Welcome to Tenable One Attack Path Analysis

Last updated: February 03, 2023

Tenable One is an Exposure Management Platform to help organizations gain visibility across the modern attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.

The platform combines the broadest vulnerability coverage spanning IT assets, cloud resources, containers, web apps and identity systems, builds on the speed and breadth of vulnerability coverage from Tenable Research and adds comprehensive analytics to prioritize actions and communicate cyber risk. Tenable One allows organizations to:

  •     Gain comprehensive visibility across the modern attack surface
  •     Anticipate threats and prioritize efforts to prevent attacks
  •     Communicate cyber risk to make better decisions

For an overview demonstration of Tenable One, see the following video:

Tenable One is a package that includes the following products:

Product Tenable One Package
Tenable.io Tenable One Standard, Tenable One Enterprise
Tenable.cs Tenable One Standard, Tenable One Enterprise
Web Application Scanning Tenable One Standard, Tenable One Enterprise
Lumin Exposure View Tenable One Standard, Tenable One Enterprise
Tenable.ad Tenable One Standard, Tenable One Enterprise
Asset Inventory Tenable One Standard, Tenable One Enterprise
Attack Path Analysis Tenable One Enterprise

Tenable.asm

Tenable One Enterprise

What to expect in this guide:

This user guide covers the following interfaces, which can be used alone or in tandem to support these common use cases:

User Type Use Case
CISO/Executives

Utilize the Lumin Exposure View to:

  • Quickly quantify your overall enterprise risk exposure and identify which areas need further investigation.

  • Create custom exposure cards to view data based on specific business contexts.

  • Measure and prioritize risk exposure progress or regression.

  • Easily communicate important risk information to teams and include in presentations.

  • Understand how effective your program is via the Remediation Maturity metric.

Security Practitioner

Utilize the Attack Path Analysis section to:

  • Evaluate the impact of insecure assets and communicate these insecurities to appropriate parties.

  • Proactively identify hidden security issues within my assets and their relationships.

Both CISO/Executives and Security Practitioners

Utilize the Asset Inventory to:

  • Utilize existing tags or create new tags that can be used to create custom exposure cards.

  • View and manage all assets, regardless of their source.

Note: You must purchase an additional upgrade to access the Asset Inventory interface. Contact your Tenable representative for more information.

For more information, see Get Started with Attack Path Analysis.