Streamline Vulnerability Scanning, Administration, and Reporting
For organizations with large and complex networks, SecurityCenter combines the power of Nessus® scanning with an enterprise-class vulnerability management platform. SecurityCenter:
- Simplifies administration using a single console that manages distributed Nessus scanners for enterprise-wide security and compliance visibility
- Accelerates scans with distributed and load balanced scanning, using a centralized database for faster and more efficient scans
- Delivers advanced analytics including extensive dashboards, built-in and customizable reports that aggregate scan data to help you identify and respond to security and compliance issues
SecurityCenter provides a single console to administer Nessus policies, alerts, reports, and plugin updates across the enterprise. Use SecurityCenter to manage on-premise scanners as well as the hosted scanning service. Role-based administration, monitoring, and reporting support organizations that distribute responsibilities across multiple teams.
Use SecurityCenter to distribute and load balance scanning for faster scan times and shorter scanning cycles. You can add additional Nessus scanners to optimize scan cycles. A centralized database consolidates all scan data, eliminating manual aggregation and analysis.
Gain centralized visibility through SecurityCenter's centralized dashboards, audits, and reports. SecurityCenter tracks vulnerability trends against the widest range of regulatory and IT compliance standards and best practices. It provides advanced workflows and out-of-the-box correlation and analysis.
Which Edition of SecurityCenter is right for you?
|SecurityCenter||SecurityCenter Continuous View|
|Unlimited active scanning with Nessus||Yes||Yes|
|Industry's largest vulnerability database, with plugins updated daily||Yes||Yes|
|Extensive compliance reporting and auditing||Yes||Yes|
|Supports IPv6 address space||Yes||Yes|
|Mobile device detection and scanning||Yes (via Nessus)||Yes
|Real-time asset discovery||Yes|
|Patented passive vulnerability scanning and network analysis||Yes|
|Cloud application usage detection||Yes|
|Third-party intelligence enrichment||Yes|
|Malware detection and attack paths analysis||Yes|
|Statistical profiling for anomaly detection and event correlation||Yes|
|Stores, compresses and searches logs from thousands of network devices and applications||Yes|
|Aggregate and normalize data from FWs, IDS/IPS, and DLP solutions, raw network traffic, NetFlow, application logs, user activity, etc.||Yes|