To help organizations select the solutions that best meet their requirements, ComplyTec offers a product selection tool. Simply look for the need that most closely matches the scenario you are facing:

I wish to have a solution that: 

  1. provides full visibility across my entire attack surface including IT assets, cloud resources, containers, web apps, and identity systems. 
  2. allows me to search, explain and remediate vulnerabilities using natural language, across assets.
  3. leverage the most comprehensive threat intelligence and data science.  
  4. easily communicates action plans in plain language to my organization and answer questions like: 
    1. How secure are we? 
    2. Where do we stand in our preventative and mitigation efforts 
    3. How are we doing over time? 
    4. What are the key events? 

Solution: Tenable One Exposure Management Platform

I wish to have a solution that can: 

  1. identify and prioritize vulnerabilities on my network 
  2. predict attacks and quickly respond to the most critical vulnerabilities on any of my critical assets, including: 
    1. physical or virtual devices with an operating system connected to a network,
    2. a web application with an FQDN,  
    3. active (not terminated) cloud resource 
  3. be cloud-based

Solution: Tenable Vulnerability Management (Also included in the Tenable One Exposure Management Platform) 

I wish to have a solution that can: 

  1. identify and prioritize vulnerabilities on my network 
  2. predict attacks and quickly respond to the most critical vulnerabilities on any of my critical assets, including: 
    1. physical or virtual devices with an operating system connected to a network,
    2. a web application with an FQDN,  
    3. active (not terminated) cloud resource 
  3. be on-prem 

Solution: Tenable Vulnerability Management (Also included in the Tenable One Exposure Management Platform)

I wish to have a solution that 

  1. provides dynamic application security testing (DAST) 
  2. scans web applications and verify vulnerabilities such as: 
    1. as cross-site scripting (XSS) 
    2. SQL Injection in custom application code 
    3. vulnerable versions of third-party components running on our site 
  3. scans all of our applications, including those built using modern web frameworks, such as: 
    1. JavaScript 
    2. AJAX 
    3. HTML5 
    4. Single Page Applications.  
  4. works alongside my vulnerability management application whether it is cloud-based (Tenable Vulnerability management) or on-prem (Tenable Security Center)  
  5. gives me results immediately 

Solution: Tenable Web App Scanning

I wish to have a solution that: 

  1. Finds and fixes flaws in our Active Directory (AD) and Azure AD 
  2. Identifies dangerous trust relationships 
  3. Scores exposures to help prioritize remediations 
  4. Captures every change in our Active Directory and Azure AD 
  5. Finds links between Active Directory changes and malicious actions 
  6. Allows us to visualize in-depth attack details 
  7. Allows us to explore MITRE ATT&CK descriptions direction from incident details 

Solution: Tenable Identify Security

I wish to have a solution that: 

  1. provides constant visibility into our external attack surface 
  2. helps us discover and assess the security posture of our entire external attack surface 
  3. helps us make decisions to reduce our external attack surface 
  4. identifies where personally identifiable information (PII) is captured and stored, to fully comply with regulations 
  5. assess which assets have non-compliant technology, missing legal disclaimers and expired copyright notices 

Solution: Tenable Attack Surface Management

I wish to have a solution that: 

  1. Allows me to do penetration testing 
  2. Performs vulnerability assessments 
  3. Deploys on any platform 
  4. Scans my web apps 
  5. Scans my internet-facing attack surface 
  6. Scans my cloud infrastructure to uncover security issues as part of my software development lifecycle 
  7. Organizes and triage the threats that matter most 
  8. Allows me to produce reports 

Solution: Tenable Nessus

I wish to have a solution that: 

  1. Provides identity security through 2-factor and multi-factor authentication 
  2. Works only on premise servers 
  3. RSA supports a range of hardware and software authenticators and protocols including OTP, passwordless, and more. 

Solution: RSA SecurID