Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Releases Nessus 4 Vulnerability Scanner

April 9, 2009

Columbia, MD

Tenable provides improved performance and enhancements of industry leading network vulnerability scanner 

Tenable Network Security, Inc., the leader in Unified Security Monitoring and creator of the popular and award-winning Nessus vulnerability scanner, today announced the release of Nessus version 4 for general availability. Tenable’s Nessus vulnerability scanner is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. 

Improved Performance

With the release of Tenable’s Nessus 4, Nessus users will gain access to many new performance enhancements that increase its enterprise efficiency in conducting security and compliance auditing.

  • Improved performance, with up to 100% speed increase on the Windows platform
  • Improved scalability and reduced memory usage
  • Unified set of tools on Unix, Windows and Mac OS X operating systems 

Flexible Deployment

Tenable supports the following operating systems for deployment of Nessus 4:

  • Microsoft Windows
  • Linux
  • Apple Mac OS X
  • FreeBSD

In addition, Nessus is available as 32-bit and 64-bit binaries for every major platform. For more information or to download Nessus 4 today, please visit: http://www.nessus.org/nessus/ 

Dedicated Research Organization

Subscriptions for Nessus 4 are available for Professional and Home users to remain up to date with the latest checks. Tenable Research is a dedicated group focused on the development of security checks for recent publicly disclosed vulnerabilities. The Nessus Plugin database is updated on a daily basis, and all the newest Plugins that are available can be retrieved via the automatic update feature of Nessus or updated manually.

Enterprise Monitoring

For the ongoing security and compliance monitoring of medium and large networks, Tenable’s Security Center can be deployed to provide continuous, asset-based security and compliance monitoring and reporting. Tenable’s Security Center supports Nessus 4’s unified configuration, target and results format. This new Nessus report format facilitates sharing results, scan configurations and target lists. 

“We are very pleased to announce the release the next major version of Nessus,” said Renaud Deraison, Chief Research Officer of Tenable and author of Nessus. “Nessus 4 users should see significant improvements in performance that will lead to more efficient and effective audits.”

About Tenable

Tenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include 53 percent of the Fortune 500, 29 percent of the Global 2000 and large government agencies. Learn more at tenable.com.

Contact Information:

Cayla Baker
[email protected]
(443) 539-6476

Stay up to date!

Subscribe to our email alerts for new press releases.

Subscribe for press release updates

Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.