Nessus Vulnerability Scanner
Nessus has been deployed for vulnerability, configuration and compliance assessments by more than one million users across the globe. Nessus prevents network attacks by identifying the vulnerabilities and configuration issues that hackers use to penetrate your network.
Nessus supports more technologies than competitive solutions, scanning operating systems, network devices, next generation firewalls, hypervisors, databases, web servers, and critical infrastructure for vulnerabilities, threats, and compliance violations.
Complete Vulnerability Coverage:
- Virtualization & Cloud
- Malware & Botnets
- Configuration Auditing
- Web Applications
Flexible reporting: Customize reports to sort by vulnerability or host, create an executive summary, or compare scan results to highlight changes
Targeted email notifications of scan results, remediation recommendations and scan configuration improvements
Scanning: Vulnerability scanning (including IPv4/IPv6/hybrid networks)
Broad asset coverage and profiling including
Network Devices: firewalls/routers/switches (Juniper, Check Point, Cisco, Palo Alto Networks), printers, storage
Virtualization: VMware ESX, ESXi, vSphere, vCenter, Microsoft, Hyper-V, Citrix Xen Server
Operating Systems: Windows, OS X, Linux, Solaris, Free BSD, Cisco iOS, IBM iSeries
Databases: Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL, MongoDB
Web Applications: Web servers, web services, OWASP vulnerabilities
Cloud: Scans the configuration of cloud applications like Salesforce and cloud instances like Amazon Web Services, Microsoft Azure and Rackspace
Detect viruses, malware, backdoors, hosts communicating with botnet-infected systems, known/unknown processes, web services linking to malicious content
Correlation with exploit frameworks (Metasploit, Core Impact, Canvas, and ExploitHub) and filtering by exploitability and severity.