Tenable attack surface management provides visibility into your organisation’s external attack surface

CENTURION – 19 December, 2022 – Visibility is foundational to cybersecurity, yet it is something that few organisations have mastered. As more assets, services and applications reside on the internet, security teams are unaware of their company’s full digital footprint. The reality is that threat actors may often know more about the company’s s attack surface than those within[1].

This intelligence is revealed by exposure management leader Tenable, which is distributed throughout Africa by Exclusive Networks Africa, the African arm of this global trusted cybersecurity specialist for digital infrastructure. Exposure management is an ongoing process that includes proactive asset and threat discovery, continuous monitoring, mitigation, remediation and defence tactics to protect an organisation’s modern IT attack surface from cyber exposure.

Stefan van de Giessen, Country Manager: SA and SADC at Exclusive Networks Africa, explains: “Tenable offers comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect the organisation. Tenable eliminates blind spots, prioritises threats, and reduces exposure and loss. Its latest offering, Tenable.asm, is the industry’s first external attack surface management (EASM) solution fully integrated into an exposure management platform.”

Tenable.asm continuously maps the entire internet and discovers connections to an organisation’s  internet-facing assets so that the security team can assess the security posture of the entire external attack surface. Once those assets and services are properly attributed to the business, Tenable.asm is integrated into Tenable Exposure Management solutions to understand, prioritise and communicate cyber risk for improved decision-making.”

Tenable clarifies that external attack management assists with:

Cybersecurity:  A security team can mitigate risk and avert potential threats by knowing exactly what their organisation owns. Establishing the attack surface is foundational to security strategy.

Compliance and legislation: Tenable.asm allows the security team to be aware of locations where personally identifiable information (PII) is captured and stored, to fully comply with industry regulations. This allows an understanding of which assets have non-compliant technology, missing legal disclaimers and expired copyright notices.

Mergers and acquisitions: An organisation’s security team can discern risk early by being able to see every internet-facing asset of a target company before acquisition is finalised.

 

With more than one million users and more than 20,000 enterprise customers worldwide, Tenable’s customers range from Fortune Global 500 companies to mid-sized and small businesses in all sectors.

Van de Giessen concludes: “We would like to see vulnerability management continuing to grow within this space, to address this fundamental issue. Discovering the vast majority of your internet-accessible assets is a foundation to good security. Tenable.asm allows you to discover and assess these assets that may have been unknown to your organisation, providing visibility into your external risk.”

[1] https://www.tenable.com/products/tenable-asm

Please visit www.tenable.com and follow Tenable on LinkedIn and @Tenable on Twitter.