Remove products nessus
article thumbnail

Tenable Nessus Expands Attack Surface Coverage with Web Application Scanning

Tenable

Here’s how Tenable Nessus can help. When Tenable Nessus was launched in 1998, the attack surface consisted of only traditional IT devices — desktops, workstations, network equipment, etc. What’s needed is Tenable Nessus Expert. And, today, with the release of Nessus 10.6,

article thumbnail

Strengthening the Nessus Software Supply Chain with SLSA

Tenable

You know Tenable as a cybersecurity industry leader whose world-class exposure management products are trusted by our approximately 43,000 customers, including about 60% of the Fortune 500. In a nutshell, this meant producing provenance for a Nessus build. At Tenable, protecting our software supply chain is a top priority.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Introducing Nessus Expert, Now Built for the Modern Attack Surface

Tenable

Nessus has long been the undisputed leader in vulnerability assessment. With the introduction of Nessus Expert, you can now protect against new, emerging cyberthreats across cloud infrastructure and understand what's in your external attack surface. Introducing the newest member to the Nessus line-up, Nessus Expert.

article thumbnail

Tenable Nessus Scanner Capabilities Receive Red Hat Recognition

Tenable

The Red Hat Vulnerability Scanner Certification for Tenable Nessus represents our commitment to continue providing customers with visibility into their Red Hat Enterprise Linux systems. This certification recognizes that the Tenable Nessus scanner has been tested and certified to meet the high standards of Red Hat's certification program.

Linux 73
article thumbnail

Maximize Your Vulnerability Scan Value with Authenticated Scanning

Tenable

However, it's interesting to note that a significant number of Tenable Nessus users tend towards unauthenticated scans. The scan configurations we observe in Tenable’s SaaS products are telling: our customers run unauthenticated scans 20 times more than authenticated ones. How will Nessus use them, or log their use?

article thumbnail

Nessus 10.0: Vulnerability Assessment for Today’s Dynamic Environments

Tenable

A vulnerability assessment tool that has easy navigation, and includes access to resource centers, on-demand training and in-program user guides can greatly enhance the adoption of all product capabilities, even in environments where staffing is limited. How Nessus 10 meets the needs of the remote workplace. Here’s how Nessus 10.0

article thumbnail

Study: Tenable Offers Fastest, Broadest Coverage of CISA's KEV Catalog

Tenable

That’s according to the “ Vulnerability Management Competitive Assessment ” report, published this month by product testing company Miercom and commissioned by Tenable. Finding the CISA KEVs in your scan results Tenable Nessus Essentials, Professional or Expert Tenable Nessus customers can filter on a CVE in any completed scan result.