Tenable Launches OPEN Platform to Unite Fragmented Cybersecurity Tools in the AI Era

The company said the new platform is designed to address growing operational complexity caused by fragmented security tools, disconnected workflows and rapidly evolving attack methods powered by AI.

Share
Tenable Launches OPEN Platform to Unite Fragmented Cybersecurity Tools in the AI Era
(Image-Freepik)

Tenable has unveiled the Tenable Open Partner Exchange Network (OPEN), a major expansion of its cybersecurity ecosystem to help enterprises unify security data and respond faster to AI-driven cyber threats.

The company said the new platform is designed to address growing operational complexity caused by fragmented security tools, disconnected workflows and rapidly evolving attack methods powered by artificial intelligence.

OPEN extends the capabilities of the Tenable One Exposure Management Platform through more than 330 validated integrations that connect security tools, analytics systems and remediation workflows across enterprise environments.

“With OPEN and the Open Connector, organisations can bring together data from virtually any security tool, including third-party technologies, internal systems and emerging AI-driven workflows. We don’t ask customers to replace their existing security stack to get value from Tenable. We connect to it, unify the data and turn it into actionable exposure intelligence,” said Eric Doerr, Tenable Chief Product Officer.

A key part of the launch is the new Open Connector, which enables organisations to import third-party telemetry into Tenable One while exporting exposure intelligence into downstream systems for analytics, automation and remediation.

Tenable said the approach allows companies to reduce blind spots, streamline security operations and accelerate threat response without replacing existing infrastructure.

Industry partners backing the initiative emphasized the growing need for integrated security intelligence as cyberattacks become faster and more automated.

“AI hasn't just changed the scale of attacks, it has accelerated adversary operations to machine speed. Defenders need intelligence they can operationalize just as quickly. Integrating the Recorded Future Intelligence Graph® into the Tenable OPEN ecosystem turns exposure management into a continuous, intelligence-led discipline.

"Joint customers can separate signal from noise, focus on the 1% of exposures adversaries are actually targeting, and drive faster, more confident remediation. That's the force multiplier security teams need to outpace adversaries, not just respond to them,” said Doug Fleming, Recorded Future Director, Global Ecosystems and Alliances.

Kevin Murphy, Splunk Director, Global ISVs and OEM Partners, added, “Tenable OPEN thrives where others fail because it rejects the mindset of rigid, restrictive APIs. By unifying data regardless of source, we’re eliminating the operational friction that plagues the SOC, allowing our mutual customers to stop fighting their tools and start fighting the threat with a seamless, automated workflow.” 

“Bitsight’s external telemetry across attack surface exposure, supply chain relationships, and threat activity gives organisations critical context that internal tools alone cannot provide. Through the Tenable OPEN ecosystem, customers can combine this external intelligence with internal exposure data to better identify interconnected risk, prioritize the exposures most likely to drive business impact, and accelerate remediation across their environments and vendor ecosystems,” said Greg Keshian, Bitsight Chief Product Officer.

Recently, Tenable also announced new AI initiatives with Anthropic to accelerate agentic capabilities across the Tenable One Exposure Management Platform as organisations confront a rapidly evolving threat landscape shaped by frontier AI.