News

IDC ranks Tenable as the global leader in vulnerability management solutions market share for 4 consecutive years

Recently, IDC released a report on the Global Device Vulnerability Management Market Share, honoring the vendors that lead the market share. For the fourth year in a row, Tenable was named at the top.

 

 


IDC credits Tenable's success in implementing its acquisition strategy, as well as its Tenable One solution - a threat management platform that provides broad vulnerability coverage for IT infrastructure. , web applications, public cloud platforms, and identity systems, along with context-based risk analysis, all in one unified platform.

 


The IDC report provides both market insight and analysis, as well as trends and advice for technology vendors to ensure they are aligned with future market needs. We believe that Tenable's vision and strategy corresponds to advice from IDC, affirming its ability to meet current and future customer needs.

 


Here are the three recommendations the IDC report makes for technology vendors, along with how Tenable has approached the issue:

 


1. Device vulnerability management (DVM) solution providers should combine external scanning from an attack surface management platform with the use of network scanning tools or using agents to provides complete information about both known and unknown assets.

 


Modern organizations require comprehensive continuous monitoring of the attack surface and intelligent contextual awareness and prioritization of remediation efforts.

 


Through the use of proactive scanning tools, agent usage scanning, continuous monitoring, attack surface management, and configuration management database (CMDB) integration, Tenable One discovers and analyzes Analyze a wide range of assets, including IT assets, cloud resources, containers, and identity systems. However, this represents only a small portion of an organization's assets, and there are devices, applications, and APIs that can be accessed by external users that the security team may not be fully aware of. .

 


Tenable Attack Surface Management, a component of Tenable One, is based on evaluating a series of internet-mapped persistent assets to discover connectivity to internet-exposed organizational assets, whether internal or outside of their network.

 


This combined data provides users with a unified view of all assets, allowing users to create new vulnerability scans and web applications to identify vulnerabilities and eliminate blind spots. In addition, users get a 360-degree view of the entire attack surface, helping to better understand how attackers can access via the internet and assist in prioritizing remedial action.

 


2. Provide a proof of value through which customers can access and use device vulnerability management (DVM) as part of their network security process, rather than treating it as mere a regulatory request or from a network insurance provider.

 


To ensure organizational safety, customers need to anticipate future problems, needs or changes and take appropriate measures quickly.

 


Tenable One provides attack path visualization and prioritization to ensure a proactive response to eliminate avenues an attacker could use.

 


By combining asset, vulnerability, threat, and user authority data to seamlessly map critical risks to the MITER ATT&CK framework, Tenable can identify all attack paths. Feasibility.

 


Users also receive information about their organization's overall cyber risk, including the value of proactive efforts that take place on a daily basis. The metrics show the value of the security team's proactive efforts as well as save time, improve investment decisions, support cyber insurance initiatives, and drive improvement over time - all at the same time. significantly reduce the risk to the organization.

 


3. Provide "lightweight" agents that allow frequent customers to scan quickly and easily.

 


To collect information from each Tenable One application, a series of sensors are deployed across the organization's infrastructure. The fact that sensors connect with the platform plays an important role in gathering information about security, vulnerabilities and assets so that users can manage, monitor and track information systems, applications and assets. user account.

 


Currently, Tenable One supports several sensors such as Nessus vulnerability scanners, Nessus network monitor and Agent Nessus. Tenable's agent provides visibility into temporary assets, such as endpoints, and other remote assets that are not persistently connected to the internet.

 

 

However, for dynamic environments like the cloud with relatively short lifespans of assets, often measured in minutes or hours, it's not feasible to use agents, network monitors, and scanners for assessment.

 


Tenable One supports Agentless Evaluation, a sensor that can continuously monitor for incorrect assets and configurations in the cloud. This mechanism relies on API data and snapshots of running cloud instances to provide monitoring without installing agents, managing credentials, or creating scan schedules.

 


4. Device Vulnerability Management (DVM) vendors should bridge the gap between those responsible for managing vulnerabilities and those responsible for patching them through cross-system integration. sharing a spreadsheet.

 


Tenable's solutions are integrated with leading patch management solutions to bridge the gap between security teams and IT operations. Also, automatically combine the most appropriate remedial action based on the priority vulnerabilities that Tenable detects.

 


Tenable customers can take advantage of more than 250 built-ins from more than 125 technology partners to enrich their IT and security systems, automate workflows, and add new features. Users can also create their own custom integrations to meet unique requirements using Tenable Developer Hub with its fully documented APIs. To see the available integrations, visit the Technology Ecosystem landing page.

 

VNCS - Tenable's security solution distributor. Please contact us immediately for more detailed advice on information security solutions for your business.

 

Source: Tenable | Blogs