Nessus Vulnerability Scanner

Nessus Vulnerability Scanner

Call for Price

Nessus Vulnerability Scanner

The World’s Most Trusted Vulnerability Scanner

Nessus® is the industry’s most widely-deployed vulnerability and configuration assessment product. Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, patch management integration, and vulnerability analysis. With a continuously updated library of more than 55,000 vulnerability and configuration checks (plugins) and the support of Tenable’s expert vulnerability research team, Nessus delivers accuracy to the marketplace. Nessus scales to serve the largest organizations and is quick-and-easy to deploy.

Clear selection

Product Description

Nessus Features

Scanning Capabilities

  • Accurate, high-speed asset discovery
  • Compliance auditing: FFIEC, FISMA, CyberScope Reporting Protocol, GLBA, HIPAA/HITECH, NERC, PCI, SCAP, SOX
  • Configuration auditing: CERT, CIS, COBIT/ITIL, DISA STIGs, FDCC, IBM iSeries, ISO, NIST, NSA
  • Patch auditing: Includes patch management integration with IBM® TEM for Patch Management, Microsoft® SCCM and WSUS, Red Hat® Network Satellite Server, and VMware® Go
  • Control systems auditing: SCADA systems, devices, and applications
  • Sensitive content auditing: PII (credit card numbers, SSNs) and intellectual property
  • Mobile device auditing: Lists iOS, Android™, and Windows Phone 7 devices accessing the network and detects mobile vulnerabilities
  • Vulnerability scanning for:
    • Network devices: Juniper, Cisco, Palo Alto Networks, firewalls, printers, and more
    • Virtual hosts: VMware ESX, ESXi, vSphere, vCenter
    • Operating systems: Windows, Mac, Linux, Solaris, BSD, Cisco iOS, IBM iSeries
    • Databases: Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL
    • Web applications: Web servers, web services, OWASP vulnerabilities
    • Compromise detection: Viruses, malware, backdoors, hosts communicating with botnet-infected systems, web services linking to malicious content
    • IPv4/IPv6/hybrid networks
  • Credentialed scanning detects local vulnerabilities and conditions
  • Uncredentialed network-based scanning finds new hosts and vulnerabilities

Comprehensive Security and Compliance Auditing with Automatic Monitoring

  • Agentless auditing of configurations, patches, and web applications
  • 55,000+ vulnerability and configuration checks (plugins) – new plugins updated daily
  • Scans networks, systems, data, and applications
  • Post-scan analysis and monitoring tools
  • Part of Tenable's enterprise USM platform – providing centralized management of multiple vulnerability scanners and real-time vulnerability, log, and compliance management

Reviews

There are no reviews yet, would you like to submit yours?