Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

SecurityCenter Now Supports Nessus Agents

Note: Tenable SecurityCenter is now Tenable.sc. To learn more about this application and its latest capabilities, visit the Tenable.sc web page. Nessus Cloud is now a part of Tenable.io Vulnerability Management. To learn more about this application and its latest capabilities, visit the Tenable.io Vulnerability Management web page.

We are pleased to announce that SecurityCenter 5.1 will be available later this week. Many SecurityCenter and SecurityCenter Continuous View™ customers have been anticipating the integration with Nessus® agents, and SecurityCenter 5.1 delivers it.

SecurityCenter extends visibility of vulnerabilities and misconfigurations by automatically importing Nessus agent scan data. Agents deliver the detailed internal visibility of credentialed scans to Nessus Cloud or Nessus Manager, and SecurityCenter automatically uploads the scan data. The result: security assurance.

Nessus agents help you:

  • Secure the mobile workforce – You no longer need to worry about excluding assets that are offline during a vulnerability scan. A Nessus agent runs the scan locally. Later, when a connection is available, it uploads results to Nessus Manager or Nessus Cloud. From there, SecurityCenter or SecurityCenter CV imports the data.
  • Secure systems on complex or bandwidth-limited networks – Agents remove the challenge of scanning systems over segmented or complex networks. Plus, they reduce network bandwidth need, which is important for remote facilities connected by slow networks.
  • Remove credential headaches – Many organizations struggle with regular password changes unless a credential manager, such as CyberArk, is used. Nessus agents make host credential headaches a thing of the past.

The list of operating systems supported by Nessus agents continues to grow and currently includes Windows, Mac OS X, and Amazon, Debian, Red Hat, Fedora, and Ubuntu Linux.

The integration of Nessus agents with SecurityCenter expands your options to discover assets across your environment, identify vulnerabilities and misconfigurations, monitor network traffic, and detect suspicious activity. Data sources include:

  • Network-based scans – Analyze scanned devices from both external and internal points of view. In many organizations, managing credentials for scans is challenging because credentials change regularly and getting updates to all the people and systems that need them can be burdensome.
  • Agent-based scans – Analyze scanned devices locally from an internal point of view.
  • Integrations – Leverage data from third-party systems, such as patch management and mobile device management.
  • Passive monitoring (SecurityCenter CV) – Monitor and analyze network traffic to detect hosts, devices, connections, services, web applications and vulnerabilities.
  • Host activity analysis (SecurityCenter CV) – Capture and analyze events from endpoints, security infrastructure, network devices, and NetFlow so you can see what users are doing, detect changes, and know how systems are being used.

Additional material about Nessus agents and using them with SecurityCenter is readily available:

Related Posts

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.