• Skip to Main Navigation
  • Skip to Main Content
  • Skip to Footer
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try

Exposure Management

Manage cyber risk with one platform to find, prioritize and eliminate exposures across your attack surface.
Find out more
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try
Exposure Management
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
  • Customers
  • Global Payments AU NZ
Case study

Global Payments AU NZ


Tenable.io has unified our vulnerability management program under one tool set. It’s brought together teams across different business units to use a common language around vulnerability posture. The solution is easy to use and streamlines our reporting!
Download the case study
Primary product used

Tenable Vulnerability Management


Expose and close your cyber weaknesses with the world’s #1 vulnerability management solution

The solution that created the category continues to raise the bar to protect enterprises from critical cyber exposures that increase business risk.

Explore this product Try for free
Industry: Financial Ttechnology
# Local employees: 300
# Business units: 4

Global Payments AU/NZ is a division of Global Payments, Inc., an industry-leading payment processing and software organization undergoing worldwide growth. In Australia and New Zealand, Global Payments operates Ezidebit, eWAY, Storman and Sentral, all of which are expanding their services in high-growth industries such as alternative finance, insurance and equipment rentals.

As the parent company acquires new organizations in Australia and New Zealand ‒ each with different cyber risk profiles and technologies ‒ its IT and cybersecurity teams must quickly onboard the organizations and assess risk across a complex IT landscape.

The local cybersecurity team is responsible for protecting personally identifiable information (PII) as well as the valuable credit card data the software and payment processing organizations manage. They also need to assess internal networks and workstations to identify and remediate security issues.

Key business needs

Rapidly expanding Global Payments AU / NZ needed a unified view of cyber risk across newly acquired organizations. They needed to quickly onboard new organizations and simplify reporting of data-driven insights to senior executives.

Using Tenable Vulnerability Management, the cybersecurity team quickly gained full visibility across a complex attack surface including traditional IT assets, web applications and evolving cloud environments. The flexible and comprehensive dashboards save the cybersecurity team hours of time — and enable them to deliver consistent metrics to executives for decision making.

Challenges

As the organization grows its cyberattack surface is quickly changing and expanding.

Patrick King, head of IT operations and security for Global Payments’ local brands in Australia and New Zealand, oversees cyber risk across four local organizations currently, each with different risk profiles and diverse IT environments. King and his team of 30, focus on remaining agile and efficiently managing cyber risk across their business units. King explains, “When a new acquisition comes on board, it’s a whole new environment and a whole new team of people. The systems are running in different cities, different data centers, and at times in different cloud environments.” The team required a flexible solution to address the following challenges:

  • Difficulty establishing one comprehensive view of Cyber Exposure across new acquisitions, including both traditional and modern IT assets

    The team needed to quickly identify and manage risk across traditional assets (e.g., Windows and Linux servers) and payment processing systems. They also needed to protect user endpoint devices, web applications and cloud-based environments. King says, “Our attack surface is changing, we’re migrating more and more workloads into the public cloud. We need a solution that scales across public cloud and at the same time integrates with data centers.” King explains, “Each business unit was using different security tools to manage their cyber risk. We weren’t really feeling comfortable that we were getting the full picture of what was going on in all the internal environments. We were getting different reports out of different tools, and results meant different things depending on the business unit.” He says, “It wasn’t apples to apples when we were looking at metrics and comparing our position across the business. We needed a solution that provided an accurate, consolidated picture of our Cyber Exposure.”

  • Simplify reporting and communication of data-driven insights

    King’s team needed to easily obtain and deliver vulnerability performance data to their head office. They required flexible, customizable reporting and intuitive dashboards that enable the team to quickly assess risk across all business units.

  • Quickly onboard new offices with minimal overhead

    The team had limited resources for configuration and administration and needed an easy way to onboard new office sites around the world. King reflects, “It was important to us to have a cloud-based solution that we could deploy quickly, and get it across our environments easily.”

  • Efficiently deliver on PCI and internal audit requirements

    The team needed to meet stringent Payment Card Industry Data Security Standard (PCI DSS) audit requirements. They also had to adhere to internal audit requirements, reporting the vulnerability status for all business units up to the head office monthly.

Solution

King and his team had experience with products from both Tenable and Rapid7. They evaluated these solutions and selected Tenable.io for several reasons:

  • Full visibility across both traditional and modern assets

    King and his team now have full visibility into a complex attack surface thanks to Tenable.io’s wide variety of data collection technologies. Nessus sensors within Tenable.io provide active and agent scanning to accurately identify assets and assess their environment for vulnerabilities. King prefers the use of agents to collect as much data as possible about known assets and uses scanners to assess the rest of the environment.

    Additionally, they are well-positioned for growth as the businesses move more and more workloads to public cloud environments.

  • Flexible reporting and real-time dashboards

    Tenable.io’s intuitive reporting and actionable dashboards give King the consolidated, easy-to-communicate insights they need to reduce cyber risk, and provide monthly updates to the head office. King mentions, “The flexibility we have in reporting is really impressive. It has saved our team hours of time. We are able to quickly build several custom reports that we just couldn’t do in other products.”

  • Cloud-managed Tenable.io provides a consolidated picture of cyber risk

    King mentions, “Because Tenable.io is cloud-managed, our business units can upload data to a central location quite easily. The networking we would have to do with other products to get a similar operation is just not feasible.”

    Each business unit now easily manages its cyber risk using the same Cyber Exposure platform, providing King and his team consistent metrics and an accurate, comprehensive picture of their attack surface. Additionally, they rely heavily on vulnerability risk scores and prioritization guidance provided by Tenable.io.

  • Easy set-up and deployment across all business units

    “A key need for us was the ability to roll this solution out everywhere, easily. We knew that pulling out our existing tools and deploying a new solution was going to be a really big job,” explains King.

    He continues, “We went through the pilot with Tenable.io and it was very, very easy to roll out. We got it up and running really quickly. Everything seemed to just work. For a team with limited resources that is really important to us. We can spend our time in the right areas, securing our assets and networks.”

    King and his team also found it easy to work with the Tenable sales team. They helped get a working proof of concept set up within the short timeframe required.

  • Efficiently deliver on PCI and internal audit requirements

    Tenable’s pre-built templates allow King’s team to assess and report on PCI compliance requirements and internal audits efficiently.

Impact

  • Peace of mind with improved visibility across traditional and modern assets

    They have broad coverage and comprehensive visibility across their new and changing assets, with increased confidence all of their assets are being scanned and actively monitored.

  • Streamlined vulnerability management across all business units

    With a single view of their full cyber risk across multiple environments, the team is able to accurately identify, investigate and prioritize vulnerabilities. Each organization is using the same product and metrics to monitor their environment.

    King says, “Tenable.io has unified our vulnerability management program under one umbrella, and one tool set. It’s brought together different teams across different companies. It’s easy to use and really streamlines our reporting.”

  • Saved hours of time with actionable dashboards

    With Tenable.io’s intuitive dashboards and customizable reporting, they have saved hours of time creating reports and assessing threats. They can quickly deliver comprehensive updates to the head office.

  • Increased efficiency in meeting compliance standards

    The team saves time preparing for both internal and external audits, and is able to focus resources on securing their assets and networks.

Conclusion

King and his team now have one Cyber Exposure platform, empowering them to effectively manage a constantly changing attack surface. Cloud-managed Tenable.io enables King’s team to easily onboard new organizations – contributing to the strategic growth of the business.

Partnering with Tenable, King and his team plan to continue elevating their vulnerability management program to reduce cyber risk. What’s next? They want to automate their service management processes with Tenable.io’s easy-to-use APIs, and are looking forward to new capabilities included in the Tenable product road map.

Back to Top

  • Tenable Vulnerability Management

Related customer case studies

Netskope


Read case study

Stone


Read case study

Bitbrains


Read case study

Explore all case studies ›

Your exposure ends here.

Partners

  • Become a partner
  • Find a partner
  • Partner portal
  • Partner programs

Resources

  • Services
  • Technical support
  • Training and certifications
  • Product documentation
  • Customer community
  • Tenable Trust

Company

  • About us
  • Executive team
  • Newsroom
  • Investor relations

Connect

  • Contact us
  • Try our product
  • Chat with sales
  • Meet us at an event
  • Join us
  • Privacy policy
  • Do not sell/share my personal information
  • Legal
  • 508 compliance

© 2026 Tenable®, Inc. All rights reserved

Tenable One

Request a demo

The world’s leading AI-powered exposure management platform.

Thank You

Thank you for your interest in Tenable One.
A representative will be in touch soon.

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

Request a demo

Close cloud exposure with the actionable cloud security platform.

Thank You

Thank you for your interest in Tenable One Cloud Exposure.
A representative will be in touch soon.

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

Request a demo

Identify and prioritize vulnerabilities based on risk to your business. Managed on premises.

Thank You

Thank you for your interest in Tenable Security Center.
A representative will be in touch soon.

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

Request a demo

Streamline security and IT collaboration and shorten the mean time to remediate with automation.

Thank You

Thank you for your interest in Tenable Patch Management.
A representative will be in touch soon.

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

Request a demo

Know, expose and close IT and container vulnerabilities.

Thank You

Thank you for your interest in Tenable Enclave Security.
A representative will be in touch soon.

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

Request a demo

Gain visibility into your internet-connected assets to eliminate blind spots and unknown sources of risk.

Thank You

Thank you for your interest in Tenable One Attack Surface Management.
A representative will be in touch soon.

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

Request a demo

See, secure, and manage how your teams use AI platforms.

Thank You

Thank you for your interest in Tenable One AI Exposure.
A representative will be in touch soon.

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

Request a demo

Close OT exposure with the unified security solution for converged OT/IT environments.

Thank You

Thank you for your interest in Tenable One OT Exposure.
A representative will be in touch soon.

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

Request a demo

Close identity exposure with the essential solution for the identity-intelligent enterprise.

Thank You

Thank you for your interest in Tenable One Identity Exposure.
A representative will be in touch soon.

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

Why Tenable

See Tenable in action

Want to see how Tenable can help your team find and fix critical cyber weaknesses that put your business at risk? Complete this form to get a custom quote or demo.

Thank you for subscribing!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Thank You

You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

Subscribe

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Thank you for subscribing!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

Try for free

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.


Buy now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


Number of assets

100

Choose your subscription

Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management.
A representative will be in touch soon.

Debug:
Form ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

Try for free

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy now

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

FQDNs

5
$3,578
Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Web App Scanning.
A representative will be in touch soon.

Debug:
Form ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

Try for free

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Fill out the form below to continue with a Nessus Pro trial.

Buy now

Buy Tenable Nessus Professional

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

*VAT incl.

Try for free

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional? Upgrade to Nessus Expert free for 7 days.

Buy now

Buy Nessus Expert


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.