Nessus Perimeter Service

Nessus Perimeter Service

Call for Price

Nessus Perimeter Service

Comprehensive and Secure Cloud-based Vulnerability Scanning

Tenable’s Nessus Perimeter Service including the Tenable PCI Scanning Service is a remote vulnerability scanning service which audits Internet-facing IP addresses for network and web application vulnerabilities, as well as validates PCI Approved Scanning Vendor (ASV) compliance.

Nessus Perimeter Service provides secure web access to launch scans, generate reports, and examine detailed vulnerability audits and remediation information from any computer or the free Tenable Nessus App for iPhone, Android, and iPod touch.

Perimeter Service is supported by a world-renowned research team and has a continuously-updated library of vulnerability and configuration checks, making it suitable for even the most complex audits.

Clear selection

Product Description

Subscription Details

Nessus Perimeter Service is available as a subscription which includes:

  • A one-, two-, or three-year renewable subscription to Nessus Perimeter Service including the Tenable PCI Scanning Service
  • Unlimited scanning of your perimeter IPs
  • Web application audits
  • Ability to prepare security assessments against current PCI standards
  • PCI ASV validation by Tenable's PCI-certified experts with up to 2 submitted scans per calendar quarter
  • 24/7 access to the Tenable Support Portal for access to Nessus knowledgebase, support ticket creation, and chat support
  • One user account per subscription

Key Benefits

  • Rapid deployment/low overhead: No software installation, rollout, or maintenance
  • Value-based licensing: Pay one flat fee and scan as many Internet-facing IP addresses as you want, as often as you like
  • Easy to use: Automated scans initiated via a web browser or free Tenable Nessus App for iPhone, Android, or iPod touch
  • Comprehensive: Continuously-updated library of nearly 50,000 vulnerability and configuration checks
  • Secure: Trusted, third-party security audits with end-to-end encryption

Reviews

There are no reviews yet, would you like to submit yours?