Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Captures SC Magazine’s 2015 Best Buy

We are very proud to announce that SC Magazine recently reviewed Nessus and recognized it as a "Best Buy" in the 2015 Vulnerability Management category.

The reviewer highlighted several key points:

  • Excellent value: Advanced scanning functionality at an attractive price point; an “excellent value for the price”
  • Deployment: Flexible deployment model supporting software, hardware, and cloud-hosted deployments, as well as a preconfigured virtual machine (VM) and Amazon EC2 instance
  • Mobile workforces: Nessus endpoint agents that scan assets even when those assets may not be connected to the network
  • Feature rich: Very powerful with "tons of functionality" including patch management integration, malware detection, cloud and virtualization scanning
  • Widely used: "One of the most comprehensive and widely deployed vulnerability assessment tools"

SC Magazine praised Nessus as "an extremely powerful scanning tool" and found no weaknesses in the product.

You can test drive Nessus by requesting an evaluation from the Nessus Download page.

Read the full review

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.