TOC & Recently Viewed

Recently Viewed Topics

Connectors uses connectors, including third-party data connectors, to import assets from other platforms.

To use connectors to scan your assets, you must first configure the platform the connector will integrate with, then create the connector.

After you Configure Platforms and Create Connectors, you can Manage Connectors from the Settings page in Connectors supports connectors for Vulnerability Management and Container Security.

Vulnerability Management Connectors

Vulnerability Management includes connectors for the following platforms:

Container Security Connectors Container Security includes connectors for the following asset repositories:

Note: To allow Container Security to import and analyze your assets via a connector, you must first configure the connector to the registry where your assets are stored. For information about Container Security connectors, see Configure Connectors to Import Images in the Container Security User Guide.

  • On-prem networks or computers
  • Amazon Web Service (AWS) Elastic Container Registry (ECR)
  • Local registries (e.g, Docker)

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.