Tenable Launches Suite of New Features to Cloud-Native Application Security Platform
Tenable.cs enhancements secure cloud resources, container images, and cloud assets
February 3, 2022
PRESS RELEASE
February 2, 2022
Columbia, MD
Enhancements to Tenable.cs deliver full stack, full lifecycle cloud-native security
Tenable®, the Cyber Exposure company, today announced new capabilities for Tenable.cs, its cloud-native application security platform. Tenable.cs delivers full lifecycle cloud-native security to address cyber risks from build to runtime. With the new features, organizations can secure cloud resources, container images and cloud assets to provide end-to-end security from code to cloud to workload.
Tenable.cs enables organizations to programmatically detect and fix cloud infrastructure misconfigurations in the design, build and runtime phases of the Software Development Lifecycle (SDLC) to prevent unresolved insecure configuration or exploitable vulnerabilities from reaching production. Tenable.cs secures infrastructure as code (IaC) before deployment, maintains a secure posture in runtime, and controls drift by synchronizing configuration between runtime and IaC. The IaC remains the single source of truth, eliminating the need for complex and manual processes. The solution also includes Frictionless Assessment and Nessus® Vulnerability Assessment for cloud workloads as well as Container Security to assess cloud hosts and container images for vulnerabilities without the need to manage scan schedules, credentials or agents.
“Shift-left is the future of cloud security,” said Nico Popp, chief product officer, Tenable. “It is about finding and remediating security risk across configuration, access and software vulnerabilities before the exposure finds its way into production. Tenable.cs embraces the GitOps philosophy by tightly integrating with developer tools and workflows.”
Tenable.cs is fully integrated into Tenable.ep™, the company’s comprehensive Cyber Exposure platform. With this addition, Tenable delivers an integrated, end-to-end security solution and a complete picture of cyber risks across the modern attack surface with unified visibility into code, configurations, assets and workloads. Organizations can determine the cyber risk of their cloud resources alongside other assets, such as IT assets, web apps and containers. Tenable.ep helps organizations understand cyber risk in the broader context of their business, with holistic visibility and reporting, unified workflow and advanced analytics to help users assess and prioritize what matters most to their organization.
Tenable.cs data is also fully integrated into Tenable.io®, providing unified views of assets and vulnerabilities. Organizations can tap key capabilities, such as analyzing cloud exposures alongside their other assets, advanced search and filtering with meta tagging, streamlined reporting, comprehensive role-based access controls, and a single sign-on for easy access.
Tenable.cs is available as a standalone solution, as part of Tenable.io and as part of Tenable.ep.
For more information about Tenable.cs, visit tenable.com/products/tenable-cs or join us on Wednesday, March 2nd at 2p.m. EST for a webinar Introducing Tenable.cs: Secure Every Step From Code to Cloud. Register here https://www.tenable.com/webinars/introducing-tenable-cs-secure-every-step-from-code-to-cloud.
About Tenable
Tenable® is the Cyber Exposure company. Approximately 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024