• 跳到主要導覽
  • 跳到主要內容
  • 跳到頁尾
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
平台
解决方案
為什麼要選擇 Tenable
資源
公司
定價方式
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable 產品登入
社群與支援
購買 試用

曝險管理

使用單一平台管理網路風險,尋找、排定優先順序並消除所有攻擊破綻中的曝險。
瞭解更多資訊
AI 安全
雲端安全
OT 安全
弱點管理
Hexa AI
身分安全
修補程式管理
攻擊破綻管理
Web 應用程式掃描
安全工具連接器

檢視所有產品

依使用案例探索

安全 AI
安全 OT/IoT
曝險管理
雲端安全
合規性
弱點管理
資產庫
高安全性環境
安全資料中心
零信任

依產業探索

金融服務
能源
醫療保健
科技
教育
政府國防
零售
為什麼要選擇 Tenable
業界肯定
客戶案例
Tenable 與競爭對手的比較
報告
Tenable 為何是曝險管理領域的絕對領導者
瞭解原因
資源庫
曝險管理資源
部落格
研究中心
訓練與認證
網路安全指南
客戶案例
尋找合作夥伴
資源

曝險管理
資源中心

以實用的資源和工具加速您的曝險管理策略。
探索
關於 Tenable
領導階層
投資人關係
Tenable 投資項目
獎項與肯定
媒體室
求職
參與和包容
Exposure Management Leadership Council
平台
解決方案
為什麼要選擇 Tenable
資源
公司
定價方式
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable 產品登入
社群與支援
購買 試用
曝險管理
AI 安全
雲端安全
OT 安全
弱點管理
Hexa AI
身分安全
修補程式管理
攻擊破綻管理
Web 應用程式掃描
安全工具連接器

檢視所有產品

依使用案例探索

安全 AI
安全 OT/IoT
曝險管理
雲端安全
合規性
弱點管理
資產庫
高安全性環境
安全資料中心
零信任

依產業探索

金融服務
能源
醫療保健
科技
教育
政府國防
零售
為什麼要選擇 Tenable
業界肯定
客戶案例
Tenable 與競爭對手的比較
報告
Tenable 為何是曝險管理領域的絕對領導者
瞭解原因
資源庫
曝險管理資源
部落格
研究中心
訓練與認證
網路安全指南
客戶案例
尋找合作夥伴
資源

曝險管理
資源中心

以實用的資源和工具加速您的曝險管理策略。
探索
關於 Tenable
領導團隊
投資人關係
Tenable 投資項目
獎項與肯定
媒體室
職業生涯
參與和包容
Exposure Management Leadership Council
  • 客戶群
  • Continental AG
案例研究

Continental AG Continental AG logo


TISAX 是當今我們產業最重要的品質標章。 若沒有透過 Tenable One Exposure Management Platform 提供可靠的風險型弱點管理以及攻擊破綻的統一檢視方式,我們幾乎無法滿足 ENX 的規定,也無法獲得許多商機。

Martin Sturm, Continental

下載案例研究
使用的主要產品

Tenable One


以 AI 技術為後盾的全球領先曝險管理平台

Tenable One 能徹底整合整個攻擊破綻的安全性能見度、深入解析與行動,賦予現代企業隔離與根除 IT 基礎架構、雲端環境、重大基礎設施以及來自四面八方的高風險網路曝險。

Explore this product Request a demo
產業別: Automotive Supply
Location: Germany

Continental AG achieves TISAX compliance readiness with Tenable One

As an automotive supplier, Continental AG operates in a strictly regulated market. In addition to NIS-2, KRITIS and GDPR, the TISAX industry standard maintained by the ENX Association is of central importance. More and more OEMs (Original Equipment Manufacturers) are making TISAX certification a prerequisite for participating in attractive tenders, and suppliers only receive the coveted seal if they can prove that they minimized their cyber risks with appropriate technical and organizational measures.

關鍵業務需求

  • Meet regulatory and compliance requirements (TISAX, NIS-2, GDPR) to stay eligible for OEM contracts
  • Prevent future cyberattacks after a major incident exposed vulnerabilities
  • Gain unified visibility across IT, OT, cloud, and web apps in a global environment
  • Enable risk-based decisions with prioritized insights, automation, and clear reporting

"TISAX is the most important seal of approval for our industry today. Without the robust, risk-based vulnerability management and unified view of our attack surface via the Tenable One Exposure Management Platform, we would hardly be able to meet the ENX requirements and many doors would remain closed to us," says Martin Sturm, CISSP and IT Security Manager.

Strengthening its position as a reliable supply chain partner

Sturm joined Continental in 2023, after the company experienced a serious cyber incident, to coordinate the introduction of company-wide vulnerability management for IT, OT and cloud. "But TISAX is a relatively recent development," he notes. "When we originally made the decision to invest in vulnerability management, the issues of governance and compliance played a relatively subordinate role. The overriding task at the time was to reliably prevent an attack like the one in 2022 from happening again."

The search for a suitable solution started with a comprehensive market analysis. As a first step, the newly formed vulnerability management team at Continental developed a detailed catalog of requirements and compared this with the portfolios of all established VM vendors. The four most promising candidates were then tested in a comprehensive proof of concept. "We set up a demo environment that was closely aligned with our actual IT and app landscape and hid dozens of vulnerabilities in there – from incorrectly configured Kubernetes clusters to unpatched OT systems and service accounts with unnecessarily broad authorizations. We then scanned this environment with each of the four VM solutions to see which performed best," says Sturm.

The rules were as simple as they were objective—the solution that found the most vulnerabilities was to be awarded the contract. Tenable One identified approximately 25 percent more vulnerabilities than the competition, including several critical use cases.

Tenable delivers strategic advantage

After a six-month test phase, Tenable outperformed nearly all competitors in a strong field. Its key advantage was the holistic approach enabled by its unified exposure management platform, Tenable One. The platform consolidated the broad feature set Continental required—spanning vulnerability and attack surface management, cloud and web application security, and OT security—into a consistent, all-in-one solution. The integrated view made it easy to correlate vulnerabilities, eliminate data silos, and reduce risk.

Outstanding detection rate in cloud and OT

Tenable One scored particularly well in the areas of cloud security and OT. The platform scored bonus points in several critical use cases – for example, in detecting misconfigurations in cloud environments, such as Azure PIM and Amazon S3 buckets.

Comprehensive platform provides holistic insights

In spring 2024, the project team set about transferring the Tenable One proof of concept (PoC) installation into live operation. In view of the high level of integration, the platform's wide range of functions and the complexity of the environment, the team opted for a multi-stage approach:

  • In Phase 1, a company-wide vulnerability management with Tenable Nessus scanners and company-wide attack surface management were rolled out in Continental's IT environment
  • Phase 2 focused on the parallel introduction of Tenable Web App Scanning and Tenable Cloud Security
  • Phase 3 saw the rollout of the OT security solution

Phase 1: Vulnerability and attack surface management with Tenable Nessus

As a multinational company that is active in 56 countries and employs 200,000 people, Continental operates over 500,000 dedicated IT systems worldwide. In order to reliably capture and scan these assets, more than 200,000 Tenable Nessus scanners were required – but despite this enormous volume, the rollout went quite smoothly.

"We set up a relatively simple metric. Locations with fewer than 1,000 IT systems are scanned centrally by us," recalls Sturm. "In all larger locations, we set up dedicated scanners because there were usually enough reserves there to manage the scans on-site. In this way, we were able to parallelize many tasks – and covered over 80 percent of the IT systems within a very short time."

10 percent more web assets than suspected

To identify potentially compromised and unknown web assets, the team accompanied the Nessus scans with Tenable Attack Surface Management. The solution analyzed the DNS entries, IP addresses and ASNs in the Continental network to locate all web-facing systems and found ten percent more assets than originally suspected. The identified systems were then inventoried using a wide range of metadata in order to obtain an optimal overview of the IT landscape.

Phase 2: Tenable Cloud Security and Tenable Web App Scanning

The cloud is omnipresent at Continental today especially in its more innovative units, where in-house application development plays a key role. At Continental, as in nearly every software company today, development takes place primarily in the cloud. To ensure the security of data and access in the cloud, the project team integrated Tenable Cloud Security, a comprehensive Cloud-Native Application Protection Platform (CNAPP). The solution connects to all major public cloud providers via open APIs, and continuously identifies – and provides actionable guidance for remediating – risks in hybrid and multi-cloud environments. This allows the team to secure cloud configurations, workloads and identities, while ensuring that development, Infrastructure as Code (IaC) and Kubernetes environments are secure and compliant at all times.

"Tenable Cloud Security helps us cut cloud risks faster and easier—no experts needed. It reveals toxic access, flags anomalies, and gets us closer to least privilege," notes Sturm.

At the same time, Continental integrated Tenable Web App Scanning – a powerful scanner that dynamically scans approximately 2,500 internal and external web applications and APIs in the corporation for potential vulnerabilities, thus paving the way for timely remediation without disruption.

Phase 3: Protecting the OT environment

After completing the first two phases, the team proceeded to the final phase of the project—the rollout of Tenable OT Security—a groundbreaking step in more than one respect. A few selected OT locations had already been integrated during the PoC, and the Tenable Professional Services team provided expert guidance and resources to streamline deployment in Continental’s complex environment.

The actual fleet was much more heterogeneous than the showcase selection. In addition, due to the high prevalence of on-prem systems, only a few tasks could be solved remotely and many steps had to be readjusted on-site where the wide range of operating systems, software versions, protocols and interfaces that characterize industrial environments today proved to be a real challenge.

"We were well aware of the difficulties that awaited us," confirms Sturm. "And most of these hurdles have materialized in one form or another. Nevertheless, the rollout of Tenable OT Security will not only improve our security standing, but also achieve very relevant savings by bringing our entire exposure management program into a modern and consolidated platform."

ISMS based on ISO 27001 sets the stage for NIS-2 and TISAX

When assessing and prioritizing the identified IT, cloud and OT vulnerabilities, Continental adopted a consistently risk-based approach from day one, which is closely aligned with the requirements of ISO 27001. Instead of simply tagging vulnerabilities according to their CVSS rating, the team uses the much more meaningful Vulnerability Priority Ratings (VPR) provided by Tenable, which takes into account the probability of an exploit as well as the severity of the vulnerabilities. The VPR ratings are then validated again with regard to their risk potential, explains Sturm. "If you have the same vulnerability on two notebooks, but one belongs to the CEO and the other to an intern, the criticality is of course much higher in the first case. Although this individual readjustment requires some effort, it enables us to take the business impact of the vulnerabilities into account and to always focus our energy on the most dangerous hotspots."

Executive liability is no longer an issue

This risk-based approach not only contributes to the efficiency of processes and the protection of critical systems, but is also crucial in terms of compliance. Both the TISAX standard mentioned at the beginning and the NIS-2 Directive require those responsible at companies to systematically manage risk and even enforce the personal liability of management in the event of breaches. "There can be no compromises when it comes to complying with legal requirements and relevant industry standards. Compliance is therefore a key issue for us, and Tenable One helps us to meet complex regulations and standards. By implementing this holistic, risk-based platform, we have set the course for seamless monitoring, implementation, and documentation of all relevant requirements", Sturm emphasizes.

Spillover effects on the company's patch culture

To make the most of Tenable’s exposure management platform potential, Sturm's team automatically forwards the vulnerability data, including for cloud vulnerabilities along with actionable recommendations, to the company's asset and patch managers. They then decide for themselves how to deal with the respective risks - in other words, whether to close the vulnerabilities or to accept the risks. Sturm sees the close exchange between the teams as a big plus. "The clear communication of vulnerabilities and business impacts has definitely led to a completely new, much more sensitive patch culture. If the responsible colleagues can see at a glance what danger a vulnerability poses and even receive concrete guidance on how to fix it, it is usually closed promptly."

Robust database for well-founded decisions

In addition, the raw data from Tenable One is also automatically transferred via API to Continental's reporting team, which then distributes the huge volume to decentralized databases and prepares it for the executives. In this way, stakeholders and decision-makers in the company are always kept up to date on the status quo and the successes in vulnerability management – and can make better decisions based on hard facts. "The extensive automation of processes is another major benefit for the team, and frees up the employees to focus on the jobs they were originally hired for – even if we are far from unlocking the full potential," says Sturm.

In December 2024, Continental's Executive Board announced that the Automotive division will be transformed into a dedicated organization by September 2025. This restructuring – which also includes the separation of the shared IT infrastructure of the Automotive, Tires, ContiTech and Vibration Control units into four dedicated environments – brings exciting opportunities to expand the successful implementation of the Tenable One platform.

返回頂端

  • Tenable One

相關的客戶案例研究

TechMatrix


閱讀案例研究

大型美國電信公司


閱讀案例研究

SRF Limited


閱讀案例研究

探索所有案例研究 ›

解決曝險,洞察先機。

合作夥伴

  • 成為合作夥伴
  • 尋找合作夥伴
  • 合作夥伴入口網站
  • 合作夥伴計劃

資源

  • 服務
  • 技術支援
  • 訓練與認證
  • 產品說明文件
  • 客戶社群
  • Tenable Trust

公司

  • 關於我們
  • 管理團隊
  • 新聞中心
  • 投資者關係

交流聯繫

  • 與我們聯絡
  • 試用我們的產品
  • 和業務人員聊聊
  • 與我們在活動中相見
  • 加入我們
  • 隱私權政策
  • 請勿販售/分享我的個人資訊
  • 法規
  • 508 合規性

© 2026 Tenable®, Inc. 保留所有權利

Tenable One

申請示範

以 AI 技術為後盾的全球領先曝險管理平台。

感謝您

感謝您對 Tenable One 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

申請示範

利用可據以行動的雲端安全平台消除雲端曝險。

感謝您

感謝您對 Tenable One Cloud Exposure 感興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

申請示範

根據對貴公司的風險發現並安排弱點的優先順序。內部部署管理。

感謝您

感謝您對 Tenable Security Center 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

申請示範

利用自動化簡化安全團隊與 IT 團隊的合作,並縮短平均修復時間。

感謝您

感謝您對 Tenable Patch Management 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

申請示範

洞悉、辨識並消除 IT 與容器弱點。

感謝您

感謝您對 Tenable Enclave Security 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

申請示範

全盤掌握所有與網際網路連線的資產,藉此消除盲點和不明的風險來源。

感謝您

感謝您對 Tenable One Attack Surface Management 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

申請示範

洞悉、保護與管理貴公司團隊使用 AI 平台的方式。

感謝您

感謝您對 Tenable One AI Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

申請示範

針對融合式 OT/IT 環境利用統一的安全解決方案消除 OT 曝險。

感謝您

感謝您對 Tenable One OT Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

申請示範

利用適用於身分智慧型企業的重要解決方案來消除身分曝險。

感謝您

感謝您對 Tenable One Identity Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

為什麼要選擇 Tenable

參閱 Tenable 實際應用案例

想瞭解 Tenable 如何協助您的團隊發現並修復危及業務的關鍵網路弱點嗎? 請填寫此表單以取得客製化報價或示範。

感謝訂閱!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

瞭解 Tenable 如何協助達成 SLCGP 網路安全計畫要求

Tenable 解決方案能協助您滿足 SLCGP 的所有要求。與 Tenable 代表人員聯絡,以便深入瞭解。representative to learn more.

感謝您

您應該很快就會收到一封確認電子郵件,我們的一位業務開發代表將會與您聯繫。如有任何問題,請發送電子郵件至:[email protected]。

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

訂閱

您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

感謝訂閱!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

免費試用

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。

您的 Tenable Vulnerability Management 試用軟體也包含 Tenable Web App Scanning。


立即購買

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。


資產數量

100

選擇您的訂閱方案

立即購買

請聯絡我們或 Tenable 合作夥伴。

感謝您

感謝您對 Tenable Vulnerability Management 感興趣。
我們的人員將盡快與您聯絡。

偵錯:
表單 ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

免費試用

試用 Tenable Web App Scanning

享受完整存取我們專為新型應用程式所設計、屬於 Tenable One 曝險管理平台一部分的最新 Web 應用程式掃描產品。不需耗費大量人力或中斷重要 Web 應用程式,即可高度準確且安全地掃描您整個線上產品系列中是否含有任何弱點。 立即註冊。

您的 Tenable Web App Scanning 試用軟體也包含 Tenable Vulnerability Management。

立即購買

購買 Tenable Web App Scanning

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

FQDN

5
$3,578
立即購買

請聯絡我們或 Tenable 合作夥伴。

感謝您

感謝您對 Tenable Web App Scanning 感興趣。
我們的人員將盡快與您聯絡。

偵錯:
表單 ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

免費試用

免費試用 Tenable Nessus Professional

Tenable Nessus 是目前市場上最全方位的弱點掃描器。請填妥以下表單以繼續 Nessus Pro 試用。

立即購買

購買 Tenable Nessus Professional

購買多年期授權,節省更多。新增 365 天全年無休 24 小時全天候可使用電話、社群及對談的進階支援。


選擇您的授權

購買多年期授權省更多!

增加支援與訓練

立即購買
續訂既有授權
尋找經銷商

*價格包含增值稅。

免費試用

免費試用 Tenable Nessus Expert

Nessus Expert 是專為現代攻擊破綻所打造,它能讓您從 IT 到雲端洞察更多資訊,並保護貴公司免於弱點危害。

您已經有 Tenable Nessus Professional 了嗎? 升級至 Nessus Expert,免費試用 7 天。

立即購買

購買 Nessus Expert


選擇您的授權

購買多年期授權省更多!

增加支援與訓練

立即購買
續訂既有授權
尋找經銷商

利用 Nessus Pro 的進階支援,貴公司的團隊可 365 天全年無休 24 小時全天候使用電話、社群以及對談支援。此種進階等級的技術支援可確保加速應變與解決問題。

進階支援方案特色

電話支援

電話支援全年 365 天、全天候 24 小時無休,最多可提供十 (10) 位指定的支援聯絡人。

對談支援

對話支援也可提供指定的支援聯絡人使用,您可透過 Tenable Community 7 天 24 小時全年無休取得此支援服務。

Tenable Community 支援入口網站

所有指定的支援聯絡人都可在 Tenable Community 內提交支援案件。使用者也可以存取知識庫、文件集、授權資訊、技術支援編號等;利用即時對談向社群發問,然後從其他社群成員的回答中得知秘訣與技巧。

初次回應時間

P1-重大:< 2 小時
P2-高度:< 4 小時
P3-中度:< 12 小時
P4-提供資訊說明:< 24 小時

支援聯絡人

支援聯絡人需對於資訊技術、向 Tenable 購買的軟體具備一定的專精程度,同時也熟悉該軟體所監控的客戶資源。支援聯絡人必須會說英語並能以英語提出支援請求。支援聯絡人必須在合理範圍內向 Tenable 提供其詢問的資訊,以便 Tenable 重現錯誤或解決請求支援的問題。