Tenable achieves FedRAMP ‘Ready’ designation for Tenable Cloud Security

Tenable adds comprehensive web application, API scanning capabilities to its Nessus Expert

Exposure management company Tenable announced that it has achieved the ‘Ready’ designation at the moderate impact level from the Federal Risk and Authorization Management Program (FedRAMP) for Tenable Cloud Security for U.S. Government – Ermetic. 

Ermetic was acquired by Tenable last October. 

Tenable Cloud Security is a comprehensive CNAPP (cloud-native application protection platform) solution that simplifies the identification and remediation of risk across multi-cloud and hybrid environments. Unlike siloed tools that leave visibility gaps, it maps every cloud asset, identity and risk, identifying toxic combinations that pose the greatest threat to the business. 

The FedRAMP ‘Ready’ designation highlights the company’s continued commitment to cloud security and the public sector. By achieving FedRAMP authorization, the U.S. federal government will be able to deploy Tenable Cloud Security across various departments and agencies. 

“Cloud adoption is a critical component of the U.S. federal government’s modernization efforts, but managing security of cloud environments is complex without complete visibility and an accurate understanding of cyber risk,” Joe Welsh, vice president of Public Sector sales at Tenable, said in a recent media statement. “We’re eager to get Tenable Cloud Security into the hands of government IT and security teams to eliminate cloud blindspots and take the guesswork out of remediation.” 

Tenable Cloud Security is the latest Tenable solution to achieve this FedRAMP status. Tenable Vulnerability Management and Tenable Web App Scanning achieved FedRAMP authorization in 2021. Tenable Cloud Security is integrated with both of these solutions.

In November, Tenable published a new study revealing that Australian organizations could not prevent 42 percent of cyberattacks on their businesses, only successfully stopping 58 percent of cyberattacks over the past two years. Consequently, organizations have had to rely on reactive measures rather than preventing attacks from occurring in the first place.

A complimentary guide to the who`s who in industrial cybersecurity tech & solutions

Free Download

Related