Remove products tenable-ciem
article thumbnail

Tenable's Plan to Acquire Ermetic Will Accelerate Customer Value in CNAPP and Exposure Management

Tenable

The acquisition of cloud security innovator Ermetic, once completed, will add unified, elegantly integrated CNAPP and market-leading CIEM capabilities to the Tenable portfolio. Ermetic puts a lot of focus on the unique challenges presented by identities and entitlements in the cloud, helping define today’s CIEM practice.

Cloud 136
article thumbnail

IDC Ranks Tenable No. 1 in Worldwide Device Vulnerability Management Market Share for the Fifth Consecutive Year

Tenable

For the fifth consecutive year, Tenable ranks first in market share. The IDC report noted: “In August 2023, Tenable announced upcoming generative AI capabilities in Tenable One. In October 2023, Tenable completed its acquisition of Ermetic, which offers CIEM and CNAPP.

Marketing 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

Tenable, whose products have had AI technology for years, was very much at the center of this trend, as it integrated GenAI capabilities across the Tenable One Exposure Management Platform in 2023. “AI That was a key insight from Tenable Research’s “ 2022 Threat Landscape Report (TLR),” released in February.

article thumbnail

CNAPP: What Is It and Why Is It Important for Security Leaders?

Tenable

Cloud security tools can help infosec and DevOps pros boost productivity and identify software vulnerabilities, allowing organizations to remain agile in development while strengthening security throughout the software lifecycle process. Cloud Infrastructure Entitlement Management (CIEM). Extensive Automation. Extensive Automation.

article thumbnail

Cybersecurity Snapshot: Insights on Hive Ransomware, Supply Chain Security, Risk Metrics, Cloud Security

Tenable

For more information, watch this video by Justin Hall, a senior research manager at Tenable: To learn more about Hive and ransomware in general, check out these resources: “ Hive claims ransomware attack on Tata Power, begins leaking data ” (Bleeping Computer). Product evaluation. Deployments, which includes: Product acceptance.

Metrics 52
article thumbnail

Unused Access Analyzer: A Leap Toward Least Privilege, Not the End of the Journey

Tenable

Tenable is proud to be a design partner integrating with the custom policy checks into Tenable Cloud Security. This is a significant step forward in enabling customers to achieve least privilege through automatic analysis, an approach led and championed by Tenable Cloud Security since its earliest days.