Overview
Tenable One is an exposure management platform to help organizations gain visibility across the modern attack surface, focus efforts to prevent likely attacks, and accurately communicate cyber risk to support optimal business performance. The platform combines the broadest exposure coverage spanning IT assets, cloud resources, containers, web apps and identity systems, builds on the speed and breadth of vulnerability coverage from Tenable Research, and adds comprehensive analytics to prioritize actions and communicate cyber risk.
Within Tenable One, you can deploy Tenable Vulnerability Management, Tenable Security Center, Tenable Cloud Security, Tenable Web App Scanning, Tenable Identity Exposure, and Tenable Attack Surface Management in a single unified platform. Organizations can also leverage Tenable ExposureAI, which transforms how security teams prevent successful attacks, empowering lightning-fast analysis, decision-making and guidance with the power of generative AI. Tenable's exposure data stands as the world's largest repository of contextual exposure data, fueling the capabilities of Tenable ExposureAI.
For customized Private Offer pricing, please contact awsMPsales@tenable.com to request a quote for the scope of your project.
Highlights
- Gain a unified view of all assets and associated software vulnerabilities, configuration vulnerabilities and entitlement vulnerabilities, whether on-prem, in the cloud, hybrid or multi-cloud to understand where you are exposed to risk. Tenable One also measures the maturity of your foundational security processes, including how effective the security team is at identifying critical flaws and how quickly they remediate issues to reduce risk.
- Prioritize threats and anticipate the consequences of a cyber attack by drawing upon the industrys largest data set. Leverage attack path visualization and prioritization capabilities that provide a preemptively focused response to disrupt the paths attackers may take. It performs this function by mapping critical risks to the MITRE ATT&CK framework to visualize all viable attack paths continuously - both on-prem and in the cloud.
- Achieve a centralized and business-aligned view of cyber risk with clear KPIs to show progress over time and actionable insights into your overall cyber risk, with the ability to drill into departmental or operational units. In addition, utilize external and internal benchmarking to assess efforts against industry peers and internal operational groups to quickly identify shortcomings and strengths and apply resources accordingly.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
1 Asset | Tenable One Enterprise [Private Offer Only] 1 Asset | $100,000.00 |
Vendor refund policy
All fees are non-cancellable and non-refundable except as required by law.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Customers can log in to community.tenable.com with their Support account to create cases and chat with us, or call 1-855-267-7044 with their customer ID number.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Good vulnerability management
Support has not been good from our account manager to those higher up. I had issues with our VAR not receiving the renewal notification and services were shut off. It took them nearly 3 weeks to figure out their backend to restore services.
Tenable Vulnerability Management Review
Intuitive, user-friendly interface
Accurate and comprehensive asset discovery
Strong risk-based prioritization
Automated, continuous scanning
Flexible reporting and robust integration capabilities
Can be costly for smaller businesses
May require a learning curve for new users
Some users report longer scan times for larger environments
Great interface and plugins w/ only minor issues
The number of plugins covers a wide variety of systems and possible exploits.
SAML / SCIM integration is another plus and was fairly easy to setup.
Implementation of scanning via its Nessus agents was a breeze.
Additionally, some of the exploits that are not exploitable and can cause false positives. For example if I have a HTTPS exploit on a version of a router / switches firmware, but HTTPS management is turned off and only SSH management is used, then that exploit does not need to be listed as high.
The ability to do very targeted scans of specific vulnerabilities throughout an organizaiton or on just one specific machine is very helpful.