Cool Company: Tenable Network Security

Categories

Tenable Network Security is a leading security company based in Columbia, MD that started in 2002, and has secured $50M in Series A. Tenable has built up an extensive customer base of 15,000+ customers, and a community of 1 million users. Also, Tenable products are being used by 500 organizations in Mainland China. Overall, Tenable has customers in 150 countries, and many are the who’s who of the enterprise: Google, AT&T, Verizon, Visa, Apple and Dropbox. Tenable offers a security portfolio that includes a vulnerability scanner, correlation engine and log management platform.

Tenable helps detect and secures devices, applications, cloud applications and mobile. The major benefit of the Tenable platform vs the competition is that Tenable offer continuous monitoring of network traffic that detects anomalies and strange behaviors. The Tenable product comes as an onsite solution and cloud based solution. Below is a snap of Tenable Network Security.

Company Background
  • Started: 2012
  • Raised: $50M
  • Linkedin Employee Count: 307
  • Backers: Accel Partners
  • Executives: Ron Gula (CEO), Jack Huffard (President) and Renaud Deraison (Chief Research Officer
  • Product: Vulnerability scanner, log correlation engine and vulnerability management platform
  • Services: continuous monitoring of network traffic; platforms detects and secures all devices from malware, viruses and hackers
  • Customers: 15,000 companies including Google, Amazon, Dropbox, Lookout, Visa, Apple, AT&T, Verizon and
  • 500 customers in Mainland China
  • 1 million user community
Features
  • Vulnerability Scanner: Detects malware and botnets, offers compliance auditing, and provides patch/configuration
  • Perimeter Service: Service that enables customers to manage multiple scanners inside and outside the organization
  • PCI Scanning: Assist customers with periodic vulnerability scans for systems facing the Internet
  • Log Correlation Engine: Includes log management system, and engine that collects and correlates log data from firewalls, application logs and user activity
  • Passive Scanner: asset discovery for mobile, ans scanner for virtual devices and cloud-based applications
Scroll to Top