• slide
  • slide
  • slide
  • slide
  • slide
  • slide
  • slide
  • slide


Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies.


  • Tenable® Lumin

    Measure Cyber Exposure and benchmark against peers.

    Calculate, communicate and compare your cyber exposure while managing risk with Tenable Lumin.

    For the first time ever, you can visualize and explore your Cyber Exposure, track risk reduction over time, and benchmark against your peers.

    Use Tenable Lumin, an advanced visualization, analytics and measurement solution, to understand and reduce your Cyber Exposure. Lumin transforms vulnerability data into meaningful insights to help you manage cyber risk across your entire organization.

    Learn More Here

  • Tenable.io®

    Accurately identify, investigate and prioritize vulnerabilities. Managed in the Cloud.

    Tenable.io® provides the actionable and accurate data you need to identify, investigate, and prioritize the remediation of vulnerabilities and misconfigurations in your modern IT environment.

    Learn More Here

  • Tenable.sc™

    Accurately identify, investigate and prioritize vulnerabilities. Managed On-Prem.

    With Tenable.sc (formerly SecurityCenter) you get a real-time, continuous assessment of your security posture so you can find and fix vulnerabilities faster.

    Learn More Here

  • Nessus® Professional

    The #1 vulnerability assessment solution.

    The assets and vulnerabilities on your network are constantly changing. Getting a full picture of your network is half the battle. Trust the #1 vulnerability assessment solution to help you stay a step ahead of attackers.

    Learn More Here

  • Tenable.io® Container Security

    Security integrated into DevOps. Protect containers in development and operations.

    Tenable.io® Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

    Learn More Here

  • Tenable.io® PCI ASV

    Streamline verification of adherence with PCI Data Security Standard.

    Tenable’s PCI ASV solution, a Tenable.io workbench, leverages Tenable.io Vulnerability Management scanning to streamline the ASV process, including running scans, resolving disputes and preparing compliant scan reports as required by PCI 11.2.2.

    Learn More Here

  • Tenable.io® Web App Scanning

    Automated web application scanning. For modern and traditional web frameworks.

    Tenable.io® Web Application Scanning safely, accurately and automatically scans your web applications, providing deep visibility into vulnerabilities and valuable context to prioritize remediation.

    Learn More Here

  • Tenable.ot™ Powered by Indegy

    Get the Operational Technology Security You Need. Reduce the Risk You Don't.

    Industrial Systems Require Industrial Grade Security

    IT and OT infrastructures are rapidly converging. The days of air-gapped systems are gone. Industrial and critical infrastructure organizations are adopting IoT devices at an unprecedented rate.

    As these environments converge and expand, your attack surface and attack vectors do, too. That means you likely have blind spots across your converged IT/OT infrastructure that can lead to unacceptable risk.

    Learn More Here


Government agencies face escalating pressure to maintain constant vigilance against persistent cyber threats and attacks. Federal system integrators and other commercial partners that do business with U.S. government defense, intelligence and civilian agencies must establish robust information security defenses and continuously demonstrate compliance with evolving regulations and standards.

With a deep history of working with government agencies at every level, Tenable has become a primary technology in major federal cyber programs such as ACAS and CDM. Tenable serves government agencies' specialized cybersecurity needs to protect their complex networks against ongoing threats, ensuring systems and technologies are in place to:

  • Continuously monitor on-prem, cloud, mobile and virtual data assets for real-time visibility
  • Proactively protect sensitive data and critical infrastructure from cyber threats
  • Extract actionable data and intelligence for expedited incident response and mitigation
  • Consistently demonstrate real-time compliance with regulatory standards and operational frameworks including NIST, RMF, SAP (Special Access Programs), DFARS, SCAP, CIS and SCADA
  • Integrate with other leading security solutions


State & Local Government

With rapid IT modernization and high-profile data breaches, government agencies are under extraordinary pressure to maintain constant vigilance against cyber threats to critical infrastructure and citizen data, and to establish effective information security defenses, all while demonstrating compliance with diverse regulations and standards.

Tenable solutions can help state and local governments (SLG) effectively assess, manage and secure critical assets to protect citizen data and critical infrastructure, prevent breaches and securely provide essential services, as well as:

  • Discover and assess known and unknown assets across the entire attack surface, spanning cloud, IoT, containers, mobile and on-prem platforms - even non-traditional operating technologies (OT).
  • Continuously monitor for cyber vulnerabilities with broadest detection coverage in the industry, apply compliance standards and automate audit reporting.
  • Focus on vulnerabilities posing the greatest risk for prioritized remediation with Predictive Prioritization to evolve to true Risk-based Vulnerability Management.
  • Calculate, communicate and compare cyber exposure across state agencies and against peer organizations with Tenable Lumin.


Technology Partners

At Tenable, we're committed to collaborating with leading security technology resellers, distributors and ecosystem partners worldwide.  From ingesting third-party data to enriching third-party systems, the Cyber Exposure partner ecosystem connects disparate solutions and data to accelerate an organization’s ability to understand, manage and reduce cyber risk. Together, we are committed to helping organizations of all sizes manage, measure and reduce their cyber risk - and close the Cyber Exposure gap.

Learn more here >>

Count on Carahsoft


We are suddenly facing new cyber risks created by a surge in remote employees who may use personal assets for business or be more susceptible to phishing during times of crisis. To reduce the risk of this new attack vector, we all need to extend our security measures and include remote workers and devices as part of our enterprise vulnerability management programs.



To support you through these changing and uncertain times, Tenable is helping you immediately extend your Tenable.io licenses for free, through June 15. To learn more about these solutions and the special promotions, contact us at (888) 662-2724 or Tenable@carahsoft.com.



For Tenable.sc and Nessus Professional customers, we are offering a free Tenable.io license with unlimited agent scanning for 30 days. To learn more about these solutions and the special promotions, contact us at (888) 662-2724 or Tenable@carahsoft.com.



Tenable Lumin


Calculate, communicate, and compare your cyber exposure while managing risk with Tenable Lumin. Sign up below for a 30 day free trail on Tenable Lumin.



GSA Schedule 70

Dec 20, 2011- Dec 19, 2016


Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022
*Additional Option Years Available


Archived Events


Case Study

To ensure safe and resilient infrastructure and detect security threats thatmcould harm the water supply and disrupt critical services, Raleigh’s public utilities department required full visibility and control of changes made to programmable logic controllers (PLCs) and other key devices in their...


The Tenable Cyber Exposure platform is the industry’s first solution to holistically assess, manage and measure cyber risk across the modern attack surface.

Modern web applications continue to be a challenge for organizations to secure as developers build increasingly complex business applications faster than ever. Many organizations are releasing new or updated web applications multiple times per day, each containing multiple vulnerabilities on av...


Solutions Brief

Introduce Tenable’s ability to discover threats (like ransomware and more) and help prioritize the vulnerabilities that matter most. Position Tenable as a trusted strategic advisor/partner to create a strong cyber hygiene program that prevents damaging cyberattacks. This is an addendum to the Ne...

Protect critical infrastructure and citizen data.

Solutions Brief