Tenable Improves Shift-Left Cloud Security to Prevent Vulnerable Containers From Reaching Runtime
Tenableยฎ, the Exposure Management company, today announced new Tenable Cloud Security features that deliver automated operating system (OS) vulnerability detection across container images, registries and pipelines. Building on existing exposure management capabilities, Tenable Cloud Security enables security teams to prevent OS vulnerabilities and other risks from being deployed in runtime environments.
Posted: Wednesday, Jul 19
  • KBI.Media
  • $
  • Tenable Improves Shift-Left Cloud Security to Prevent Vulnerable Containers From Reaching Runtime
Tenable Improves Shift-Left Cloud Security to Prevent Vulnerable Containers From Reaching Runtime

Sydney โ€“ Australia โ€“ 19 July 2023Tenableยฎ, the Exposure Management company, today announced new Tenable Cloud Security features that deliver automated operating system (OS) vulnerability detection across container images, registries and pipelines. Building on existing exposure management capabilities, Tenable Cloud Security enables security teams to prevent OS vulnerabilities and other risks from being deployed in runtime environments.

 

A recent study conducted by Forrester Consulting on behalf of Tenable finds that 32% of organisations are planning to implement containers in the next 12 months, while over half (51%) have already done so1. Containers are an increasing security concern as they make up a large percentage of the enterprise digital landscape. Traditional container security efforts have focused on developer-driven tooling rather than involving the security team, which leads to increased silos and prevalent vulnerabilities.ย 

 

Tenable Cloud Security agentless container scanning enables security teams to prioritise and prevent container OS vulnerabilities and other risks in multi-cloud environments using a single user interface. Security teams can leverage the same OS vulnerability detection theyโ€™ve come to trust from Tenable for container images. By focusing on scanning images stored in container image registries and as part of DevOps workflows and pipelines, security teams can stop risky images from being deployed to production, reduce alert noise and scale container adoption across their organization safely and securely.ย 

 

Tenableโ€™s approach to container OS vulnerability management enables customers to:

  • Gain complete visibility by monitoring, reporting and remediating vulnerabilities across the container deployment lifecycle in one place.
  • Prevent exposures and reduce alert noise by embedding security controls into pipelines, stopping risky images from being deployed and auto-generating pull requests.ย 
  • Drive scale and efficiency by employing a single-policy framework that enables security teams to create preventive policies for system host vulnerabilities the same way they do for infrastructure misconfigurations.ย 

More information on Tenable Cloud Security is available atย https://www.tenable.com/products/tenable-cs.ย 

About Tenable

Tenableยฎ is the Exposure Management company. Approximately 43,000 organisations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessusยฎ, Tenable extended its expertise in vulnerabilities to deliver the worldโ€™s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more atย tenable.com.

Share This