Policy creation is simple and only requires a few clicks to scan an entire corporate network.
50,000+ CVEs – the most in the industry. Nessus scans more technologies and uncovers more vulnerabilities than competing solutions.
Cost-effective for any consultant or team, Nessus provides complete vulnerability scanning with unlimited assessments for one low price.
Nessus identifies the vulnerabilities that need attention with high-speed, accurate scanning and minimal false-positives.
Tenable researchers leverage extensive intel sources, providing plug-ins that deliver timely protection from the latest threats.
Easily migrate to Tenable.io or other Tenable solutions as your vulnerability management needs increase.
Nessus is the industry gold standard. Meet all your compliance requirements with our pre-built compliance templates.
Simple fixed fee pricing. No charges for additional scans. Unlimited IPs.
Supported on a variety of operating systems: Linux, Mac OS X, Windows.
The result: less time and effort to assess, prioritize, and remediate issues
Out of the box, pre-configured templates are included for a range of IT and mobile assets - from configuration audits to patch management effectiveness - to help you quickly understand where you have vulnerabilities. Nessus includes more than 450 compliance and configuration templates to audit configuration compliance against CIS benchmarks and other best practices.
Easily create reports based on customized views, including specific vulnerability types, vulnerabilities by a host or by the plugin. Create reports in a variety of formats (HTML, CSV and .nessus XML) and easily customize reports by team or client which can be emailed with every scan.
Live Results automatically performs an offline vulnerability assessment with every plugin update, showing you where you may have vulnerabilities based on your scan history. From here you can easily run a scan to validate the presence of the vulnerability which accelerates the accurate detection and prioritization of issues.
Similar issues or categories of vulnerabilities are grouped together and presented in one thread, simplifying the time to research and prioritize issues for remediation. Snoozing lets you select specific issues to disappear from view for a specified period of time. So you only focus on the issues that matter at that time.
“Nessus has been a core component of information security. We evaluated a lot of different tools before and we always knew that the threat intelligence level behind Nessus was really good. I’ve had a lot of success with it.”
Matthew S, Security ProfessionalAmerican Eagle Outfitters
“Nessus is essential to our security. We’ve had a situation where we realized that one of our devices was unsecured and Nessus successfully identified the threat. Nessus also helped us identify other unsecured devices in our network which dramatically improved our security.”
Evan L, Sr. Consultant - IT SecurityVirtustream
“Each day things are becoming more and more digital. This means that we have to actively think about data integrity and confidentiality. Tenable limits the cyber exposure which makes it less likely to have security incidents and data integrity issues.”
Dustin L, Information Technology Product OwnerWorld Wide Technology