Welcome to Tenable One Attack Path Analysis
Last updated: May 23, 2023
The Tenable One Exposure Management Platform helps organizations gain visibility across the modern attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
The platform combines the broadest vulnerability coverage spanning IT assets, cloud resources, containers, web apps and identity systems, builds on the speed and breadth of vulnerability coverage from Tenable Research and adds comprehensive analytics to prioritize actions and communicate cyber risk. Tenable One allows organizations to:
- Gain comprehensive visibility across the modern attack surface
- Anticipate threats and prioritize efforts to prevent attacks
- Communicate cyber risk to make better decisions
For an overview demonstration of Tenable One, see the following video:
Tenable One is a package that includes the following products:
Product | Tenable One Package |
---|---|
Tenable Vulnerability Management | Tenable One Standard, Tenable One Enterprise |
Tenable Cloud Security | Tenable One Standard, Tenable One Enterprise |
Tenable Web App Scanning | Tenable One Standard, Tenable One Enterprise |
Lumin Exposure View | Tenable One Standard, Tenable One Enterprise |
Tenable Identity Exposure | Tenable One Standard, Tenable One Enterprise |
Asset Inventory | Tenable One Standard, Tenable One Enterprise |
Attack Path Analysis | Tenable One Enterprise |
Tenable One Enterprise |
What to expect in this guide:
This user guide covers the following interfaces, which can be used alone or in tandem to support these common use cases:
User Type | Use Case |
---|---|
CISO/Executives |
Utilize the Lumin Exposure View to:
|
Security Practitioner |
Utilize the Attack Path Analysis section to:
|
Both CISO/Executives and Security Practitioners |
Utilize the Asset Inventory to:
Note: You must purchase an additional upgrade to access the Asset Inventory interface. Contact your Tenable representative for more information. |
For more information, see Get Started with Attack Path Analysis.