Logo

Vulnerability Management

Built for continuous exposure reduction, Tenable Vulnerability Management is a cloud-managed vulnerability management platform that helps you discover assets, assess vulnerabilities, and prioritize what to fix first, without running a full on-prem management stack.

Why teams choose this platform

Tenable Vulnerability Management

Tenable Vulnerability Management At a glance

License overview

The Tenable Vulnerability Management license is an annual subscription that unlocks cloud-based vulnerability management and determines how many unique assets you can continuously discover, scan, and track. Tenable prices the subscription by asset (not by IP address) and uses an asset-counting method to identify unique assets and reduce duplication across scan sources. Your subscription term is typically 1 year or multi-year, and while active it provides access to platform updates plus the licensed product capabilities in your Tenable account.

Activation is account-based rather than “installing a key” on every endpoint: once the subscription is provisioned, you add sensors such as linked Nessus scanners and/or agents, then authenticate them to your cloud instance using a linking key from the Sensors/Linked Scanners area. From there, scan templates and policies drive assessment schedules, while the platform counts and reports licensed assets and can reclaim assets over time as they fall out of scope.

For procurement, the clean way to avoid overages is to size for your real asset inventory (including ephemeral cloud resources), decide what discovery methods you will use (network scanners, agents, connectors), and align any add-ons (for example, web applications) with your intended coverage. If you share your asset estimate, environment mix, and term preference, we can map the right subscription and quote-ready bill of materials.

Product Overview

At a high level, Tenable Vulnerability Management combines a cloud console with deployable sensors (scanners and agents) to collect vulnerability data, build an accurate asset inventory, and drive risk-based remediation.

Core technical flow

  1. Provision the cloud tenant and set up users/roles.
  2. Deploy sensors (linked Nessus scanners and/or agents) where scanning must occur.
  3. Link sensors securely using a linking key so they report to your instance.
  4. Create scan policies and target groups to match networks, segments, and cloud scope.
  5. Prioritize + operationalize remediation with built-in risk scoring, reporting, and integrations/APIs.

Tenable Vulnerability Management technical overview

Ordering Guide and Pricing

Activation Guide For Tenable Vulnerability Management

Connected / online activation

  1. In Tenable Vulnerability Management: Settings → Sensors → Linked Scanners → copy the linking key
  2. Deploy a Nessus scanner (or agent) in the target network
  3. Link it to your instance using the linking key (and validate it shows as linked)

Controlled / restricted environments

Frequently Asked Questions