Nessus Vulnerability Scanner

Nessus has been deployed for vulnerability, configuration and compliance assessments by more than one million users across the globe. Nessus prevents network attacks by identifying the vulnerabilities and configuration issues that hackers use to penetrate your network.

Nessus supports more technologies than competitive solutions, scanning operating systems, network devices, next generation firewalls, hypervisors, databases, web servers, and critical infrastructure for vulnerabilities, threats, and compliance violations.

Complete Vulnerability Coverage:

  • Virtualization & Cloud
  • Malware & Botnets
  • Configuration Auditing
  • Web Applications

Flexible reporting: Customize reports to sort by vulnerability or host, create an executive summary, or compare scan results to highlight changes

Targeted email notifications of scan results, remediation recommendations and scan configuration improvements

Scanning: Vulnerability scanning (including IPv4/IPv6/hybrid networks)

Broad asset coverage and profiling including

Network Devices: firewalls/routers/switches (Juniper, Check Point, Cisco, Palo Alto Networks), printers, storage

Virtualization: VMware ESX, ESXi, vSphere, vCenter, Microsoft, Hyper-V, Citrix Xen Server

Operating Systems: Windows, OS X, Linux, Solaris, Free BSD, Cisco iOS, IBM iSeries

Databases: Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL, MongoDB

Web Applications: Web servers, web services, OWASP vulnerabilities

Cloud: Scans the configuration of cloud applications like Salesforce and cloud instances like Amazon Web Services, Microsoft Azure and Rackspace

Detect viruses, malware, backdoors, hosts communicating with botnet-infected systems, known/unknown processes, web services linking to malicious content

Correlation with exploit frameworks (Metasploit, Core Impact, Canvas, and ExploitHub) and filtering by exploitability and severity.