Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/30/2018
10:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tenable Delivers Record Billings of $250 Million for 2017

January 30, 2018, Columbia, MD -- Tenable™, Inc., the Cyber Exposure company, today announced record billings of over $250 million representing over 45 percent growth for the fiscal year ended December 31, 2017, highlighted by strong performance across North America, Europe and Asia. The fourth quarter of 2017 also marks the seventh consecutive quarter of greater than 40 percent year-over-year billings growth for the company.  Tenable’s financial results make it one of the world’s largest and fastest-growing cybersecurity companies and reflect aggressive demand for the company’s Cyber Exposure solutions, which help enterprises and government organizations of all sizes understand and reduce cyber risk in modern computing environments.

Additional company highlights for 2017 include:

  • Surpassed more than 24,000 customers in over 160 countries, adding more than 1,000 new customers across a variety of industries.
  • Amassed a customer list that includes new enterprise customers such as FedEx, VMware and Westlake Chemical. Tenable’s customers include more than 50 percent of the Fortune 500, more than 20 percent of the Global 2000, the 10 largest U.S. technology companies and nine of the 10 largest U.S. financial institutions.
  • Expanded global presence with new international headquarters in Dublin, Ireland, more extensive operations in the Middle East, Japan and Latin America, bringing the company’s global footprint to include a presence in 20 countries and plans to open a new corporate headquarters in Columbia, MD.
  • Released Tenable.io™, the first Cyber Exposure platform to provide visibility into any asset on any computing platform including public cloud environments, and purpose-built applications for Vulnerability Management, Container Security and Web Application Scanning.
  • Introduced Industrial Security, delivered in partnership with Siemens to help energy, utilities and oil and gas companies secure and protect their most critical infrastructure.

“Our explosive growth and record results prove that every organization in every corner of the world needs to understand and manage its cyber risk holistically across IT, Cloud, IoT and OT. Companies and government agencies around the world have overwhelmingly selected Tenable as the gold standard for Cyber Exposure. We’re increasingly seeing these forward-leaning organizations factor in Cyber Exposure as a key risk metric in their decision-making process, just as they leverage CRM for forecasting sales risk or ERP for supply chain risk,” said Amit Yoran, Chairman & CEO. “Our ability to continue to execute against this large and growing market opportunity positions us well for continued growth in 2018 and beyond.”

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18575
PUBLISHED: 2019-12-06
Dell Command Configure versions prior to 4.2.1 contain an uncontrolled search path vulnerability. A locally authenticated malicious user could exploit this vulnerability by creating a symlink to a target file, allowing the attacker to overwrite or corrupt a specified file on the system.
CVE-2019-11293
PUBLISHED: 2019-12-06
Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if authentication is provided via query parameters.
CVE-2019-16771
PUBLISHED: 2019-12-06
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97....
CVE-2019-1551
PUBLISHED: 2019-12-06
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are n...
CVE-2019-16671
PUBLISHED: 2019-12-06
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption.