Detect Assets, Vulnerabilities and Threats in Your Infrastructure
Nessus® is the world’s most widely-deployed vulnerability assessment scanner, chosen by more than 1.6 million users across the globe. Available as a single scanning solution as Nessus Professional or for multi-user teams as Nessus Manager, Nessus quickly and accurately identifies vulnerabilities, configuration and compliance issues, and malware in physical, virtual and cloud environments.
Tenable.io™ is the first Cyber Exposure platform to provide visibility into any asset on any computing platform. It enables security teams and executives to manage vulnerabilities and risks across the entire attack surface with confidence. Available as a cloud or on-prem deployment, and built on the leading Nessus technology from Tenable, Tenable.io delivers a modern approach that supports dynamic assets like cloud and containers.
The SecurityCenter® family manages and analyzes vulnerability data across the organization, prioritizes security risks and provides automated frameworks and compliance reporting. With continuous monitoring, security teams can measure and visualize the effectiveness of the security program using SecurityCenter’s pre-built, highly customizable dashboards and reports and the industry’s only Assurance Report Cards®.
|Nessus Professional||Nessus Manager||Tenable.io Vulnerability Management||Tenable.io Container Security||Tenable.io Web Application Scanning||SecurityCenter||SecurityCenter Continuous View|
|Deployment Type||On-Prem||On-Prem||Cloud or on-prem||Cloud||Cloud||On-Prem||On-Prem|
|Vulnerability Scanning & Assessment||✔||✔||✔||✔||✔||✔||✔|
|Web Application Tests Using the Nessus Scan Policy Template||✔||✔||✔||✔||✔|
|Scan Modern HTML5 and AJAX Web Applications||✔|
|Detect OWASP Top 10 Vulnerabilities in Web Applications||✔|
|Sensitive Data Searches||✔||✔||✔||✔||✔|
|PCI Internal Vulnerability Scanning||✔||✔||✔||✔||✔|
|PCI External Vulnerability Scanning (ASV Certified)||✔|
|Elastic Licensing Based on Assets Instead of IP Addresses||✔|
|Container Image Policy Enforcement||✔|
|Private Container Registry “Built for Security”||✔|
|Reporting & Dashboards||✔ (Basic Reporting)||✔ (Basic Reporting)||✔||✔||✔ (Basic Reporting)||✔||✔|
|Centralized Scan & Scan Policy Management||✔||✔||✔||✔|
|Scan Resource Sharing||✔||✔||✔||✔|
|Group and Role-Based Access||✔||✔||✔||✔||✔|
|Mobile Device Management Integration||✔||✔||✔||✔|
|Patch Management System Integration||✔||✔||✔||✔|
|Credential Management System Integration||✔||✔||✔||✔|
|Assurance Report Cards||✔||✔|
|Trouble Ticketing & Tracking||✔||✔|
|Dynamic Asset Lists with Policy-Based Grouping||✔||✔|
|Role-Based Scan Zone & Repository Access||✔||✔|
|Near Real-Time Asset Discovery||✔||✔|
|Host Activity Monitoring & Analytics||✔|
|Near Real-Time Anomalous Behavior Detection & Analysis||✔|
* Requires Tenable.io Vulnerability Management or Nessus Manager for agent management.
Which Product is Right for Me?
Compare product features to make the best choice.Help Me Choose