Created with Sketch.

Recovery Email

Your account give you access to even more premium content, don't lose access to it. Provide a recovery email below.
  • Secondary E-mail

Vulnerability Response with Tenable.io and Tenable.sc integration

Why this is important

By installing the Tenable™ for your Vulnerability Response application into your ServiceNow instance, you can import your SecurityCenter vulnerability data and act on it directly within ServiceNow to reduce your overall attack surface. Learn to outline what’s required before installing the SecurityCenter application into your ServiceNow instance, the steps to integrate SecurityCenter with ServiceNow, and how to properly configure the Tenable application.

Steps Covered

1. Configure MID Server and Tenable
2. Download and install the app
3. Configure the app

Key takeaways

The most important things to know

  • When your Tenable SecurityCenter is integrated with your ServiceNow instance, you can pull data from the scanner into Vulnerability Response, prioritize vulnerable items based on business criticality, and assign tasks to IT workers from one console.
  • When items are closed in Vulnerability Response, the workflow can automatically initiate a rescan to ensure the patch was applied successfully and the vulnerability was mitigated.

The payoff of getting this right
Effectively integrating Tenable SecurityCenter will help you prioritize and respond to vulnerabilities faster.

What you need to get started

Prerequisites
ServiceNow Vulnerability Response (either standalone or as part of Security Operations Professional or Enterprise) running Madrid Patch 4, Tenable.sc v5.7 or later—or Tenable.io, Tenable for Assets v2.5, and Tenable Connector v2.5.
Tenable SecurityCenter 5.3 or later

When you should start this activity

As soon as you have both Tenable SecurityCenter and ServiceNow® Vulnerability Response in place

More resources to check out

Success Playbook

Integrate your Tenable.io and Tenable.sc with ServiceNow Vulnerability Response

Learn how to prioritize and respond to vulnerabilities faster.

Success Checklist

Implement ServiceNow Vulnerability Response

Download our step-by-step plan for implementing Vulnerability Response to help prevent breaches.

Success Quick Answer

How does my CMDB impact Vulnerability Response?

Learn why a healthy CMDB is critical for remediating vulnerabilities.

Data Security Playbook

ServiceNow security best pratice guide: Key elements to consider with securing your instance

Get our guidance to ensure security for your implementation.

Success Quick Answer

What is a ServiceNow MID server and how does it work?

Learn when to use a MID Server and how it works with ServiceNow.

Value Calculator

Security Operations Value Calculator

Determine the potential business value you can achieve from ServiceNow.