It's a product that combines Tenable.io vulnerability management, endpoint security, and cloud security, covering cloud application vulnerabilities, web application vulnerabilities, and identity management systems. With Tenable.one, we can manage vulnerabilities and view our entire risk scoring. We can see information about our cloud infrastructure, web applications, endpoints, and even external logins from outside the corporate network.
Security Operation Coordinator at a financial services firm with 10,001+ employees
Real User
2023-06-23T14:50:49Z
Jun 23, 2023
I use the product for control and visibility of all the user activities. I check if we have any vulnerabilities in the data. Mostly, I check if a privileged user is doing something wrong.
I primarily propose the solution to clients to help their companies manage risk. It's used mostly for risk management. It's great for endpoints, servers - basically everything. If a company wants to manage, analyze, or investigate rich, they can use this product.
Find out what your peers are saying about Tenable, CrowdStrike, Recorded Future and others in Threat Intelligence Platforms (TIP). Updated: October 2025.
Threat Intelligence Platforms provide comprehensive solutions for collecting, analyzing, and managing threat data. They enhance security teams' understanding and response capabilities, ensuring proactive defense against emerging threats.These platforms aggregate vast amounts of threat data from multiple sources, offering a centralized interface for organizations to manage and analyze security threats efficiently. By automating threat data collection and enhancing threat analysis, they enable...
I use this solution for vulnerability management for the infrastructure, one cloud security, CSPM, and application dynamic testing.
It's a product that combines Tenable.io vulnerability management, endpoint security, and cloud security, covering cloud application vulnerabilities, web application vulnerabilities, and identity management systems. With Tenable.one, we can manage vulnerabilities and view our entire risk scoring. We can see information about our cloud infrastructure, web applications, endpoints, and even external logins from outside the corporate network.
I use the product for control and visibility of all the user activities. I check if we have any vulnerabilities in the data. Mostly, I check if a privileged user is doing something wrong.
I primarily propose the solution to clients to help their companies manage risk. It's used mostly for risk management. It's great for endpoints, servers - basically everything. If a company wants to manage, analyze, or investigate rich, they can use this product.