• Skip to Main Navigation
  • Skip to Main Content
  • Skip to Footer
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try

Exposure Management

Manage cyber risk with one platform to find, prioritize and eliminate exposures across your attack surface.
Find out more
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try
Exposure Management
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
  • Customers
  • The City of San Diego
Case study

The City of San Diego


The City of San Diego
 
Watch the video Download the case study
Primary product used

Tenable Nessus


The first tool in your cybersecurity toolbox

Expose and close weaknesses across your constantly changing attack surface with the industry’s most trusted vulnerability assessment solution.

Explore this product Try for free

Residents

1.4M

Largest City in the U.S.

#8

interconnected networks

24

previous cyberattacks

1M/day

Tenable is enhancing security visibility and reducing risk exposure for the City of San Diego’s interconnected, far-reaching network — and saving the city about $1.3 million per year

San Diego, CA is recognized for its mild year-round climate, expansive Pacific coast beaches, deep coastal harbor and popular attractions like parks, museums, gardens and a world-famous zoo. Long associated with the U.S. Navy, which still maintains a large and active fleet, the city has gained recent recognition for its advancements in biotechnology and healthcare. Today, San Diego is home to nearly 1.4 million residents, making it the eighth largest city in the U.S.

Behind the scenes, the City of San Diego’s vast infrastructure includes a complex and wide-ranging enterprise IT system, which serves as its management, operations and communications lifeline. It is comprised of 24 distinct networks from 40 city departments, including parks and recreation, transportation, public safety, public works, sanitation, police and fire departments, as well as libraries, water and waste treatment facilities, municipal airports, cemeteries and dozens of other departments and service providers. In addition, a number of departments operate network connected point-of-sale terminals, requiring that they maintain and demonstrate Payment Card Industry Data Security Standards (PCI DSS) compliance.

In 2013, Gary Hayslip joined the City of San Diego as a Deputy IT director and its first chief information security officer, charged with building the city’s first cyber security program. What he initially discovered was an intricate, interconnected mix of old and new technologies — a very different experience from his previous cybersecurity management roles with the Department of Defense and U.S. Navy.

While Hayslip was able to implement many best practices, such as adopting the NIST Cybersecurity Framework and controls to establish a security baseline, he had to significantly adapt his approach in order to manage cybersecurity for a major city — and its unique goals and challenges. Cities must costefficiently and effectively deliver essential, operational, management, maintenance and quality of life services 24 hours a day. At the same time, they must ensure the privacy and security of their integrated technologies and the enormous amounts of network data they contain. Network breaches can significantly impact city operations and data, resulting in information and financial loss, service disruptions and more.

And they are also businesses that run 24 hours a day, every day. “The City of San Diego is a $4 billion business that never shuts down,” noted Hayslip. “We needed to figure out how to address all of its security threats and risks without interfering with how it provides services.”

His initial challenge was deciding how to deal with the technology and applications developed over decades to monitor, control, automate and deliver city services — everything from new cloud technologies and Intelligent smart city infrastructure, such as automated transportation systems, street lighting, traffic control and public transportation, to PowerBuilder applications and other programs built more than a dozen years ago.

“City networks are massive — they’re like hoarders,” he joked, explaining that cities don’t often get rid of older or outdated programs, especially if they still work, delivering services and providing value to citizens. But sometimes, there’s no way to protect the data in legacy programs. “For example, when many of these programs were created years ago, they weren’t encrypted because no one was thinking about the risk.”

Now they are.

To fully understand what his team needed to protect, Hayslip embarked on a due diligence mission to meet the city’s key network stakeholders and learn about their data, programs and applications. “That took quite a while, but it really helped me understand the vastness of the technology and what I was dealing with,” he recalled.

He then performed a comprehensive inventory and assessment — quite a challenge to achieve without asset visibility, network maps or tools to adequately evaluate and manage overall risk exposure. In addition, with a network facing nearly a whopping one million cyberattacks a day — and a security team consisting of just eight IT professionals — Hayslip knew he needed a platform that could quickly and effectively provide a unified view of network security and risk, without disrupting the city’s daily business operations. It also had to integrate with the city’s existing infrastructure, while having the scalability to support its future growth.

Quite a tall order, indeed.

“With a large enterprise like this, I needed to have data at my fingertips,” he recalls. Tenable sprang to mind right away, thanks to his familiarity with the company and its products from his previous position at the Department of Defense. “I had already worked with Nessus and SecurityCenter Continuous View (CV), as did many members of my team, and I really liked the passive scanning piece. I was also very interested in its new components — I could tell that the solution had matured.”

Hayslip considered other solutions besides Tenable, but they didn’t provide the same combination of features, capabilities, scalability and cost-effective pricing. He also chose not to pursue open source solutions. “When you have a small staff, you don’t have time to maintain and care for open source programs — you need to find a platform that’s already built, easy to run and able to quickly meet all of your requirements,” he explained.

In mid-2014, the City of San Diego selected Tenable SecurityCenter CV as its continuous monitoring platform and installed it with a license for over 12,000 IP addresses. Integrated with the Nessus vulnerability scanner, the Tenable solution delivers a centralized and integrated view of the city’s vulnerability status across its far-flung network.

“I knew Nessus was flexible and my team could go ahead and start using it with no issues. It was quick and easy for us to set up, and with a little training, we were able to start doing scans and gain complete visibility into our network.”

What are some of the other reasons they chose Tenable? “When you’re getting service tickets but you don’t have visibility into your network, you don’t really know what is happening. With Nessus, we have continuous visibility and actionable context, so we can tell the bigger story from a security perspective. Nessus gives us an enterprise view and enables us to test our assumptions on whether we’re secure or still at risk,” he explained.

Hayslip is also a fan of the platform’s multifaceted features, which enable end users to utilize different types of technology and data and perform a variety of actions. “It’s like a digital Swiss army knife,” he added.

SecurityCenter CV’s unique sensors and advanced analytics continuously scan, monitor and prioritize network threats, enabling the city’s IT team to quickly and remotely remediate issues. That saves the team valuable time and manpower, and frees them up to focus on other critical issues.

Hayslip and his team run daily scans to monitor and assess inventory network traffic and data from all sources — including thousands of mobile and other BYOD devices — to identify misconfigured devices, compliance issues and missing or outdated patches in real time. They also perform PCI scans and send them to Tenable for analysis to ensure compliance. And to demonstrate network status, they can quickly create custom reports for city stakeholders, IT leaders and third-party vendors.

By delivering a comprehensive and continuous view of the city’s security posture across its enterprise network, Tenable has already helped reduce the City of San Diego’s threat exposure — and save it more than $1.3 million per year.

“Previously, we averaged about 200 infected machines per month, each costing about $600 in lost productivity. Today we average about 35. In addition to saving our IT department time and money, Tenable has helped us build a flexible, streamlined security program that reduces our attack surface,” he said.

What does the future hold for the City of San Diego? The thriving city is on target for continued growth — and that includes behind the scenes as well. The city currently has numerous staffers logging in remotely through VPN connections, and is planning to renew its Tenable subscription with a 50% increase in IP addresses. It is also moving into mobile and is using cloud-based solutions to host its vast stores of data.

“We are a 24/7/365 business, and you can’t run a network of this size without expanding into a cloud environment,” noted Hayslip, adding that Tenable solutions strategically dovetail with his five year plans. “Nessus provides our baseline of valid network information, it provides an enterprise-wide view of what's going on. It’s just a good fit.”

Hayslip is now talking to Tenable about a cloud-based solution, which offers vulnerability management capabilities, scalability and enterprise user-support, and is a PCI approved scanning vendor (ASV) solution.

“As we continue to grow, we’re becoming a much bigger target for the bad guys, and Tenable is instrumental in helping us stay ahead of the threats,” he said. So with all of the many features and capabilities the company provides, what does he consider most important? His response is quick. “Tenable helps me sleep at night.”

Back to Top

  • Tenable Nessus
  • Tenable Security Center

Related customer case studies

State government employment agency


Read case study

Public Sector Organisation


Read case study

State Government Agency


Read case study

Explore all case studies ›

Your exposure ends here.

Partners

  • Become a partner
  • Find a partner
  • Partner portal
  • Partner programs

Resources

  • Services
  • Technical support
  • Training and certifications
  • Product documentation
  • Customer community
  • Tenable Trust

Company

  • About us
  • Executive team
  • Newsroom
  • Investor relations

Connect

  • Contact us
  • Try our product
  • Chat with sales
  • Meet us at an event
  • Join us
  • Privacy policy
  • Do not sell/share my personal information
  • Legal
  • 508 compliance

© 2026 Tenable®, Inc. All rights reserved

Tenable One

Request a demo

The world’s leading AI-powered exposure management platform.

Thank You

Thank you for your interest in Tenable One.
A representative will be in touch soon.

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

Request a demo

Close cloud exposure with the actionable cloud security platform.

Thank You

Thank you for your interest in Tenable One Cloud Exposure.
A representative will be in touch soon.

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

Request a demo

Identify and prioritize vulnerabilities based on risk to your business. Managed on premises.

Thank You

Thank you for your interest in Tenable Security Center.
A representative will be in touch soon.

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

Request a demo

Streamline security and IT collaboration and shorten the mean time to remediate with automation.

Thank You

Thank you for your interest in Tenable Patch Management.
A representative will be in touch soon.

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

Request a demo

Know, expose and close IT and container vulnerabilities.

Thank You

Thank you for your interest in Tenable Enclave Security.
A representative will be in touch soon.

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

Request a demo

Gain visibility into your internet-connected assets to eliminate blind spots and unknown sources of risk.

Thank You

Thank you for your interest in Tenable One Attack Surface Management.
A representative will be in touch soon.

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

Request a demo

See, secure, and manage how your teams use AI platforms.

Thank You

Thank you for your interest in Tenable One AI Exposure.
A representative will be in touch soon.

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

Request a demo

Close OT exposure with the unified security solution for converged OT/IT environments.

Thank You

Thank you for your interest in Tenable One OT Exposure.
A representative will be in touch soon.

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

Request a demo

Close identity exposure with the essential solution for the identity-intelligent enterprise.

Thank You

Thank you for your interest in Tenable One Identity Exposure.
A representative will be in touch soon.

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

Why Tenable

See Tenable in action

Want to see how Tenable can help your team find and fix critical cyber weaknesses that put your business at risk? Complete this form to get a custom quote or demo.

Thank you for subscribing!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Thank You

You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

Subscribe

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Thank you for subscribing!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

Try for free

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.


Buy now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


Number of assets

100

Choose your subscription

Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management.
A representative will be in touch soon.

Debug:
Form ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

Try for free

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy now

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

FQDNs

5
$3,578
Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Web App Scanning.
A representative will be in touch soon.

Debug:
Form ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

Try for free

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Fill out the form below to continue with a Nessus Pro trial.

Buy now

Buy Tenable Nessus Professional

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

*VAT incl.

Try for free

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional? Upgrade to Nessus Expert free for 7 days.

Buy now

Buy Nessus Expert


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.