Assets
This topic describes the differences between assets in Tenable Vulnerability Management and
Tenable Security Center.
Tenable Vulnerability Management
Tenable Vulnerability Management includes the ability to track assets that belong to your
organization. Assets are entities of value on a network that can be exploited.
Tenable Vulnerability Management automatically creates or updates assets when a scan completes
or scan results are imported. Tenable Vulnerability Management attempts to match incoming scan
data to existing assets using a complex algorithm. This algorithm looks at attributes of the scanned
hosts and employs a variety of heuristics to choose the best possible match. If Tenable Vulnerability
Management cannot find a match, the system assumes this is the first time Tenable Vulnerability
Management has encountered the asset and creates a new record for it. Otherwise, if Tenable
Vulnerability Management finds a matching asset, the system updates any properties that have
changed since the last time Tenable Vulnerability Management encountered the asset.
Tenable Vulnerability Management categorizes assets in the following categories:
l
Host Assets
l
Cloud Assets
l
Web Application Assets
l
Domain Inventory Assets
For more information, see Assets in the Tenable Vulnerability Management User Guide.
Tenable Security Center
Tenable Security Center assets are lists of devices (for example, laptops, servers, tablets, or
phones) within a Tenable Security Center organization. Assets can be shared with one or more
users based on local security policy requirements.
You can add an asset to group devices that share common attributes (IP address ranges, hardware
types, vulnerabilities, outdated software versions, operating systems, etc.). Then, you can use the
asset during scan configuration to target the devices in the asset.