Perimeter

1/30/2018
10:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tenable Delivers Record Billings of $250 Million for 2017

January 30, 2018, Columbia, MD -- Tenable™, Inc., the Cyber Exposure company, today announced record billings of over $250 million representing over 45 percent growth for the fiscal year ended December 31, 2017, highlighted by strong performance across North America, Europe and Asia. The fourth quarter of 2017 also marks the seventh consecutive quarter of greater than 40 percent year-over-year billings growth for the company.  Tenable’s financial results make it one of the world’s largest and fastest-growing cybersecurity companies and reflect aggressive demand for the company’s Cyber Exposure solutions, which help enterprises and government organizations of all sizes understand and reduce cyber risk in modern computing environments.

Additional company highlights for 2017 include:

  • Surpassed more than 24,000 customers in over 160 countries, adding more than 1,000 new customers across a variety of industries.
  • Amassed a customer list that includes new enterprise customers such as FedEx, VMware and Westlake Chemical. Tenable’s customers include more than 50 percent of the Fortune 500, more than 20 percent of the Global 2000, the 10 largest U.S. technology companies and nine of the 10 largest U.S. financial institutions.
  • Expanded global presence with new international headquarters in Dublin, Ireland, more extensive operations in the Middle East, Japan and Latin America, bringing the company’s global footprint to include a presence in 20 countries and plans to open a new corporate headquarters in Columbia, MD.
  • Released Tenable.io™, the first Cyber Exposure platform to provide visibility into any asset on any computing platform including public cloud environments, and purpose-built applications for Vulnerability Management, Container Security and Web Application Scanning.
  • Introduced Industrial Security, delivered in partnership with Siemens to help energy, utilities and oil and gas companies secure and protect their most critical infrastructure.

“Our explosive growth and record results prove that every organization in every corner of the world needs to understand and manage its cyber risk holistically across IT, Cloud, IoT and OT. Companies and government agencies around the world have overwhelmingly selected Tenable as the gold standard for Cyber Exposure. We’re increasingly seeing these forward-leaning organizations factor in Cyber Exposure as a key risk metric in their decision-making process, just as they leverage CRM for forecasting sales risk or ERP for supply chain risk,” said Amit Yoran, Chairman & CEO. “Our ability to continue to execute against this large and growing market opportunity positions us well for continued growth in 2018 and beyond.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15378
PUBLISHED: 2018-10-15
A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the “unmew11()?? function (libclamav/mew.c), which can be exploited to trigger an inval...
CVE-2018-18073
PUBLISHED: 2018-10-15
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
CVE-2018-15593
PUBLISHED: 2018-10-15
An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can decrypt the encrypted datastore or relay server password by leveraging an unspecified attack vector.
CVE-2018-17961
PUBLISHED: 2018-10-15
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
CVE-2018-15591
PUBLISHED: 2018-10-15
An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can bypass Application Whitelisting restrictions to execute arbitrary code by leveraging multiple unspecified attack vectors.