Integrate Everywhere with

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Successful vulnerability management (VM) programs aren’t isolated programs. Successful ones include active participants from multiple teams who can share data and results with each other, so that everyone benefits from greater visibility, automation and control. And while in the past VM providers haven’t made their products easy to integrate with, that changes with™. We designed to be the most open VM solution, with multiple ways to integrate it with other products and/or into your workflows and business processes.

Pre-built integrations

With, there’s a strong set of pre-built integrations with complementary systems

With, there’s a strong set of pre-built integrations with complementary systems. For example, there are integrations with credential management systems which make it easier for you to access credentials when doing authenticated scans. There are integrations with patch management systems to make it easy to compare vulnerability results. And integrations with mobile device management systems give access to mobile data that would otherwise be very difficult to access. You can learn more about these and other integrations at our integrations page.

Robust and well-documented API

All the capabilities of Vulnerability Management are available in the API

Even if you’re not currently a customer, you can still take a look at the API today. It’s publicly available and, as you’ll see, is fully documented, simple and testable directly in the browser. All the capabilities of Vulnerability Management – accurate asset tracking, vulnerability states, workbenches and reports, etc. – are available in the API so that customers and partners can use any data they need in an automated fashion. API

Easy-to-use Software Development Kit (SDK)

A dedicated SDK takes a task-oriented approach to using the API

Since not everybody is a programmer, but might still wish to access capabilities and data programmatically, we also created a dedicated SDK, which takes a task-oriented approach to using the API. For example, if you want to run a scan, the scan.launch() function wraps up a variety of API calls into one single line of code.

The current Python SDK is available on GitHub. Additional language support will be available in the future and we’ll continue to enhance the SDK as gains more capabilities. Both customers and partners who want to integrate with, but who lack developer resources to do so, will find the SDK invaluable. SDK for Python

Wrapping up

Integrations make your vulnerability management program more successful, by enabling you to make full use of existing technology investments and by helping to automate manual tasks, so you can focus on the most critical issues. With multiple options available, is easy to integrate into your environment in whatever way makes best sense for your organization.

Integrations make your vulnerability management program more successful

Interested in learning more?

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?