Integrate IoT Security with Tenable

Integrate IoT Security through Cortex XSOAR with Tenable.
In addition to continuously and passively monitoring network traffic to discover devices and assess risk, IoT Security supports the integration of third-party vulnerability scanners such as Tenable.io. You might want to perform an on-demand vulnerability scan to get deeper insights on device vulnerabilities or if IoT Security detects anomalous behavior warranting investigation of a particular device. IoT Security incorporates the scan results such as CVEs into its ongoing risk score assessments. It can also send detected vulnerabilities to a CMMS as work orders for tracking and resolving.
When you initiate a vulnerability scan from the IoT Security portal, it sends a command through Cortex XSOAR to Tenable.io in the cloud. Tenable then relays the scan command to a Nessus scanner, and after the scan is complete, Tenable returns the results in a PDF report through XSOAR to IoT Security. The flow is illustrated step-by-step below.
Integrating with Tenable.io requires the purchase and activation of a third-party integration add-on. The basic integration plan includes a license for three integration add-ons, one of which can be used for Tenable. The advanced plan includes a license for all supported third-party integrations.

Recommended For You