NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
April 29, 2019

Quickstart: Tenable Vulnerability Management Architecture

Justin Fimlaid Justin Fimlaid

Are you looking to build your vulnerability management program using Tenable products? If so, this quick start guide will help you get orientated with the Tenable Vulnerability Management suite.

What is Tenable Vulnerability Management?

Formerly Tenable.io, Tenable Vulnerability Management is Tenable’s cloud scanner, or SaaS platform. Hosted in the cloud, Tenable Vulnerability Management offers users many benefits such as scalability, global availability, and cloud asset management. It’s comprised of multiple types of sensors and produces solutions that work together to assist organizations with measuring their cyber exposure.

When to Use Tenable Vulnerability Management Sensors, Agents, and Scanners

Tenable Vulnerability Management supports multiple types of sensors from internal and cloud-based active scanners to passive sensors, agents, and third-party connectors. Users must weigh the benefits and disadvantages of each type of sensor when setting up their environment. Active Nessus scanners are the core of Tenable Vulnerability Management data gathering. They have the capability to fully enumerate SSL and TLS ports and are the best sensors for gathering vulnerability information.

Tenable Internal Scanners

Internally placed scanners identify compliance and network vulnerabilities. However, active port scans can be invasive and have the potential to disrupt some devices, especially when credentials are not used. Using administrator level credentials in an active scan can greatly reduce this risk since credentials allow the scanner to perform many checks locally. A credential scan is the recommended best practice detecting many more vulnerabilities than an uncredentialed scan and utilizing less network bandwidth to test targets. If you’re worried about adding another admin credential then you should look into the CyberArk Vault integration for Tenable to protect privileged accounts.

Tenable Passive Network Monitor

Passive Nessus network monitor sensors are the type of sensor best suited for an operational technology or OT environment and for other fragile devices. Using Nessus’ network monitor is also an excellent way to detect new assets on network. But since it only senses network traffic, they don’t gather as much information about assets as active scanners do.

Tenable Agents

Nessus agents are ideal for systems that cannot be reliably reached by the network (e.g., laptops for a mobile workforce that only occasionally connects to the corporate network). Agents always perform local or credential checks with the system level account, which can detect more vulnerabilities than an uncredentialed network scan. This eliminates the need to use remote credentials for high quality scans such as on database servers or protected networks where inbound network traffic is very undesirable. Since the scan is local, it generally runs faster than an active scan. Agents are not the most effective solution for targets with minimal resources since they’re installed locally, and also don’t enumerate network level services (e.g., SSL/TLS).

Tenable Vulnerability Management Cloud Scanners

Cloud scanners are the best sensors to use for detection and vulnerability assessment of public facing and cloud assets. Cloud scanners have multiple advantages. Since they’re hosted by Tenable, there’s no user maintenance, and they give users insight into what an attacker can see from outside the network. Keep in mind that cloud scanners cannot scan internal assets. Tenable. also supports third-party connectors for AWS and Qualys. These allow users to identify cloud assets easily and are API driven for automatic visibility, though some connectors require setup to work properly.

All sensors combine to add data into multiple Tenable product solutions. Tenable Vulnerability Management is a comprehensive solution built on leading Tenable Nessus technology and managed in the cloud that helps customers understand their cyber exposure. Additionally, Tenable supports options for container security, PCI ASV, and web application scanning. Tenable Vulnerability Management features a streamlined and intuitive interface for managing assets and vulnerabilities. It collects vulnerability and asset data from all sensors and combines the data into multiple dashboards and reports.

If multiple sensors detect the same asset, that data is combined for a full picture of each asset and its activities. Customers can also recast or accept vulnerability risk so they can tailor it to their own unique environment and needs.

Tenable Vulnerability Management Web Application Scanning

The Tenable web application scanning solution organizes all web application vulnerabilities on a single dashboard. It uses a specialized scanner that can detect some web vulnerabilities that a regular Nessus scan will miss. Specialized scan policy templates make web application scans easy to configure. Tenable container security fits into users’ DevOps pipelines to make them aware of issues with their images.

PCI DSS Approved Scanning Vendor

Tenable Vulnerability Management is a certified global ASV or Approved Scanning Vendor solution for the Payment Card Industry Data Security Standard or PCI DSS. The PCI ASV  product solutions enables users to satisfy their external PCI reporting requirements. The PCI workbench offers an easy way to submit track and attestations.

Tenable OT Security

Tenable’s industrial security solution offers great technological value for OT users. Tenable OT Security manages multiple Nessus network monitor passive sensors allowing for safe vulnerability detection in a fragile OT environment. Tenable has a partnership with Siemens to detect many types of industrial control system or ICS devices.

Included Topics

  • Cybersecurity Technology
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Cybersecurity Technology 2 min read
Tenable Vulnerability Management: Sensor Deployment Best Practices Read More
Managed Detection and Response 6 min read
Building a Vulnerability Management Program with the End in Mind Read More
Security Testing 10 min read
Penetration Testing versus Vulnerability Scanning: What's the Difference?
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.