sb-as logo
Story image

Tenable leverages partner ecosystem with new integrations

Tenable has introduced 19 new technology integrations to its Cyber Exposure Ecosystem, enabling partners of all sizes to integrate their solutions with Tenable’s open platform to better protect against vulnerabilities.

The Cyber Exposure Ecosystem offers integrated security and IT workflows to provide greater visibility of the attack surface and increase detection and response capabilities. More specifically, the integrations include Mobile Device Management (MDM), public cloud infrastructure, SIEM and IT Service Management solutions.

Tenable vice president of technical alliances, Ray Komar, says, “We’ve built the Cyber Exposure Ecosystem with best-of-breed technology partners with one goal in mind: to help digital organisations see, understand and reduce their cyber risk holistically - and quickly - across the entire modern attack surface. We’re bringing point solutions and data sources together so our customers can more efficiently manage and reduce their risk.”

A breakdown of the new integrations

For MDM, Tenable has introduced new integrations and has updated existing ones to enable users to pull mobile asset data from MDM applications to catch mobile device vulnerabilities. This includes new integrations for with Blackberry Manager and Microsoft Intune.

When it comes to public cloud infrastructure, the Cloud Connectors for AWS, Google Cloud Platform and Microsoft Azure Cloud Connectors now include multi-account auto-discovery across enterprise accounts, and role delegation for AWS.

For SIEM, Tenable has updated and integrations for Splunk products, including reporting and dashboards. The new integrations also allow Splunk customers to surface-up any high risk vulnerability data from Tenable into Splunk Enterprise Security. In addition, Tenable has integrated its vulnerability management solutions with Chronicle, making it the first partner to do so. The integration with brings together Tenable’s data with Chronicle assets and alerts for more robust insights into security issues.

Finally, when it comes to IT service management, Tenable has enhanced its integration with ServiceNow with a single integration app for and With this integration, Tenable has added its Vulnerability Priority Rating to ServiceNow Security Operations. This enables users to sync vulnerability data 400% faster through ingesting multiple Tenable vulnerability data streams simultaneously into ServiceNow Vulnerability Response and the ServiceNow CMDB.

Story image
Forescout and ServiceNow advance tech partnership to protect critical infrastructure
Forescout and ServiceNow have announced they are advancing their partnership for enhanced operational technology (OT) and industrial IoT capabilities, with an aim of helping organisations to protect critical infrastructure from cyber threats.More
Story image
A third of millennials think they're 'too boring' to be victim of cyber attack
While many millennials are concerned at how their data is being used and whether they are being targeted by cyber-attackers, according to Kaspersky any potential action taken to tighten their online security is at ‘the bottom of their to-do list’.More
Story image
Fortinet acquires OPAQ Networks to bolster SASE offering
Customers of the companies can now leverage firewall and SD-WAN capabilities, web security, browser isolation, multi-cloud workload protection, and more.More
Link image
Compromise is no longer needed for quality authentication
Many authentication tools have a trade-off: get secure identity verification, but sacrifice usability. Here's how to get the best of both worlds.More
Story image
Attivo Networks integrates with FireEye for advanced threat protection
The combined solution is designed to reduce time and resources required to detect and block attacks, while also collecting forensics to help organisations avoid future attacks. More
Story image
AWS launches fully-managed fraud detection service
Businesses lose billions of dollars to online fraud every year, however businesses respond by investing in cumbersome fraud management solutions that often rely on hand-coded rules and are difficult to keep up to date.More