SecurityScorecard allies with Tenable to monitor cybersecurity risk


U.S.-based information security company, SecurityScorecard has recently entered into a partnership with cyber exposure company, Tenable, Inc.

As per reliable sources, the partnership will involve combining Tenable's supreme visibility and intensity of analytics into enterprise surroundings with SecurityScorecard’s cyber monitoring solutions to offer a complete view into an organization's risk posture.

The alliance will lead CISOs, IT leaders and security teams to evaluate their SecurityScorecard rating, check external cybersecurity health, and recognize threat posture at once in the Tenable Lumin dashboard.

Ray Komar, Vice President of Technical Alliances, Tenable, said that at present knowing about the up-to-date risk posture of an organization has become a need, which is becoming more dynamic, complex and transient lately.

Mr. Komar added that their firm is thrilled to have collaborated with SecurityScorecard to offer customers full visibility of the risks inside and outside their environment and supervise how to reduce risk most effectively with a single platform.

Cybersecurity testing procedures that are performed point-in-time or periodic have become obsolete. Today's cyber risks vary by minute, so businesses require solutions that can keep up with the fast-paced nature of cybersecurity by constantly monitoring for vulnerabilities and assessing the cyber resilience and security posture across the organization.

The collaboration combines real-time visibility of external vulnerabilities from SecurityScorecard with Tenable Lumin's advanced analytics competencies for assessing risk.

This authorizes customers of Tenable Lumin with intelligence to build external risk management and threat detection playbooks through real-time updates, empowering organizations to recognize and respond to threats effectively .

With this partnership, customers can objectively measure the threat posture of external and internal assets, handle a single platform and empower workflows to track modifications throughout their externally facing environments.

They can also reduce the cost and burden of cybersecurity factor proliferation to get extra insights out of vulnerability control statistics without increasing the security stack.

Source Credit -