Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Wiz Reviews & Ratings
    1,059 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    14 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    106 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    13 Ratings
    Company Website
  • Chainguard Reviews & Ratings
    42 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    67 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,343 Ratings
    Company Website
  • Guardz Reviews & Ratings
    96 Ratings
    Company Website
  • Kasm Workspaces Reviews & Ratings
    125 Ratings
    Company Website
  • Google Cloud Platform Reviews & Ratings
    60,418 Ratings
    Company Website

What is Tenable One?

Tenable One delivers an innovative solution that integrates security visibility, insights, and actions across the entire attack surface, enabling modern organizations to pinpoint and mitigate critical cyber threats across IT infrastructures, cloud environments, crucial infrastructures, and more. It is the only AI-powered platform available for exposure management in today’s marketplace. With Tenable's sophisticated vulnerability management sensors, users can achieve a thorough understanding of every asset within their attack surface, encompassing cloud systems, operational technologies, infrastructure, containers, remote workforce, and contemporary web applications. By examining over 20 trillion elements associated with threats, vulnerabilities, misconfigurations, and asset data, Tenable’s machine learning technology enhances remediation efforts by prioritizing the most pressing risks efficiently. This targeted strategy promotes essential improvements that reduce the chances of severe cyber incidents while also delivering clear and objective evaluations of risk levels. In a digital landscape that is constantly changing, having such detailed visibility and predictive capabilities is crucial for protecting organizational assets. Furthermore, Tenable One’s ability to adapt to emerging threats ensures that organizations remain resilient in the face of evolving cyber challenges.

What is Templarbit?

Strengthen and safeguard your applications with a data-driven security approach. Templarbit is transforming the landscape of runtime security by designing it from the ground up to seamlessly integrate with cloud environments while leveraging data intelligence. This cutting-edge, data-oriented strategy enables you to protect APIs and Web Applications more promptly and effectively. Templarbit Sonar delivers quick security monitoring, offering essential insights into the availability, performance, and security configurations of your websites, APIs, and Web Applications. With this solution, you can effortlessly and swiftly implement ongoing security oversight for your applications, allowing for thorough assessments without requiring additional packages, agents, or libraries. Sonar features a comprehensive set of checks that should be fundamental for every software organization, addressing critical components such as uptime, response time, and a detailed analysis of your security settings. Additionally, its intuitive interface facilitates easy comprehension and actionable response to the insights provided, empowering you to uphold a resilient security posture with assurance. This commitment to innovation ensures that your applications remain not only protected but also optimized for performance in an ever-evolving digital landscape.

Media

Media

Integrations Supported

ASPIA
AppSOC
Bizzy
Cohesity
Continuum GRC
CyberArk Secure Cloud Access
GoSecure
Infoblox DDI
Red Hat Cloud Suite
SecureTrack+
Seemplicity
SmartShare
Snyk
Splunk Cloud Platform
Stream Security
Tenable Attack Surface Management
Tenable OT Security
ThreatAware
Trellix Data Encryption

Integrations Supported

ASPIA
AppSOC
Bizzy
Cohesity
Continuum GRC
CyberArk Secure Cloud Access
GoSecure
Infoblox DDI
Red Hat Cloud Suite
SecureTrack+
Seemplicity
SmartShare
Snyk
Splunk Cloud Platform
Stream Security
Tenable Attack Surface Management
Tenable OT Security
ThreatAware
Trellix Data Encryption

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$99 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Tenable

Date Founded

2002

Company Location

United States

Company Website

www.tenable.com/products/tenable-one

Company Facts

Organization Name

Templarbit

Date Founded

2017

Company Location

United States

Company Website

www.templarbit.com

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Popular Alternatives

Popular Alternatives

Criminal IP Reviews & Ratings

Criminal IP

AI SPERA
Flexera One Reviews & Ratings

Flexera One

Flexera