{"id":65277,"date":"2022-10-11T09:57:43","date_gmt":"2022-10-11T05:57:43","guid":{"rendered":"https:\/\/techxmedia.com\/?p=65277"},"modified":"2022-10-11T09:57:46","modified_gmt":"2022-10-11T05:57:46","slug":"tenable-launches-tenable-one-at-gitex-global-2022","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/tenable-launches-tenable-one-at-gitex-global-2022\/","title":{"rendered":"Tenable launches Tenable One at GITEX Global 2022"},"content":{"rendered":"\n<p>Tenable, the Exposure Management company, announced the Middle East release of Tenable One, a revolutionary Exposure Management platform that unifies discovery and visibility into \u200b\u200ball assets and assesses their exposures and vulnerabilities across the entire attack surface for proactive risk management, at GITEX Global 2022.<\/p>\n\n\n\n<p>In order for security teams to transition from reactive fire-fighting to proactive prevention, Tenable One provides context-driven risk analytics. Teams working on cybersecurity can foresee dangers and stop them before they can do any harm. To obtain a unified understanding of cyber risk, the cloud-based platform discovers and evaluates assets throughout the enterprise attack surface.<\/p>\n\n\n\n<p>Tenable One enables organizations to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Visualize Assets and Vulnerabilities <\/strong>&#8211; eliminates areas of known and unknown security risk and builds a baseline for effective risk management. It combines the power of a unified view of all assets and associated software vulnerabilities, poor configurations and excessive entitlements with a continuous vulnerability assessment.<\/li><li><strong>Predict and Prioritize <\/strong>&#8211; applies context to anticipate the consequences of a cyberattack faster and significantly improves remediation prioritization. It enables security teams to continuously identify and focus on the exploitable attack pathways that create the most risk.<\/li><li><strong>Effectively Communicate Risk <\/strong>&#8211; provides a centralized and business-aligned view of cyber risk and actionable insights. It enables organizations to accurately and effectively communicate to different stakeholders about cyber risk and which actions can most efficiently reduce it.<\/li><\/ul>\n\n\n\n<p>In average, an organization may end up with around 130 cybersecurity solutions which have their own analytics and reporting. These discrete tools can lead to duplicate efforts and unintended gaps in security programs leaving security practitioners with no clear base to reduce risk or succinctly communicate an organization\u2019s security posture<\/p>\n\n\n\n<p>With Tenable One, organizations can easily translate technical asset, vulnerability and threat data into business insights and actionable intelligence vital for business decision-makers and practitioners. This real-time translation of cyber risk answers stakeholders\u2019 hard-hitting cybersecurity questions \u2013 such as \u201chow secure are we?\u201d and \u201chow has our security posture improved over time?\u201d \u2013 by providing clear metrics to measure, compare and easily communicate cyber risk.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:22% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/techxmedia.com\/wp-content\/uploads\/2022\/10\/Maher-Jadallah-Senior-Director-Middle-East-North-Africa-Tenable-1-683x1024.jpg\" alt=\"\" class=\"wp-image-65281 size-full\" srcset=\"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2022\/10\/Maher-Jadallah-Senior-Director-Middle-East-North-Africa-Tenable-1-683x1024.jpg 683w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2022\/10\/Maher-Jadallah-Senior-Director-Middle-East-North-Africa-Tenable-1-200x300.jpg 200w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2022\/10\/Maher-Jadallah-Senior-Director-Middle-East-North-Africa-Tenable-1-768x1152.jpg 768w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2022\/10\/Maher-Jadallah-Senior-Director-Middle-East-North-Africa-Tenable-1-1024x1536.jpg 1024w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2022\/10\/Maher-Jadallah-Senior-Director-Middle-East-North-Africa-Tenable-1-1365x2048.jpg 1365w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2022\/10\/Maher-Jadallah-Senior-Director-Middle-East-North-Africa-Tenable-1-scaled.jpg 1707w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Maher Jadallah, Senior Director Middle East &amp; North Africa, Tenable said \u201cWhen we think of traditional network security, the goal is to fortify the perimeter to prevent threats outside of the network from getting in. However, the way we work today means this approach is no longer feasible. We need to stop simply treating the symptoms of cyber risk and actually look for a cure.\u201d<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>The Tenable One Platform reduces noise by consolidating all of an organization&#8217;s attack surfaces, both on-premises and in the cloud. It collects vulnerability information from identity management systems, web apps, public clouds, and IT infrastructure. This aids security professionals in foreseeing the effects of a cyberattack. Tenable One understands relationships between assets, exposures, privileges, and threats across attack routes while utilising the largest vulnerability management data set in the business from Nessus.<\/p>\n\n\n\n<p>Glen Pendley, Chief Technology Officer, Tenable said \u201cA platform approach to exposure management is the real game changer, surpassing the ineffective and expensive point solution approach that the industry has taken for decades. Tenable One delivers holistic insight into exposures that can serve as a true north for security teams.\u201d<\/p>\n\n\n\n<p>Tenable One combines vulnerability management, external attack surface management (EASM), identity management and cloud security data to discover weaknesses before attackers can exploit them. It continuously monitors environments \u2013 from traditional IT assets to cloud resources and identity systems \u2013 delivering the broadest vulnerability coverage available.<\/p>\n\n\n\n<p>Along with Tenable One, the company introduced three new capabilities that are foundational to exposure management programs:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li> <strong>Lumin Exposure View<\/strong> &#8211; provides clear and concise insights into an organization\u2019s cyber exposure, giving security teams the ability to surface and accurately answer critical questions about security posture<\/li><li><strong>Attack Path Analysis (APA)<\/strong> &#8211; enables security teams to view attack paths from externally identified points through to critical internal assets to focus mitigation on areas of highest risk<\/li><li><strong>Asset Inventory<\/strong> &#8211; provides users with a centralized view of all assets, including IT, cloud, Active Directory and Web applications, with the ability to create specific asset tags from a variety of sources and use cases<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Tenable, the Exposure Management company, announced the Middle East release of Tenable One, a revolutionary Exposure Management platform that unifies discovery and visibility into \u200b\u200ball assets and assesses their exposures and vulnerabilities across the entire attack surface for proactive risk management<\/p>\n","protected":false},"author":40,"featured_media":65279,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9716,9661],"tags":[6752,314,5567,9607,3985,5661,1867,2548,1051],"contributor":[9732],"class_list":["post-65277","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-global-brands","category-tech-value-chain","tag-cyber-risk","tag-cybersecurity-2","tag-gitex","tag-gitex-2022","tag-gitex-technology","tag-gitex-technology-week","tag-middle-east","tag-tenable","tag-vendors","contributor-news-desk"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2022\/10\/tenable-one-fetaured.jpg","author_info":{"display_name":"Techx Admin","author_link":"https:\/\/techxmedia.com\/en\/author\/techxadmin\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/65277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=65277"}],"version-history":[{"count":0,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/65277\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/65279"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=65277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=65277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=65277"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=65277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}