Connectors
This quick-reference guide aims to help you understand how Tenable Exposure Management works with data from third-party connectors, and highlights the best practices to use when managing them.
What is a Connector?
Tenable Exposure Management ingests security and inventory data from existing tools, such as vulnerability scanners, cloud providers, inventory tools, SCA/SAST/DAST, and more.
Connectors are integration modules that allow Tenable Exposure Management to sync with third-party security and inventory tools. They ingest asset and vulnerability data from external platforms and display it alongside Tenable-native data in a single, unified interface.
Supported Integrations (Connectors)
Supported integrations include a variety of asset inventory and security sources from various vendors. These security tools include:
-
DAST
-
CSPM
-
CWPP
-
IoT
-
Network Scanners
-
Endpoint Security
-
Bug Bounty
-
ASM
-
Asset Inventory
Over time, Tenable will continue to add connectors to the Connectors Library in Tenable Exposure Management.
For the complete list of supported integrations, see Connectors and Supported Integrations.
Connectors Guides
Each connector has a dedicated guide. These guides are extensive and include all relevant information for configuring a specific connector. The guides are available within the Exposure Management User Guide.
Ingested Data
Tenable Exposure Management ingests assets, weaknesses, and findings from third-party vendors.
-
Assets: An asset is any object that represents a part of your organization's attack surface. Assets can be endpoints, apps, cloud resources, code, and more. For the complete list of ingested asset types, see Asset Classes.
- Weaknesses: Weaknesses are vulnerabilities and misconfigurations on your assets. Ingested weaknesses include:
- Weakness Status
- Risk Score
- Findings: A finding is a single instance of a vulnerability (weakness or misconfiguration) appearing on an asset, identified uniquely by plugin ID, port, and protocol.
Interacting with Connector Data in Tenable Exposure Management
As connectors ingest asset, vulnerability, and findings data from third-party platforms, Tenable Exposure Management consolidates this information into its unified data model. Once ingested, the data becomes available across the platform—enabling you to view, analyze, and prioritize it alongside Tenable-native data.
See the following topics in the Tenable Exposure Management User Guide for more information:
Resources Within this Guide
Review the following resources within this guide to familiarize yourself with connector best practices and frequently asked questions: