Understanding the visibilitydisconnect
Visibility is foundational to
cybersecurity
2
Yet, few organizations have
mastered it
73
%
are worried about their
growing attack surface
62
%
of attack surface is estimated to
be known to cybersecurity
today
62
%
have blind spots that hamper
security efforts
NIST Cybersecurity
Framework
CIS Controls, Version 8
Source: Sapio Research & Trend Micro, April 2022
3.
3
People outside
know more
aboutthe
organization’s
attack surface
than those within
90,000+ internet-
exposed servers are
still vulnerable
245,000 Kubernetes
clusters are running
publicly exposed
Unknown,
unmanaged data is
creating cloud risks
via Shadow IT
Link
Link
Link
4.
4
Discover what
you own
Gaina thorough
view of all
internet-facing
assets. Both
known and
unknown.
Understand
business
context
Categorize assets
with
comprehensive
metadata and
filtering.
Easily assess
for cyber risk
Launch new scans
with a few clicks to
understand your
exposures.
Introducing Tenable.asm
5.
5
Discover what youown
Access an attack surface map of more than 5
billion assets with unlimited Top-level
Domains
Take advantage of over 500 data sources
and 200 snapshots of the internet
Discover suggested domains related to
assets in your inventory
Get notified of changes in your attack
surface with customized subscriptions for
continuous monitoring
6.
6
Understand business context
200fields of metadata provides
comprehensive asset information to help
you make more informed decisions
Easily sort and filter through assets based on
filters, tags, data types and much more
Apply tags based on asset information to
streamline asset management
Understand potential exposures related to
technology fingerprinting, port scanning,
and more
7.
7
Easily assess forcyber risk
Attack surface asset and exposure data is
fully integrated into Tenable.io, Tenable.sc
and Tenable.ep
Kick-off new scans of unassessed assets in
just a few clicks to remove blindspots
Assess domains and subdomains via Nessus
or Tenable.io Web Application Scanning for
comprehensive coverage
8.
Tenable.asm provides completevisibility into your
digital attack surface
Capabilities Provided in Enterprise Products Provided in Tenable.asm
Data refresh rate Quarterly Bi-weekly OR daily
Top-Level Domains
included
Limited to 1 or 2 Top-Level Domains Unlimited
Maximum discoverable
assets
Capped at 10x the number of licensed assets or 1
million, whichever is smaller
Unlimited
Data available Limited metadata related to host, record type, IP
address, ASN and port
More than 200 fields of metadata, including
networking and domain information, running
services, security and compliance posture, and
technology fingerprinting
Key features Vulnerability assessment integration Vulnerability assessment integration
Domain exclusion rules
Suggested domains for continuous discovery
Automated domain monitoring
Category-based asset dashboards
Automated asset categorization
9.
Primary Tenable.asm use-cases
Revealthe Attack Surface of
current and potential
competitors to identify
strategic opportunities.
Competitive
Analysis
Secure your brand by
recognizing expired marketing
campaigns,
misspellings, SEO
opportunities, and misuse.
Brand Protection
Instantly see every internet-
facing asset of your target
company before acquisition to
discern risk early.
Mergers &
Acquisitions
Reveal locations where PII is
captured and stored, to fully
comply with industry
regulations.
Compliance
Mitigate risk and avert
potential threats by knowing
exactly what you own.
Establishing the Attack Surface
is foundational to security
strategy.
Cybersecurity
Understand which assets have
non-compliant technology,
missing legal disclaimers, and
expired copyright notices.
Legal
9