Definitions

Sorry, no definitions found. You may find more data at tenable.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word Tenable.

Examples

  • While vulnerability scanners such as Tenable's Nessus can provide organizations with loads of valuable data about potential weak points throughout their IT ecosystems, if companies don't have the right roadmap in place to respond to and act on the results provided by the assessment tools, they won't realize as many benefits of the vulnerability management process, Fennelly said.

    eWeek Security Watch 2009

  • Even skeptics of Moy's plan, like Marcus Ranum, chief technology officer at Tenable Security, agree that more comprehensive penetration tests may be the only way to show companies how badly they need to revamp their security.

    NSS Labs' Nasdaq For Hackers Andy Greenberg 2010

  • Ranum, chief security officer at Tenable Network Security and a security instructor, predicts that five years from now "we'll see some of the cracks in cloud computing," and "what's hot today" will be "the security problem five years from now."

    Cloud computing security skeptics abound Ellen Messmer 2010

  • Tenable explanations are given up without being replaced, so that the new theory leaves much more unexplained than the previous one.

    Science and Pseudo-Science Hansson, Sven Ove 2008

  • _Tenable_ ground for argument is ground which is _capable of_ being

    Orthography As Outlined in the State Course of Study for Illinois Elmer W. Cavins

  • Tenable or untenable, my memory has clutched the stately syllogism.

    McClure's Magazine, Vol. 6, No. 4, March, 1896 Various

  • Jack Daniel, a product manager at U.S. security firm Tenable Network Security, notes that IP Internet Protocol addresses can be easily hidden, and that China is often used as a "big, bad, Red Scare."

    The Globe and Mail - Home RSS feed IAIN MARLOW 2012

  • As normal we will be meeting at the Columbia, MD offices of Tenable

    Planet Ubuntu Chuck 2010

  • Tenable provides a tool, known as c2a ( "configuration to audit") that, among other things, will take as input a list of files and directories and generate an audit file that checks the md5 hashes for everything you specify.

    Digital Bond Jason Holcomb 2010

  • "Tenable continues to invest significant research and development resources to ensure that our portfolio of products and solutions are secure and deliver third-party-validated capabilities to our customers," said Ron Gula, CEO of Tenable.

    The Earth Times Online Newspaper 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.