: Integrate IoT Security with Tenable
Focus
Focus

Integrate IoT Security with Tenable

Table of Contents

Integrate
IoT Security
with Tenable

Integrate
IoT Security
through
Cortex XSOAR
with Tenable.
In addition to continuously and passively monitoring network traffic to discover devices and assess risk,
IoT Security
supports the integration of third-party vulnerability scanners such as Tenable.io. You might want to perform an on-demand vulnerability scan to get deeper insights on device vulnerabilities or if
IoT Security
detects anomalous behavior warranting investigation of a particular device.
IoT Security
incorporates the scan results such as CVEs into its ongoing risk score assessments. It can also send detected vulnerabilities to a CMMS as work orders for tracking and resolving.
When you initiate a vulnerability scan from the
IoT Security
portal, it sends a command through
Cortex XSOAR
to Tenable.io in the cloud. Tenable then relays the scan command to a Nessus scanner, and after the scan is complete, Tenable returns the results in a PDF report through XSOAR to
IoT Security
. The flow is illustrated step-by-step below.
Integrating with Tenable requires either a full-featured Cortex XSOAR server or the purchase and activation of an
IoT Security
third-party integration add-on license, which comes with a free cohosted Cortex XSOAR instance. The basic plan includes a license for three integration add-ons, one of which can be used for Tenable. The advanced plan includes a license for all supported third-party integrations.

Recommended For You