Piscium

Tenable Integration

Bi-directional integration with Tenable Vulnerability Management (formerly Tenable.io) and Tenable.sc. Piscium ingests Tenable scan results as discovery inputs, then validates which vulnerabilities are actually exploitable in your environment. Validation results and risk re-scoring are pushed back to Tenable for unified reporting.

What You Get

Bi-directional integration with Tenable Vulnerability Management (formerly Tenable.io) and Tenable.sc. Piscium ingests Tenable scan results as discovery inputs, then validates which vulnerabilities are actually exploitable in your environment. Validation results and risk re-scoring are pushed back to Tenable for unified reporting.

Why Tenable?

Tenable provides broad vulnerability coverage, but scan results include thousands of findings — most of which are not exploitable in context. Piscium takes Tenable's output and answers the critical question: which of these vulnerabilities can actually be exploited to cause business harm? The result is a prioritized, validated subset that teams can act on with confidence.

Example Scenario

A scheduled Tenable scan identifies 2,400 vulnerabilities across an industrial control network. Piscium ingests these findings and deploys AI agents to validate exploitability. Of the 2,400 findings, Piscium confirms 47 are exploitable in context — and 6 chain into attack paths reaching Level 1 safety controllers. These 6 critical paths are pushed back to Tenable with updated VPR scores and forwarded for immediate remediation.

Implementation Notes

Supports Tenable Vulnerability Management (cloud) via API keys and Tenable.sc (on-premises) via access/secret key pairs. Piscium polls for new scan results on a configurable schedule or can be triggered by Tenable scan completion webhooks. Asset correlation uses IP address, FQDN, and Tenable asset UUID. Requires read access to scan results and write access to asset tags.

Webhook Payload Example

{
  "event": "exposure.validated",
  "timestamp": "2026-03-10T19:05:00Z",
  "exposure_id": "EXP-2026-00356",
  "severity": "critical",
  "cvss_score": 9.8,
  "cve": "CVE-2025-24071",
  "affected_asset": "scada-srv-01.ot.corp.local",
  "tenable_asset_uuid": "f47ac10b-58cc-4372-a567-0e02b2c3d479",
  "tenable_plugin_id": 187234,
  "attack_path_id": "AG-0877",
  "blast_radius": 31,
  "remediation_status": "pending"
}

Ready to Connect Tenable?

See the integration running live in your environment.