Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.
Description
What is Nessus
Tenable Nessus, a proprietary vulnerability scanner. Tenable.io is a paid subscription service. Tenable also include Nessus Cloud, which was previously known as Tenable’s Software-as-a-Service solution. Nessus is an open-source network vulnerability scanner that employs the Common Vulnerabilities and Exposures architecture to facilitate the cross-linking of compliant security tools. Indeed, it is one of many vulnerability scanners that are used during vulnerability assessments and penetration testing engagements, including malicious attacks. Nessus is a program that scans computers for vulnerabilities that hackers MAY exploit.
Nessus can scan for the following vulnerabilities and exposures:
- Vulnerabilities on a system that could allow unauthorized control or access to sensitive data
- Misconfiguration (e.g. open mail relay) (e.g. open mail relay)
- Vulnerabilities for denial of service (Dos)
- Some system accounts have default passwords, a few common passwords, and blank/absent passwords.
Benefits of Nessus
- Install on Any Platform- Nessus can run on a variety of platforms, including Raspberry Pi. It is fully portable, regardless of where you are, where you need to go, or how distributed your environment is.
- Efficiency and precision
Dynamically compiled plug-ins improve scan performance and efficiency, allowing for a faster first scan completion and time to value. - Increase Your Understanding of Your Internet-Facing Attack Surface
What you can’t see can’t be protected. Discover and evaluate internet-connected assets before they find you. - Before Deployment, Secure Cloud Infrastructure
Find security flaws during the software development lifecycle (SDLC) before it’s too late. - Concentrate on the Most Serious Threat
Market-leading coverage ensures that you are aware of all vulnerabilities. Use the power of Nessus to triage and address the most pressing threats. - Pre-Configured Policies and Templates
Over 450 pre-configured templates assist you in quickly determining where you have vulnerabilities. Configuration compliance can be easily audited against CIS benchmarks and other best practices. - Pre-Configured Policies and Templates
Over 450 pre-configured templates assist you in quickly determining where you have vulnerabilities. Configuration compliance can be easily audited against CIS benchmarks and other best practices.