Tenable OT Security Instances

Tenable OT Security protects industrial networks by providing industrial and critical infrastructure operations with visibility, security, and control to ensure safe facility operation while reducing overall risk. You can use Tenable.sc to analyze Tenable OT Security asset and vulnerability data alongside your data from other scanners.

When you configure data synchronization from Tenable OT Security to Tenable.sc, Tenable OT Security sends asset and vulnerability data to an agent repository in Tenable.sc. Tenable OT Security communicates with Tenable.sc using the Tenable.sc API.

Note: It is important to restrict the data Tenable OT Security collects to only the desired host IP address ranges. For example, if Tenable OT Security collects information on 1100 hosts and Tenable.sc is licensed for 1000 hosts, Tenable OT Security sends all of the data to Tenable.sc and Tenable.sc will indicate that you exceeded your host count. For more information, see License Requirements.

Before you begin:

  • Deploy Tenable OT Security, as described in the Tenable OT Security User Guide.
  • Begin vulnerability assessment in Tenable OT Security, as described in the Tenable OT Security User Guide.

To fully configure data synchronization from Tenable OT Security to Tenable.sc:

  1. Add a designated agent repository for Tenable OT Security data in Tenable.sc, as described in Add a Repository.

  2. Using the Tenable OT Security API, configure the Tenable.sc integration to specify the sync schedule, import repository, and authentication.

What to do next:

  • View scan results from Tenable OT Security, as described in View Scan Results.
  • View vulnerability data filtered by your Tenable OT Security repository, as described in Vulnerability Analysis.