Risk-Based Vulnerability Management
2
For the second year in a row, Tenable has
received the most five-out-of-five star reviews of
any company, more than twice as many as the
closest competitor as of March 17, 2020.
#1 for device vulnerability
management for 2019
TENABLE IS TOP RANKED
IN BOTH STRATEGY AND
CURRENT OFFERING
CATEGORIES (Q4 2019) 57,000
CVEs
144,000
Plugins
100+
New Plugins weekly
Tenable #1 in VM Market
don’t just take it from us
VULNERABILITY
BEHIND EVERY
BREACH HEADLINE
ARE KNOWN FLAWS
RANSOMWARE IS
THE MONETIZATION
OF POOR CYBER
HYGIENE
01 CVE-2021-26855 AKA PROXYLOGON
AffectingMicrosoftExchange Server
02 CVE-2021-34527 AKA PRINTNIGHTMARE
AffectingMicrosoftPrint Spooler
03 CVE-2021-21985
AffectingVMware vSphere
04 CVE-2021-22893
AffectingPulse Connect Secure
05 CVE-2020-1472 AKA ZEROLOGON
AffectingMicrosoftNetlogonProtocol
TOP 5 VULNERABILITIES
targeted in 2021
---
IT
CLOUD
OT
VISIBILITY OF THE MODERN ATTACK SURFACE
With adaptive approaches to assessing assets and devices across the infrastructure
APIs
API
Workloads
3rd Party
Libraries
Applications
Container Infrastructure
as Code
Policy
OT Industrial OT Converged BMS
Servers Workstations Infrastructure
Remote
Active
Directory Mobile
Frictionless
Assessment
Active
Assessment
Agent
Assessment
Passive
Assessment
Web App
Scanning
Infrastructure as Code
and Cloud Assessment
Container
Scanning
Passive and Active Monitoring
for OT
Manufacturing Energy
VISIBILITY ACROSS EVERY ATTACK SURFACE
Gain CompleteVisibility,
Security and Control of Your
OperationalEnvironments.
See Everything.
Predict What Matters.
Managed On-Prem.
Cloud Native Risk-Based
Vulnerability Management.
Calculate,Communicate and Compare
your Risks and Exposures.
A Simple,Scalable Approachto Dynamic
ApplicationSecurity Testing.
Gain Visibility into the Security of
Container Images.
Secure Every Step
from Code to Cloud
Secure Your Active Directory and
DisruptAttacks.
Unified Visibility CommunicateRisk
Flexible Asset Model
See everything. Predict what matters.
Managed in the Cloud.
Tenable.io is an integral component of the Tenable
Cyber Exposure Platform that
provides actionable insight into your entire
infrastructure’s attack surface.
See everything. Predict what matters.
Managed On-Prem.
Get a risk-based view of your IT, security and
compliance posture so you can quickly identify,
investigate and prioritize vulnerabilities.
Get the operational technology security
you need. Reduce the risk you don’t.
Tenable.ot protects industrial networks from cyber
threats, malicious insiders and human error. With
threat detection and mitigation, asset inventory,
vulnerability management and configuration control,
Tenable’s ICS security capabilities identify and
predictively prioritize threats and vulnerabilities to
maximize the safety and reliability of your operational
technology environment.
Unified Visibility.
Built By Tenable Research.
Create new scans in seconds and get actionable results
in minutes with Tenable.io Web App Scanning
Take advantage of web application security built by the
largest vulnerability research team in the industry.
How secure is the business?
Meet your Cyber Exposure Score
For the first time ever, you can visualize and explore
your Cyber Exposure, track risk reduction over time,
and benchmark against your peers.
No Privilege Escalation.
No Lateral Movement.
No Next Step.
By combining Risk-based Vulnerability Management and
Active Directory Security, Tenable enables you to disrupt
the attack path, ensuring attackers struggle to find a
foothold and have no next step if they do.
Secure Every Step
From Code to Cloud
We are witnessing the rise of the Infrastructure as Code
(IaC) movement, and to support this movement,
cybersecurity needs to innovate with Security as Code.
Assess Infrastructure as Code before deployment and
identify drift at runtime to secure the cloud at the speed of
code.
18
19
20
21
22
23
Typical Deployment Topology
Tenable-Deck-Customer presentation- Shared
Tenable-Deck-Customer presentation- Shared

Tenable-Deck-Customer presentation- Shared

  • 1.
  • 2.
    2 For the secondyear in a row, Tenable has received the most five-out-of-five star reviews of any company, more than twice as many as the closest competitor as of March 17, 2020. #1 for device vulnerability management for 2019 TENABLE IS TOP RANKED IN BOTH STRATEGY AND CURRENT OFFERING CATEGORIES (Q4 2019) 57,000 CVEs 144,000 Plugins 100+ New Plugins weekly Tenable #1 in VM Market don’t just take it from us
  • 5.
  • 6.
  • 7.
    RANSOMWARE IS THE MONETIZATION OFPOOR CYBER HYGIENE 01 CVE-2021-26855 AKA PROXYLOGON AffectingMicrosoftExchange Server 02 CVE-2021-34527 AKA PRINTNIGHTMARE AffectingMicrosoftPrint Spooler 03 CVE-2021-21985 AffectingVMware vSphere 04 CVE-2021-22893 AffectingPulse Connect Secure 05 CVE-2020-1472 AKA ZEROLOGON AffectingMicrosoftNetlogonProtocol TOP 5 VULNERABILITIES targeted in 2021
  • 8.
    --- IT CLOUD OT VISIBILITY OF THEMODERN ATTACK SURFACE With adaptive approaches to assessing assets and devices across the infrastructure APIs API Workloads 3rd Party Libraries Applications Container Infrastructure as Code Policy OT Industrial OT Converged BMS Servers Workstations Infrastructure Remote Active Directory Mobile Frictionless Assessment Active Assessment Agent Assessment Passive Assessment Web App Scanning Infrastructure as Code and Cloud Assessment Container Scanning Passive and Active Monitoring for OT Manufacturing Energy
  • 9.
    VISIBILITY ACROSS EVERYATTACK SURFACE Gain CompleteVisibility, Security and Control of Your OperationalEnvironments. See Everything. Predict What Matters. Managed On-Prem. Cloud Native Risk-Based Vulnerability Management. Calculate,Communicate and Compare your Risks and Exposures. A Simple,Scalable Approachto Dynamic ApplicationSecurity Testing. Gain Visibility into the Security of Container Images. Secure Every Step from Code to Cloud Secure Your Active Directory and DisruptAttacks. Unified Visibility CommunicateRisk Flexible Asset Model
  • 11.
    See everything. Predictwhat matters. Managed in the Cloud. Tenable.io is an integral component of the Tenable Cyber Exposure Platform that provides actionable insight into your entire infrastructure’s attack surface.
  • 12.
    See everything. Predictwhat matters. Managed On-Prem. Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize vulnerabilities.
  • 13.
    Get the operationaltechnology security you need. Reduce the risk you don’t. Tenable.ot protects industrial networks from cyber threats, malicious insiders and human error. With threat detection and mitigation, asset inventory, vulnerability management and configuration control, Tenable’s ICS security capabilities identify and predictively prioritize threats and vulnerabilities to maximize the safety and reliability of your operational technology environment.
  • 14.
    Unified Visibility. Built ByTenable Research. Create new scans in seconds and get actionable results in minutes with Tenable.io Web App Scanning Take advantage of web application security built by the largest vulnerability research team in the industry.
  • 15.
    How secure isthe business? Meet your Cyber Exposure Score For the first time ever, you can visualize and explore your Cyber Exposure, track risk reduction over time, and benchmark against your peers.
  • 16.
    No Privilege Escalation. NoLateral Movement. No Next Step. By combining Risk-based Vulnerability Management and Active Directory Security, Tenable enables you to disrupt the attack path, ensuring attackers struggle to find a foothold and have no next step if they do.
  • 17.
    Secure Every Step FromCode to Cloud We are witnessing the rise of the Infrastructure as Code (IaC) movement, and to support this movement, cybersecurity needs to innovate with Security as Code. Assess Infrastructure as Code before deployment and identify drift at runtime to secure the cloud at the speed of code.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.