0% found this document useful (0 votes)
3 views2 pages

Nessus DataSheet

Nessus® is a widely-deployed vulnerability scanner that offers comprehensive security assessments, including asset discovery, compliance auditing, and vulnerability analysis, trusted by over 20,000 customers. It features customizable deployment options, rapid scanning capabilities, and a low total cost of ownership, making it suitable for large organizations. Additionally, Nessus provides flexible reporting, targeted notifications, and integration with complementary Tenable products for enhanced security management.

Uploaded by

Bo Pham Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views2 pages

Nessus DataSheet

Nessus® is a widely-deployed vulnerability scanner that offers comprehensive security assessments, including asset discovery, compliance auditing, and vulnerability analysis, trusted by over 20,000 customers. It features customizable deployment options, rapid scanning capabilities, and a low total cost of ownership, making it suitable for large organizations. Additionally, Nessus provides flexible reporting, targeted notifications, and integration with complementary Tenable products for enhanced security management.

Uploaded by

Bo Pham Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

| DATA SHEET

Nessus®
The World’s Most Trusted Vulnerability Scanner

Product Overview
Nessus® is the industry’s most widely-deployed vulnerability, configuration, and compliance
assessment product. Nessus features high-speed discovery, configuration auditing, asset
With more than 20,000 customers
profiling, sensitive data discovery, patch management integration, and vulnerability analysis. worldwide, Nessus is trusted by
With a continuously-updated library of more than 60,000 vulnerability and configuration checks more professionals than any other
(plugins) and the support of Tenable’s expert vulnerability research team, Nessus delivers
accuracy to the marketplace. Nessus scales to serve the largest organizations and is
security and compliance product.
quick-and-easy to deploy.

Key Benefits
• Easy customization for your organization
–– Flexible deployment, scanning, and
reporting
–– Targeted email notifications of
scan results and remediation
recommendations
–– Vulnerability modifications
• Rapid, comprehensive security assessment
–– Identify patch status conflicts between
Nessus and patch management systems,
or among deployed patch managers
–– Consolidated list of patches to apply to
Targeted Nessus email notifications provide an overview of the scan results, become fully patched
remediation recommendations, and suggestions to improve future scans
• Lower your cyber risks, vulnerabilities, and
compliance/audit citation risks
Nessus Features –– Automatic post-scan analysis with
Scanning Capabilities
attachments stored in scan reports
• Accurate, high-speed asset discovery
• Low total cost of ownership (TCO)
• Compliance auditing: FFIEC, FISMA, CyberScope Reporting Protocol, GLBA, HIPAA/
HITECH, NERC, PCI, SCAP, SOX –– Scan unlimited number of IPs, as often
• Configuration auditing: CERT, CIS, COBIT/ITIL, DISA STIGs, FDCC, IBM iSeries, ISO, NIST, NSA as you like
• Patch auditing: Includes patch management integration with IBM® TEM for Patch –– Nessus subscriptions include software
Management, Microsoft® SCCM and WSUS, Red Hat® Network Satellite Server, and updates, access to compliance and
VMware® Go audit files, and support
• Control systems auditing: SCADA systems, devices, and applications –– Automatic plugin updates
• Sensitive content auditing: PII (credit card numbers, SSNs) and intellectual property • Anytime, anywhere access from any
• Mobile device auditing: Lists iOS, Android™, and Windows Phone 7 devices accessing the Internet browser for improved efficiency
network and detects mobile vulnerabilities
• Vulnerability scanning for:
–– Network devices: Juniper, Cisco, Palo Alto Networks, firewalls, printers, and more
–– Virtual hosts: VMware ESX, ESXi, vSphere, vCenter
–– Operating systems: Windows, Mac, Linux, Solaris, BSD, Cisco iOS, IBM iSeries
–– Databases: Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL
–– Web applications: Web servers, web services, OWASP vulnerabilities
–– Compromise detection: Viruses, malware, backdoors, hosts communicating with
botnet-infected systems, web services linking to malicious content
–– IPv4/IPv6/hybrid networks
• Credentialed scanning detects local vulnerabilities and conditions
• Uncredentialed network-based scanning finds new hosts and vulnerabilities
| DATA SHEET

Deployment and Management


• Flexible deployment: Software application, hardware and virtual
Nessus Auditor Bundles
appliances (including Nessus AMI for Amazon Web Services Nessus training and certification are available for those who are new
(AWS) cloud), or as service to using Nessus and want the knowledge and skills to maximize every
benefit of the Nessus scanner. Tenable has assembled several Nessus
• Agentless scanner for easy deployment and maintenance
Auditor Bundles which combine subscriptions for Nessus, Nessus
• Browser-based installation wizard Perimeter Service, or both subscriptions, with Nessus On Demand
• Configuration and management via Nessus GUI Training and a Certification Exam at a significant cost savings over
purchasing these items separately.
– Easily create policies using a variety of wizards
– Schedule scans to run once or on recurring basis
• Five criticality levels: Critical Risk, High Risk, Medium Risk, Low
Complementary Tenable Products
Risk, Informational Organizations can extend the capabilities of Nessus with complementary
products from Tenable.

• Tenable Passive Vulnerability Scanner™ (PVS™): Continuously


monitors for vulnerabilities and new or transient assets.

network relationships, and compliance violations. Available as a


subscription or as part of SecurityCenter CV.
• Tenable SecurityCenter™: Accelerates and simplifies vulnerability
and compliance management, with a single console managing
distributed Nessus scans and providing advanced analytics and
dashboards.
• Tenable SecurityCenter Continuous View: A unique combination of
active Nessus scanning, passive PVS detection, and log analysis
that discovers and classifies IT assets across the enterprise.
Nessus provides convenient access to scan details to assist with
vulnerability investigations.

Reporting and Monitoring The Nessus Advantage


• Flexible reporting: Customize reports to sort by vulnerability or
There are many vulnerability scanners on the market, but millions
host, create an Executive Summary, or compare scan reports to
highlight changes
– Native (XML), PDF (requires Oracle Java be installed on Nessus • Highly-accurate scanning with low false positives
server), CSV, and HTML formats • Comprehensive scanning capabilities and features
• Targeted email notifications of scan results, remediation • Scalable to hundreds-of-thousands of systems
recommendations, and scan improvements • Easy deployment and maintenance
• Low cost to administer and operate
Nessus Deployment Options
Nessus: Software-based Nessus scanner which is licensed per
installation. Each active Nessus scanner requires a feed subscription For More Information
which includes: Unlimited IP scanning for internal and external IPs, Questions, purchasing, or evaluation:
access to all plugins and audit policies, free software/plugin updates, E-SPIN Group of Companies (Business Centre strategic presence across the region)
E-SPIN SDN. BHD. (714753-U)
and support.
E-SPIN INTERNATIONAL LIMITED (1970945)
E-SPIN INTERNATIONAL PTE. LTD. (201312412W)
Nessus Perimeter Service™ with Tenable PCI Scanning Service:
Southeast Asia: Malaysia | Singapore | Indonesia | Thailand | Philippines | Brunei |
Software-as-a-service Nessus scanner which can be used to audit
Vietnam | Myanmar (Burma) | Cambodia | Laos
Internet-facing IPs for network and web application vulnerabilities
Greater China Region: Hong Kong | Macau | Taiwan | China
and validate PCI Approved Scanning Vendor (ASV) compliance.
Nessus Perimeter Service is licensed per end user, and the
subscription includes: Unlimited IP scanning for external IPs, Tenable sales@e-spincorp.com
PCI Scanning Service, access to all plugins and audit policies, free Twitter: twitter.com/espincorp
plugin updates, and support. YouTube: youtube.com/user/espincgroup
Tenable Blog: espincorp.wordpress.com
Facebook: facebook.com/espincorp
www.e-spincorp.com/espinv3/index.php/tenable-network-security

Copyright © 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered
trademarks of Tenable Network Security, Inc. Unified Security Monitoring, SecurityCenter, Passive Vulnerability Scanner, Log
Correlation Engine, and Perimeter Service are trademarks of Tenable Network Security, Inc. All other products or services are
trademarks of their respective owners. EN-JAN142014-V1
2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy