Nessus DataSheet
Nessus DataSheet
Nessus®
The World’s Most Trusted Vulnerability Scanner
Product Overview
Nessus® is the industry’s most widely-deployed vulnerability, configuration, and compliance
assessment product. Nessus features high-speed discovery, configuration auditing, asset
With more than 20,000 customers
profiling, sensitive data discovery, patch management integration, and vulnerability analysis. worldwide, Nessus is trusted by
With a continuously-updated library of more than 60,000 vulnerability and configuration checks more professionals than any other
(plugins) and the support of Tenable’s expert vulnerability research team, Nessus delivers
accuracy to the marketplace. Nessus scales to serve the largest organizations and is
security and compliance product.
quick-and-easy to deploy.
Key Benefits
• Easy customization for your organization
–– Flexible deployment, scanning, and
reporting
–– Targeted email notifications of
scan results and remediation
recommendations
–– Vulnerability modifications
• Rapid, comprehensive security assessment
–– Identify patch status conflicts between
Nessus and patch management systems,
or among deployed patch managers
–– Consolidated list of patches to apply to
Targeted Nessus email notifications provide an overview of the scan results, become fully patched
remediation recommendations, and suggestions to improve future scans
• Lower your cyber risks, vulnerabilities, and
compliance/audit citation risks
Nessus Features –– Automatic post-scan analysis with
Scanning Capabilities
attachments stored in scan reports
• Accurate, high-speed asset discovery
• Low total cost of ownership (TCO)
• Compliance auditing: FFIEC, FISMA, CyberScope Reporting Protocol, GLBA, HIPAA/
HITECH, NERC, PCI, SCAP, SOX –– Scan unlimited number of IPs, as often
• Configuration auditing: CERT, CIS, COBIT/ITIL, DISA STIGs, FDCC, IBM iSeries, ISO, NIST, NSA as you like
• Patch auditing: Includes patch management integration with IBM® TEM for Patch –– Nessus subscriptions include software
Management, Microsoft® SCCM and WSUS, Red Hat® Network Satellite Server, and updates, access to compliance and
VMware® Go audit files, and support
• Control systems auditing: SCADA systems, devices, and applications –– Automatic plugin updates
• Sensitive content auditing: PII (credit card numbers, SSNs) and intellectual property • Anytime, anywhere access from any
• Mobile device auditing: Lists iOS, Android™, and Windows Phone 7 devices accessing the Internet browser for improved efficiency
network and detects mobile vulnerabilities
• Vulnerability scanning for:
–– Network devices: Juniper, Cisco, Palo Alto Networks, firewalls, printers, and more
–– Virtual hosts: VMware ESX, ESXi, vSphere, vCenter
–– Operating systems: Windows, Mac, Linux, Solaris, BSD, Cisco iOS, IBM iSeries
–– Databases: Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL
–– Web applications: Web servers, web services, OWASP vulnerabilities
–– Compromise detection: Viruses, malware, backdoors, hosts communicating with
botnet-infected systems, web services linking to malicious content
–– IPv4/IPv6/hybrid networks
• Credentialed scanning detects local vulnerabilities and conditions
• Uncredentialed network-based scanning finds new hosts and vulnerabilities
| DATA SHEET
Copyright © 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered
trademarks of Tenable Network Security, Inc. Unified Security Monitoring, SecurityCenter, Passive Vulnerability Scanner, Log
Correlation Engine, and Perimeter Service are trademarks of Tenable Network Security, Inc. All other products or services are
trademarks of their respective owners. EN-JAN142014-V1
2