Piscium
P+T
Integration

Piscium + Tenable

Bi-directional integration with Tenable Vulnerability Management (formerly Tenable.io) and Tenable.sc. Piscium ingests Tenable scan results as discovery inputs, then validates which vulnerabilities are actually exploitable in your environment. Validation results and risk re-scoring are pushed back to Tenable for unified reporting.

Categoryvulnerability-scanners
StatusAvailable

Why Tenable?

What You Get

Bi-directional integration with Tenable Vulnerability Management (formerly Tenable.io) and Tenable.sc. Piscium ingests Tenable scan results as discovery inputs, then validates which vulnerabilities are actually exploitable in your environment. Validation results and risk re-scoring are pushed back to Tenable for unified reporting.

Why Integrate

Tenable provides broad vulnerability coverage, but scan results include thousands of findings — most of which are not exploitable in context. Piscium takes Tenable's output and answers the critical question: which of these vulnerabilities can actually be exploited to cause business harm? The result is a prioritized, validated subset that teams can act on with confidence.

Example Scenario

A scheduled Tenable scan identifies 2,400 vulnerabilities across an industrial control network. Piscium ingests these findings and deploys AI agents to validate exploitability. Of the 2,400 findings, Piscium confirms 47 are exploitable in context — and 6 chain into attack paths reaching Level 1 safety controllers. These 6 critical paths are pushed back to Tenable with updated VPR scores and forwarded for immediate remediation.

Data Flow

Source

Tenable

Processor

Piscium CTEM

Destination

Risk Dashboard

Quick Start

1

Configure

Supports Tenable Vulnerability Management (cloud) via API keys and Tenable.sc (on-premises) via access/secret key pairs. Piscium polls for new scan results on a configurable schedule or can be triggered by Tenable scan completion webhooks. Asset correlation uses IP address, FQDN, and Tenable asset UUID. Requires read access to scan results and write access to asset tags.

2

Connect

Enable the Tenable connector from the Piscium integrations dashboard.

3

Validate

Run a test sync to verify data flows correctly between systems.

webhook-payload.json
{
  "event": "exposure.validated",
  "timestamp": "2026-03-10T19:05:00Z",
  "exposure_id": "EXP-2026-00356",
  "severity": "critical",
  "cvss_score": 9.8,
  "cve": "CVE-2025-24071",
  "affected_asset": "scada-srv-01.ot.corp.local",
  "tenable_asset_uuid": "f47ac10b-58cc-4372-a567-0e02b2c3d479",
  "tenable_plugin_id": 187234,
  "attack_path_id": "AG-0877",
  "blast_radius": 31,
  "remediation_status": "pending"
}

Ready to Connect Tenable?

See the integration running live in your environment.