It's a product that combines Tenable.io vulnerability management, endpoint security, and cloud security, covering cloud application vulnerabilities, web application vulnerabilities, and identity management systems. With Tenable.one, we can manage vulnerabilities and view our entire risk scoring. We can see information about our cloud infrastructure, web applications, endpoints, and even external logins from outside the corporate network.
Security Operation Coordinator at a financial services firm with 10,001+ employees
Real User
2023-06-23T14:50:49Z
Jun 23, 2023
I use the product for control and visibility of all the user activities. I check if we have any vulnerabilities in the data. Mostly, I check if a privileged user is doing something wrong.
I primarily propose the solution to clients to help their companies manage risk. It's used mostly for risk management. It's great for endpoints, servers - basically everything. If a company wants to manage, analyze, or investigate rich, they can use this product.
Threat Intelligence Platforms offer organizations tools to identify, assess, and manage cyber threats efficiently. They integrate with existing security systems, enhancing threat detection and response capabilities to ensure robust cybersecurity defenses.These platforms aggregate and analyze threats from numerous sources, providing valuable insights into potential vulnerabilities and attack vectors. They are essential for organizations looking to streamline their cybersecurity efforts by...
I use this solution for vulnerability management for the infrastructure, one cloud security, CSPM, and application dynamic testing.
It's a product that combines Tenable.io vulnerability management, endpoint security, and cloud security, covering cloud application vulnerabilities, web application vulnerabilities, and identity management systems. With Tenable.one, we can manage vulnerabilities and view our entire risk scoring. We can see information about our cloud infrastructure, web applications, endpoints, and even external logins from outside the corporate network.
I use the product for control and visibility of all the user activities. I check if we have any vulnerabilities in the data. Mostly, I check if a privileged user is doing something wrong.
I primarily propose the solution to clients to help their companies manage risk. It's used mostly for risk management. It's great for endpoints, servers - basically everything. If a company wants to manage, analyze, or investigate rich, they can use this product.