sb-au logo
Story image

Tenable launches cybersecurity focused partner program

Tenable has announced an industry first cyber exposure ecosystem designed to help organisations manage and reduce cyber risk.

The company says the partner ecosystem will be leveraged to connect disparate solutions and data to accelerate an organisation’s ability to understand, manage and reduce cyber risk.

Tenable says the new ecosystem includes a series of new and enhanced integrations across an initial set of featured partners, with the intent to add new technology partners on a continuous basis.

Amit Yoran, Tenable CEO says, “Organisations in every sector are embracing digital transformation, from cloud to IoT, (although) the flip side of digital transformation is a constantly morphing modern attack surface and a massive underestimation of Cyber Exposure.”

“We call this the Cyber Exposure Gap. No company alone can close the gap, which is why we are coming together with other market leaders to pioneer the industry’s first Cyber Exposure ecosystem to help the digital enterprises of today - and tomorrow - build resilient cybersecurity programs.”

Tenable says the program will aim to provide an open and flexible platform, making it easy to build integrated solutions which solve complete customer problems.

The program will involve ingesting third-party data to enrich asset discovery and vulnerability assessment, as well as exporting Tenable data to third-party systems for remediation and IT risk management.

The organisations and integrations that will feature in the new program include;

  • ServiceNow: provides the capacity to automatically sync IT asset data between ServiceNow Security Operations and SecurityCenter to enrich asset discovery and vulnerability assessment, as well as import Tenable findings into ServiceNow to accelerate the IT remediation workflow.

  • Amazon Web Services (AWS): The new AWS Connector for Tenable.io is designed to automatically discover and track asset changes in AWS cloud environments to ensure all instances are known and assessed for exposure with every change.

  • Splunk: Splunk Enterprise automatically collects Tenable vulnerability and configuration issues, correlating vulnerable systems with SIEM alert activity to help validate threats.

  • McAfee: Automatic exporting of Tenable vulnerability and configuration data into McAfee ePolicy Orchestrator (ePO) increases visibility and enriches context around the security posture of McAfee managed endpoints.

These new integrations join other featured Cyber Exposure ecosystem partners, including CyberArk, Forescout and Infoblox.

Sean Convery, vice president and general manager of ServiceNow’s security business unit says, “Vulnerability response is the missing link for security teams to radically increase the effectiveness of their programs.

“ServiceNow brings business context, prioritisation, risk dashboards and deep IT integration to ensure timely remediation of issues. Together with Tenable, we offer customers a complete view of the attack surface and the ability to prioritise and remediate vulnerabilities.”

The Cyber Exposure technology partner ecosystem is part of the Tenable Assure partner program, which the company says enables an easier approach for Tenable technology and channel partners to build and deliver innovative solutions to customer problems.

Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Story image
Fortinet SOARs to new heights of protection on the wings of AI & automation
Jon McGettigan, Fortinet A/NZ Regional Director, talks about SOAR (security orchestration, automation and response) and explains that effective SOAR starts with your security policy.More
Link image
Why performance monitoring is essential to keep cloud costs down
Cloud comes with many different associated costs, which can sneak up on organisations and drive down efficiency. Here's how to reduce costs by up to 50%.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Interview: Check Point profiles 5 battles that SOC teams face in 2020
Security operations centres (SOCs) are often the first lines of defence.More
Story image
Is cyber deception the latest SOC 'game changer'?
Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense.More