transforming security through visibility, providing agentless visibility and control of traditional and IoT devices the instant they connect to the network. Their technology works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. See devices. Control them. Orchestrate multivendor response.
Category:
Network
Learn more: Tenable.io How-To Guide , SecurityCenter/Nessus How-To Guide

Fortinet

Tenable audits Fortinet firewall appliances to ensure they are hardened to meet security and industry best practices including password policies, malware detection configuration, enabled services and more. Tenable also trends and correlates Fortinet events such as key appliance performance statistics, track successful inbound and outbound connections, identify failures as well as track connections that bypass the firewall.

Category:
Network
Learn more: Solution Brief , SecurityCenter/Nessus How-To Guide

Gigamon

By deploying Gigamon and Tenable solutions together, organizations that have encrypted traffic in their environments can regain visibility into what devices are connecting to their environment and continuously monitor network traffic to identify vulnerabilities and risk.

Category:
Network
Learn more: Solution Brief , Nessus Network Monitor How-To Guide

Good

Tenable integrates with Good for Enterprise to query the MDM database and detect vulnerabilities associated with the device operating system and associated applications, detect whether the devices are misconfigured, and check for out-of-compliance as well as audit for adherence with corporate policies and Tenable best practices.
Category:
Mobile

Google Cloud Platform

SecurityCenter Continuous View® (SecurityCenter CV™) integrates with Google Cloud Platform to enable organizations to continuously monitor their cloud infrastructure and easily understand what new hosts are being provisioned, the risks they may potentially cause and quickly report on malicious use by detecting brute force logins and unauthorized web application scanning. With SecurityCenter CV, organizations can employ a single technology for monitoring hybrid environments, thereby eliminating the need to buy, deploy and manage multiple tools.

Category:
Cloud
Learn more: Solution Brief , SecurityCenter Continuous View How-To Guide

IBM

Tenable integrates with IBM Tivoli Endpoint Manager to correlate patch status reported by IBM with the results of Tenable’s vulnerability scanning. Grâce à la mise en corrélation des correctifs avec les résultats du scan, les organisations peuvent identifier les incohérences dans leurs programmes de correctifs. IBM’s Qradar SIEM can also pull in data from Tenable’s Nessus scans.
Category:
Patch Management
SIEM

Kenna

Kenna (formerly Risk I/O) takes in vulnerability scan results from Nessus to correlate with other assessment information to help customers prioritize issues.

Category:
Renseignement sur les menaces

McAfee

Enhance your security posture with the Tenable connector for McAfee ePO. With Tenable's comprehensive information on assets and vulnerabilities, McAfee ePO customers gain the security visibility and context needed to make the best, most informed decisions on action and remediation.
Category:
Endpoint
Learn more: Solution Brief , SecurityCenter How-To Guide , More

Microsoft

Tenable integrates with Microsoft WSUS and SCCM to identify mobile devices and associated vulnerabilities. In addition, Tenable scans Microsoft operating systems, applications and databases for vulnerabilities, audits for hardening guidelines and audits for compliance, and identifies malicious processes and malware targeting Microsoft systems and applications. Finally, Tenable also integrates with Microsoft Exchange (ActiveSync) MDM to discover, audit security settings and identify vulnerabilities on mobile devices. Tenable also detects and audits Microsoft Azure cloud services to identify misconfigurations and identify entry points for attackers.

Category:
Cloud
Mobile
Patch Management
Learn more: Microsoft Azure Solution Brief , Nessus and Azure How-To Guide , Tenable.io and SCCM How-To Guide

MobileIron

Tenable integrates with MobileIron to query the MDM database and detect vulnerabilities associated with mobile device operating systems and associated applications, detect whether the devices are misconfigured, and check for out-of-compliance as well as audit for adherence with corporate policies and Tenable best practices.

Category:
Mobile
Learn more: Brève solution

Palo Alto Networks

Tenable works with Palo Alto solutions to detect hosts not protected by PAN firewall, identify unprotected endpoints that could benefit from advanced threats and endpoint security assurance, and provides endpoint context for policy updates on network security products including NGFW and IPS.
Category:
Network
Learn more: Solution Brief , SecurityCenter/Nessus How-To Guide

Pwnie Express

Tenable’s vulnerability scan results can provide context to Pwnie Express pen testing tools to help reduce the scope of testing to critically vulnerable systems.

Category:
Penetration Testing

Rackspace

Tenable audits Rackspace cloud deployments to identify deployed resources, check for server, backup and load-balancer configuration settings, and detect user privileges and roles.

Category:
Cloud

Red Hat

Tenable integrates with Red Hat Satellite to correlate patch status reported by Red Hat with the results of Tenable’s vulnerability scanning. Grâce à la mise en corrélation des correctifs avec les résultats du scan, les organisations peuvent identifier les incohérences dans leurs programmes de correctifs.
Category:
Patch Management
Learn more: Solution Brief , Tenable.io How-To Guide

Salesforce

Tenable solutions can detect Salesforce applications and provides hardening policies for CRM services including Salesforce, and can track which clients are accessing Salesforce.
Category:
Cloud

ServiceNow

Tenable Network Security and ServiceNow offer best-in-class security by combining the industry’s leading ITSM application with best-in-class weakness detection to quickly and effectively remediate vulnerabilities in your environment. Available on the ServiceNow Store, the solution provides seamless import of Tenable SecurityCenter scan data into ServiceNow Security Operations, enabling decisive actions and granular remediation process control to protect your organization from risk, exposure and loss.

Category:
Service Management
Learn more: Solution Brief , SecurityCenter How-To Guide

Sophos

Sophos Endpoint security protection detects viruses, spyware, adware, and malicious activities on the network. Tenable can continuously monitor Sophos to verify if it is operating properly, what threats are being detected, and collect virus event activity and trend Sophos events over time.

Category:
Endpoint

Sourcefire

Tenable solutions can audit Sourcefire appliances to ensure they are hardened and correctly configured. Tenable can also complement Sourcefire deployments by identifying unprotected hosts that do not communicate through the Sourcefire firewall, detecting encrypted communications and associated risk, as well as tracking malicious activities inside the network and on endpoints. Sourcefire can also ingest vulnerability scan results from Tenable scans to help tune IPS signatures.

Category:
Network
Learn more: Brève solution

Splunk

Splunk and Tenable joint integrations protect organizations from advanced cyber threats by providing better security intelligence and context. Splunk has developed both SecurityCenter® and Nessus® add-ons for its Operational Intelligence platform to leverage Tenable’s vulnerability and continuous monitoring data for enhanced security visibility and context. Tenable has developed connectors to collect Splunk logs and event data for enhanced security insight.

Download the Splunkbase Nessus and SecurityCenter and Nessus Network Monitor add-ons.

Category:
SIEM
Learn more: Solution Brief , Tenable.io How-To Guide , SecurityCenter Continuous View How-To Guide

Symantec

Tenable integrates with Symantec Altiris to correlate patch status reported by Symantec with the results of Tenable’s vulnerability scanning. Grâce à la mise en corrélation des correctifs avec les résultats du scan, les organisations peuvent identifier les incohérences dans leurs programmes de correctifs.

Category:
Patch Management

ThreatConnect

ThreatConnect provides threat intelligence data that helps identify malware and malicious behavior. Tenable solutions can use this data to identify malicious communications and compromised hosts as well as help prioritize vulnerability scan results and response.

Category:
Renseignement sur les menaces
Learn more: Brève solution

Thycotic

Together, Thycotic and Tenable enable organizations to easily perform credentialed scans, collecting the most accurate vulnerability information without compromising accountability or control of privileged credentials. Integration between Tenable.io™ and Thycotic Secret Server makes managing credentialed scans easy and secure, ensuring you’re delivering more accurate results and identifying threats and vulnerabilities sooner.
Category:
Identity/Access
Learn more: Solution Brief , Tenable.io How-To Guide , Nessus How-To Guide

VCE

Tenable solutions are recognized as “Vblock Ready” to interoperate with Vblock systems, a seamless integration of best-in-class compute, network, and storage technologies from VMware, Cisco, and EMC. Tenable enables VCE customers to accelerate adoption of Vblock systems by enabling vulnerability management, attack detection and mitigation, compliance monitoring, and IT risk management.
Category:
Virtualization

VMware

Tenable solutions are recognized as “VMware Ready” to operate on VMware infrastructure and safely operate in mission critical product environment. Tenable hardens VMware infrastructure by providing continuous visibility to identify VMware systems, unpatched software and misconfigured ports and services.
Category:
Virtualization
Learn more: Brève solution