Tenable Announces Nessus Enterprise to Empower Team Collaboration for Vulnerability, Configuration and Compliance AssessmentTenable Announces Nessus Enterprise to Empower Team Collaboration for Vulnerability, Configuration and Compliance Assessment
Nessus Enterprise Expands Use of Market-leading Scanning Tool for Administrators, Auditors and Security Analysts
May 22, 2014
Columbia, MD — May 19, 2014 –– Tenable Network Security®, Inc., the leader in real-time vulnerability, threat and compliance management, today announced Nessus Enterprise, a new offering to streamline vulnerability assessment, configuration and compliance auditing and demonstrate adherence to PCI DSS requirements. Nessus Enterprise makes it easy for teams to collaborate by providing central management of Nessus scanners, simplifying access for multiple users to scanners and scan results.
The recent Heartbleed and Internet Explorer vulnerabilities have been a wakeup call for many organizations to make scanning a priority. Nessus Enterprise enables security and compliance teams to:
· scan more assets more often
· include role-based access for administrators, auditors and security analysts
· share scanners, schedules, scan results and policies
With the addition of Nessus Enterprise, Tenable’s range of solutions supports organizations of all sizes and levels of maturity, whether their goals are scanning more often and on demand to scanning 100% of all assets all of the time through continuous monitoring.
Nessus Enterprise Cloud, also available now, is Nessus Enterprise hosted by Tenable. It allows users to access their Nessus internal scanners and reports from the cloud and perform external scans of their Internet-facing IPs for network and Web application vulnerabilities. A PCI-Certified Approved Scanning Vendor (ASV) solution, Nessus Enterprise Cloud also includes quarterly network scanning for external vulnerability scan validation for PCI.
“With new breaches making headlines weekly, customers are realizing the critical importance of shoring up potential entry paths for attackers by finding and eliminating vulnerabilities,” said Renaud Deraison, Chief Research Officer for Tenable Network Security. “Tenable is making this process, along with maintaining compliance, easier than ever for teams with the introduction of Nessus Enterprise, expanding their ability to work together to leverage a vast amount of up-to-date vulnerability data and remediate before attackers can exploit them.”
Nessus Enterprise is the first major scanning solution that can be deployed on-premises or accessed from the cloud. Like all Tenable products, Nessus Enterprise detects vulnerabilities, eliminates threats and ensures compliance across systems, applications and infrastructure.
Nessus is the industry’s most widely-deployed vulnerability, configuration and compliance scanner used by security analysts and compliance auditors. Nessus features high-speed asset discovery, patch and configuration auditing, asset profiling, sensitive data discovery, patch management integration, multi-scanner control and vulnerability analysis. With the world’s largest continuously-updated library of vulnerability and configuration checks, Nessus is the gold standard for speed and accuracy.
Nessus Enterprise and Nessus Enterprise Cloud are available now. For more information, please visit: http://www.tenable.com/products/nessus.
About Tenable Network Security
Tenable Network Security is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world’s largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its solutions continue to set the standard to identify vulnerabilities, prevent attacks and comply with a multitude of regulatory requirements. For more information, please visit www.tenable.com.
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment