SecurityCenter

SecurityCenter

Call for Price

Streamline Vulnerability Scanning, Administration, and Reporting

For organizations with large and complex networks, SecurityCenter combines the power of Nessus® scanning with an enterprise-class vulnerability management platform. SecurityCenter:

  • Simplifies administration using a single console that manages distributed Nessus scanners for enterprise-wide security and compliance visibility
  • Accelerates scans with distributed and load balanced scanning, using a centralized database for faster and more efficient scans
  • Delivers advanced analytics including extensive dashboards, built-in and customizable reports that aggregate scan data to help you identify and respond to security and compliance issues

Product Description

Simplified Administration

SecurityCenter provides a single console to administer Nessus policies, alerts, reports, and plugin updates across the enterprise. Use SecurityCenter to manage on-premise scanners as well as the hosted scanning service. Role-based administration, monitoring, and reporting support organizations that distribute responsibilities across multiple teams.

Faster Scans

Use SecurityCenter to distribute and load balance scanning for faster scan times and shorter scanning cycles. You can add additional Nessus scanners to optimize scan cycles. A centralized database consolidates all scan data, eliminating manual aggregation and analysis.

Advanced Analytics

Gain centralized visibility through SecurityCenter’s centralized dashboards, audits, and reports. SecurityCenter tracks vulnerability trends against the widest range of regulatory and IT compliance standards and best practices. It provides advanced workflows and out-of-the-box correlation and analysis.

Which Edition of SecurityCenter is right for you

SecurityCenter SecurityCenter Continuous View
Unlimited active scanning with Nessus Yes Yes
Industry's largest vulnerability database, with plugins updated daily Yes Yes
Extensive compliance reporting and auditing Yes Yes
Customizable dashboards Yes Yes
Supports IPv6 address space Yes Yes
LDAP access Yes Yes
Mobile device detection and scanning Yes (via Nessus) Yes 
(continuous)
Real-time asset discovery   Yes
Patented passive vulnerability scanning and network analysis   Yes
Database monitoring   Yes
Encryption detection   Yes
Cloud application usage detection   Yes
Third-party intelligence enrichment   Yes
Malware detection and attack paths analysis   Yes
Statistical profiling for anomaly detection and event correlation   Yes
Stores, compresses and searches logs from thousands of network devices and applications   Yes
Aggregate and normalize data from FWs, IDS/IPS, and DLP solutions, raw network traffic, NetFlow, application logs, user activity, etc.   Yes

Reviews

There are no reviews yet, would you like to submit yours?