Tenable Vulnerability Management

Formerly known as Tenable.io


Managed in the cloud and powered by Nessus technology, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with the ability to predict which security issues to remediate first

Available Integrations

The following Tenable Vulnerability Management integrations can be configured with the Sevco platform:

Product(s)Supported Asset Type(s)Integration Type
Tenable.io AssetsDevicesSource
Tenable.io AssetsDevicesInventory Sync
Tenable.io AssetsDevicesSource


Please review the configuration instructions in the section below before setting up permissions for apps.


  1. Configure the Access Schema

Access Key / Secret Key Schema

Access Key*Tenable generated API access keyabcdef0123456789fedcba
Secret Key*Tenable generated API secret key***********************
  1. Add new integration Select which integration(s) you wish to add. See links for details on additional configuration required.
  1. Configure General Information: OPTIONAL: You can set the following fields to give platform configuration
Name (optional)Uniquely identifiable attribute of the configuration to delineate other similar configurations with the existing organizationDMZ network
Contact Person (optional)A placeholder to input a name or email address of a contact associated with the integration.Jane Doe
Link to Console (optional)A placeholder to input a link to the console of the product Sevco is integrating with for quick reference and access when configuring or editing the integration.www.product.com/devices
Email me about frequent errorsSelect this toggle to receive an email whenever an Integration has a ≥30% error rate in a 24-hour period.n/a
  1. Activate Config: To enable this configuration "Activate".

External Documentation

Creating credentials

You'll be asked to provide credentials that Sevco will use to connect to Tenable.io. The following link will step you through creating an API key. https://docs.tenable.com/tenableio/Content/Settings/GenerateAPIKey.htm

Required Permissions

Please see integration-specific documentation for details

Collect DevicesAdministrator
Sync Device InventoryAdministrator
Collect VulnerabilitiesAdministrator

Note: Your Access Group must have the Can View permission configured for All Assets. Learn more

API Documentation


Contact Us

If you're having problems integrating a source, or if you've found something wrong in this document, please email us at [email protected].

Tags: cloud, vulnerability assessment