From Our Latest Release…
Aggregating, correlating, cleaning, and organizing vulnerability and asset information from all the security tools our customers use is foundational to Nucleus’s value. Getting all the data in one place and ensuring it’s accurate is the first step towards attaining maturity in managing vulnerabilities effectively.
Ultimately, it’s having the visibility into what you have and who owns what across all of your tools and teams that sets the stage for a successful program, reducing risk by ensuring bad actors looking for exploitable vulnerabilities sulk away empty-handed.
To ensure Nucleus customers can achieve that holistic visibility, we’re constantly adding connectors to sync data from preferred tools, while making it faster and easier to get the answers you need with additional reports.
This month we’ve got a whopper integration to announce and a brand new report that a multitude of Nucleus customers are super excited about. Let’s dive in and see what’s new!
We’re delighted to announce an integration with Tanium! Tanium is a popular platform for endpoint security at enterprise scale and Nucleus now supports several Tanium products: Tanium Comply for vulnerability and compliance findings on infrastructure, and Tanium Asset for asset inventory.
The integration allows customers to post data from Tanium to Nucleus on a recurring schedule. Tanium generates huge volumes of data, so it was important to streamline the ingestion of extremely large files in a performant way.
Now customers of Tanium and Nucleus can enjoy the benefits of syncing hardware and software assets, as well as ingesting vulnerabilities and configuration compliance findings discovered in infrastructure assets by Tanium, with data from other tools for an enhanced global view of all assets and vulnerabilities across the organization.
Not only that, but customers can also leverage asset metadata from Tanium to create fine-grained automation rules that make it easy to abstract away many of the manual and time-consuming tasks like grouping assets, assigning assets and vulnerabilities to individuals and teams, and setting due dates to enforce SLAs.