Name
Title
Introducing:
Tenable.asm
Understanding the visibility disconnect
Visibility is foundational to
cybersecurity
2
Yet, few organizations have
mastered it
73
%
are worried about their
growing attack surface
62
%
of attack surface is estimated to
be known to cybersecurity
today
62
%
have blind spots that hamper
security efforts
NIST Cybersecurity
Framework
CIS Controls, Version 8
Source: Sapio Research & Trend Micro, April 2022
3
People outside
know more
about the
organization’s
attack surface
than those within
90,000+ internet-
exposed servers are
still vulnerable
245,000 Kubernetes
clusters are running
publicly exposed
Unknown,
unmanaged data is
creating cloud risks
via Shadow IT
Link
Link
Link
4
Discover what
you own
Gain a thorough
view of all
internet-facing
assets. Both
known and
unknown.
Understand
business
context
Categorize assets
with
comprehensive
metadata and
filtering.
Easily assess
for cyber risk
Launch new scans
with a few clicks to
understand your
exposures.
Introducing Tenable.asm
5
Discover what you own
Access an attack surface map of more than 5
billion assets with unlimited Top-level
Domains
Take advantage of over 500 data sources
and 200 snapshots of the internet
Discover suggested domains related to
assets in your inventory
Get notified of changes in your attack
surface with customized subscriptions for
continuous monitoring
6
Understand business context
200 fields of metadata provides
comprehensive asset information to help
you make more informed decisions
Easily sort and filter through assets based on
filters, tags, data types and much more
Apply tags based on asset information to
streamline asset management
Understand potential exposures related to
technology fingerprinting, port scanning,
and more
7
Easily assess for cyber risk
Attack surface asset and exposure data is
fully integrated into Tenable.io, Tenable.sc
and Tenable.ep
Kick-off new scans of unassessed assets in
just a few clicks to remove blindspots
Assess domains and subdomains via Nessus
or Tenable.io Web Application Scanning for
comprehensive coverage
Tenable.asm provides complete visibility into your
digital attack surface
Capabilities Provided in Enterprise Products Provided in Tenable.asm
Data refresh rate Quarterly Bi-weekly OR daily
Top-Level Domains
included
Limited to 1 or 2 Top-Level Domains Unlimited
Maximum discoverable
assets
Capped at 10x the number of licensed assets or 1
million, whichever is smaller
Unlimited
Data available Limited metadata related to host, record type, IP
address, ASN and port
More than 200 fields of metadata, including
networking and domain information, running
services, security and compliance posture, and
technology fingerprinting
Key features Vulnerability assessment integration Vulnerability assessment integration
Domain exclusion rules
Suggested domains for continuous discovery
Automated domain monitoring
Category-based asset dashboards
Automated asset categorization
Primary Tenable.asm use-cases
Reveal the Attack Surface of
current and potential
competitors to identify
strategic opportunities.
Competitive
Analysis
Secure your brand by
recognizing expired marketing
campaigns,
misspellings, SEO
opportunities, and misuse.
Brand Protection
Instantly see every internet-
facing asset of your target
company before acquisition to
discern risk early.
Mergers &
Acquisitions
Reveal locations where PII is
captured and stored, to fully
comply with industry
regulations.
Compliance
Mitigate risk and avert
potential threats by knowing
exactly what you own.
Establishing the Attack Surface
is foundational to security
strategy.
Cybersecurity
Understand which assets have
non-compliant technology,
missing legal disclaimers, and
expired copyright notices.
Legal
9
10
DEMO
11
THANK YOU

Tenableasm_Sales_Presentation__June_2022.pptx

  • 1.
  • 2.
    Understanding the visibilitydisconnect Visibility is foundational to cybersecurity 2 Yet, few organizations have mastered it 73 % are worried about their growing attack surface 62 % of attack surface is estimated to be known to cybersecurity today 62 % have blind spots that hamper security efforts NIST Cybersecurity Framework CIS Controls, Version 8 Source: Sapio Research & Trend Micro, April 2022
  • 3.
    3 People outside know more aboutthe organization’s attack surface than those within 90,000+ internet- exposed servers are still vulnerable 245,000 Kubernetes clusters are running publicly exposed Unknown, unmanaged data is creating cloud risks via Shadow IT Link Link Link
  • 4.
    4 Discover what you own Gaina thorough view of all internet-facing assets. Both known and unknown. Understand business context Categorize assets with comprehensive metadata and filtering. Easily assess for cyber risk Launch new scans with a few clicks to understand your exposures. Introducing Tenable.asm
  • 5.
    5 Discover what youown Access an attack surface map of more than 5 billion assets with unlimited Top-level Domains Take advantage of over 500 data sources and 200 snapshots of the internet Discover suggested domains related to assets in your inventory Get notified of changes in your attack surface with customized subscriptions for continuous monitoring
  • 6.
    6 Understand business context 200fields of metadata provides comprehensive asset information to help you make more informed decisions Easily sort and filter through assets based on filters, tags, data types and much more Apply tags based on asset information to streamline asset management Understand potential exposures related to technology fingerprinting, port scanning, and more
  • 7.
    7 Easily assess forcyber risk Attack surface asset and exposure data is fully integrated into Tenable.io, Tenable.sc and Tenable.ep Kick-off new scans of unassessed assets in just a few clicks to remove blindspots Assess domains and subdomains via Nessus or Tenable.io Web Application Scanning for comprehensive coverage
  • 8.
    Tenable.asm provides completevisibility into your digital attack surface Capabilities Provided in Enterprise Products Provided in Tenable.asm Data refresh rate Quarterly Bi-weekly OR daily Top-Level Domains included Limited to 1 or 2 Top-Level Domains Unlimited Maximum discoverable assets Capped at 10x the number of licensed assets or 1 million, whichever is smaller Unlimited Data available Limited metadata related to host, record type, IP address, ASN and port More than 200 fields of metadata, including networking and domain information, running services, security and compliance posture, and technology fingerprinting Key features Vulnerability assessment integration Vulnerability assessment integration Domain exclusion rules Suggested domains for continuous discovery Automated domain monitoring Category-based asset dashboards Automated asset categorization
  • 9.
    Primary Tenable.asm use-cases Revealthe Attack Surface of current and potential competitors to identify strategic opportunities. Competitive Analysis Secure your brand by recognizing expired marketing campaigns, misspellings, SEO opportunities, and misuse. Brand Protection Instantly see every internet- facing asset of your target company before acquisition to discern risk early. Mergers & Acquisitions Reveal locations where PII is captured and stored, to fully comply with industry regulations. Compliance Mitigate risk and avert potential threats by knowing exactly what you own. Establishing the Attack Surface is foundational to security strategy. Cybersecurity Understand which assets have non-compliant technology, missing legal disclaimers, and expired copyright notices. Legal 9
  • 10.
  • 11.