Suitable for vulnerability assessment of the solution
Identify vulnerabilities.Understand the risks.To protect your modern attack surface.
Vulnerability assessment is to protect the enterprise from vulnerability has taken the first step, compared with the past, a vulnerability assessment is more important now.Because the cloud deployment has simplicity and extensibility, plus external oriented unknown assets, so you need a tool to learn with confidence from inside to outside and risk from outside to inside.A comprehensive understanding of all your assets Cyber Exposure, including all of your holes, errors, configuration and other puts enterprise risk situation of the potential security threat.
A free trial![漏洞评估 Vulnerability assessment](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/solutions/vulnerability-assess-hero.png)
Blocking the holes in the enterprise at risk
Nearly 60% of the network security professionals said they no good vulnerability scanning plan of enterprise, and many people also do not scan at public disclosure of vulnerabilities.
Source: PONEMON INSTITUTE network risk report
A measure of the risk of network operations and management
Automate vulnerability assessment, vulnerability in a quick insight into, and prediction of vulnerability to take action
Modern attack surface has become increasingly complex.If you are the whole attack surface is not completely visible, it can be difficult to find and fix all the loopholes in the whole enterprise.
found
If you do not know anything about risk, and the protection was impossible.For vulnerability assessment, the first step is to establish environmental full asset list, in any single place environment or location environment.But the environment has become increasingly complex, assets and variety, and to achieve this goal.
Tenable to provide you with the vulnerability assessment function, through the whole environment of deep insight into full visibility.Nessus coverage more than 47000 different kinds of assets, including IT, IoT and OT equipment, operating system, and a variety of applications, and so on.Whether you are in the corporate headquarters and other floors or other buildings, or on other continents, Nessus portability will support you to run assessment.
![整个环境的完整资产清单 The whole environment full asset list](http://www.yyueer.com/zh-cn/themes/custom/tenable/img/solutions/vulnerability-assessment/discover.jpg)
Do you know IT/OT integration environment can benefit from the Nessus?Tenable OT Security内置了 Nessus,可以扫描 OT 环境中的 IT 资产。For details.
assessment
Nessus can quickly and effectively identify vulnerabilities, and error in the network configuration, weaknesses and the carrier of potential threats.This is the first step before the attack.Nessus use out-of-the-box preconfigured templates, and according to the target scan of your unique environment, let you quickly get started.Every time add new plugins, Nessus will perform "real-time updates" to scan recently added information.
![识别网络中的漏洞、错误配置、弱点以及潜在威胁的载体 To identify the network vulnerability, misconfiguration, weakness and the carrier of potential threats](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/solutions/assess_0.jpg)
Comply with the
Actively show that comply with the company and industry regulations and standards.The Nessus can be based on more than 120Center for Internet security (CIS)And another 450 compliance and configuration templates to review the configuration compliance.We not only understand the vulnerability, but also broader understanding of risk.
![遵守 Comply with the](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/solutions/comply.jpg)
Analysis of the
Executive dashboard provides the overview of the entire enterprise.Advanced filtering, and grouping function can be used for fast in-depth study and analysis of the results, in order to understand the specific situation, and the impact of potential vulnerabilities.This accelerated the speed of detection, analysis and repair.
Insight into theThe Nessus Expert.
![分析结果 The results of the analysis](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/solutions/analyze.jpg)
The report
The Nessus intuitive format templates to provide snapshots and trend data.Create appropriate for your specific requirements of custom reports.Add a custom title and logo to tailored to a specific customer or project.In addition, you can export data and integrated into the workflow, for secondary analysis report with the customer.
![创建自定义报告 Create a custom report](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/solutions/report.jpg)
Use cases
From founded, we have work closely related to all kinds of network security industry.We will based on community feedback constantly optimize the Nessus, make it a very accurate and comprehensive vulnerability assessment on market solutions.Through exploring the Tenable customer how to put it into use in the various key case, know more information about its power.
![用例
Use cases](http://www.yyueer.com/themes/custom/tenable/img/solutions/vulnerability-assessment/tenable-va-personas.jpg)
Put an end to arbitrary on vulnerability assessment
Access to comprehensive insight into
Identify the attack surface of all the assets, vulnerabilities, wrong configuration and other security issues.
Beyond the traditional IT assessment
The vulnerability assessment extend beyond the traditional IT assets.assessment基础设施即代码(IaC) 存储库并发现面向外部的资产。
Management issues
Automatically send enterprise SIEM loopholes and wrong configuration information, in order to enrich the event data, according to event priority to investigate and provide necessary information to respond.
To improve the process
Understanding your process and operation situation, in the evaluation of effectiveness and identify gaps and strengthen your security posture.
"...Thanks to the Nessus, I can be found in hundreds of IP address only vulnerable services."Josep Pi Rodriguez
IOActive's chief security adviser assistant