Welcome to Tenable MSSP

Last updated: June 06, 2024

Tenable MSSP provides secure and accessible ways for Managed Security Service Provider (MSSP) administrators to manage and maintain multiple customer instances of Tenable products in a single interface.

See Get Started with Tenable MSSP for more information.

Managing Customer Accounts

Maintaining spreadsheets full of customer product data can be tedious, inaccurate, and difficult to track. Tenable MSSP features the default Accounts page, which displays all the Tenable Vulnerability Management customers that you maintain in one easily accessible location. In Tenable MSSP, you can add Tenable Vulnerability Management instances, view relevant customer information about the instances, and add customized notes that include valuable internal tracking or customer contact information. For more information, see Accounts.

Single Sign on to a Customer Tenable Vulnerability Management Instance

Tenable recognizes that each Tenable Vulnerability Management customer instance needs unique login credentials for security. Maintaining these credentials in spreadsheets can be difficult and unsafe. Using Tenable MSSP's Single Sign-on feature, you can access any customer's Tenable Vulnerability Management instance and navigate the user interface with your assigned permissions. When finished, you can then seamlessly pivot back to Tenable MSSP. This approach allows you to sign in once to Tenable MSSP and administer separate customer accounts and instances. For more information, see Instances.

Other Tenable Vulnerability Management Products

Tenable Vulnerability Management

See the User Guide

Tenable Vulnerability Management® allows security and audit teams to share multiple Nessus, Nessus Agent, and Nessus Network Monitor scanners, scan schedules, scan policies and scan results among an unlimited set of users or groups. By making different resources available for sharing among users and groups, Tenable Vulnerability Management provides endless possibilities for creating customized workflows for vulnerability management programs, regardless of any of the numerous regulatory or compliance drivers that demand keeping your business secure.

Tenable Vulnerability Management can schedule scans, push policies, view scan findings, and control multiple Nessus scanners from the cloud. This enables the deployment of Nessus scanners throughout networks to both public and private clouds as well as multiple physical locations.

Tenable Vulnerability Management API

See the API

The Tenable Vulnerability Management API can be leveraged to develop your own applications using various features of the Tenable Vulnerability Management platform, including scanning, creating policies, and user management.

Tenable Container Security

See the User Guide

Tenable Container Security stores and scans container images as the images are built, before production. It provides vulnerability and malware detection, along with continuous monitoring of container images. By integrating with the continuous integration and continuous deployment (CI/CD) systems that build container images, Tenable Container Security ensures every container reaching production is secure and compliant with enterprise policy.

Tenable Web App Scanning

See the User Guide

Tenable Web App Scanning offers significant improvements over the existing Web Application Tests policy template provided by the Nessus scanner, which is incompatible with modern web applications that rely on Javascript and are built on HTML5. This leaves you with an incomplete understanding of your web application security posture.

Tenable Web App Scanning provides comprehensive vulnerability scanning for modern web applications. Tenable Web App Scanning's accurate vulnerability coverage minimizes false positives and false negatives, ensuring that security teams understand the true security risks in their web applications. The product offers safe external scanning that ensures production web applications are not disrupted or delayed, including those built using HTML5 and AJAX frameworks.