Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Cloud Security Product Innovation

At Tenable Cloud Security we work hard to constantly provide innovative and actionable features for our customers in order to easily and rapidly boost their cloud security. Tenable Cloud Security CNAPP secures the full cloud stack from infrastructure, to workloads, identities, data and AI resources. Learn more about our latest cloud security innovations below.

What's new

Hybrid Cloud Security with Tenable One

We are excited to announce the release of cloud attack path analysis with Tenable One! Tenable Cloud Security isn't just cloud security. It's part of the larger Tenable exposure management ecosystem - and that can make a world of difference. As risks don’t live in silos and adversaries don’t attack in a box, being able to use solutions from one vendor for different types of infrastructure (on-prem, cloud, OT, ...) to detect potential attack paths is crucial. Watch this short demo video to learn how the Tenable One platform unifies insights to clearly illustrate potential attack paths that may expose sensitive data and mission critical resources.

Hybrid Cloud Security with Tenable One

 

Demo Video
Unlock Simplified Cloud Vulnerability Management with Tenable Cloud Security API

Tenable Cloud Security now offers a powerful vulnerability scanning API, designed to help cloud security teams tailor their vulnerability management processes. In this demo, we showcase how one of our strategic customers uses the API to track vulnerabilities, query detection and remediation times, and visualize the data in a customized dashboard. Learn how they effortlessly track critical metrics like Mean Time to Remediation, and leverage the Tenable Cloud Security console for deep insights into their cloud workloads. This API empowers you to build flexible solutions that meet your unique cloud security needs, with ease and clarity.

Unlock Simplified Cloud Vulnerability Management with Tenable Cloud Security API

 

Documentation

Demo Video
IaC Security: Support for Terraform modules

Tenable Cloud Security now supports scanning Terraform modules, which enhances your security posture by considering the broader context of modularized code. Tenable analyzes modules (local or remote) that are being called by your Terraform code files, resolving variables and resource definitions in the modules to discover potential misconfigurations in your code.

IaC Security: Support for Terraform modules

 

Documentation

Demo Video
Integrated DSPM features - enable data protection today!

Continuously monitor cloud environments for data exposure and ensure regulatory compliance with new DSPM capabilities. Identify new data resources, and then scan those resources for sensitive data. When sensitive data is discovered it is mapped to known data types, which are grouped into different categories such as Personally Identifiable Information (PII), Protected Health Information (PHI) and Digital Identity identifiers.

Integrated DSPM features - enable data protection today

 

Related Blog: The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP StrategyDocumentation

Demo Video
Using JIT access for sensitive Saas Applications

Most people know Tenable’s cloud security solution is a holistic security platform for cloud environments that provides a suite of security abilities such as workload protection, posture, identity, network analysis, and posture security management However, one of our most popular features is the ability to manage just-in-time access to cloud resources, which allows system administrators to avoid providing permanent access. Following up on market demand, we’ve expanded this ability to manage memberships to groups in identity providers. This is a very popular mechanism for providing access to SaaS applications, and thus, Tenable cloud security can also allow you to avoid giving users permanent access to such applications.

Using JIT access for sensitive Saas Applications

 

Related Blog: Improving Your Cloud Security Using JIT Access for Sensitive SaaS Applications

Demo Video

Resources

Whitepaper
Published 07.19.24
Whitepaper
Published 11.21.24 / Updated 10.10.24
Tenable Cloud Risk Report 2024
Webinar
Published 11.21.24 / Updated 09.24.24
Cloud Security's Blind Spot: Are You Overlooking Identity?