Overview
You can pull data into Tenable Vulnerability Management (formerly known as Tenable.io) through a number of methods. Depending on your business needs, you may want to ingest one or multiple data types, which you can then view and analyze within the user interface.
This document aims to describe each method of data ingestion supported by Tenable, and provides you with a series of steps to get your data up and running within Tenable Vulnerability Management.
For more information on each method of data ingestion, see the following topics: