HomeCyber SecurityCyber Security ServicesEvaluation and Vulnerability M...
Evaluation and Vulnerability Management
NESSUS PROFESSIONAL
(by Tenable)
Scarce resources, limited time, a constantly changing attack surface – it’s a challenge for security practitioners on the front lines to keep pace with attackers. You need a fast, easy way to proactively find and fix vulnerabilities.
Nessus® Professional automates point-in-time assessments to help quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations, across a variety of operating systems, devices and applications.
- #1 in Accuracy
Nessus has the industry’s lowest false positive rate with six-sigma accuracy (measured at .32 defects per 1 million scans).
- #1 in Coverage
Nessus has the deepest and broadest coverage with more than 62,000 CVE and over 100 new plugins released weekly within 24 hours of vulnerability disclosure.
- #1 in Adoption
Nessus is trusted by more than 30,000 organizations globally, including 2 million downloads. 50% of the Fortune 500 and more than 30% of the Global 2000 rely on Nessus technology.
Tenable Research works closely with the security community to discover new vulnerabilities and provide insights to help organizations mature their vulnerability assessment practices. Tenable’s zero-day team has discovered more than 100 zero-day vulnerabilities over the past three years.
With more than 157,000 plugins that automatically update in real-time, Nessus helps you save valuable time to assess, research and remediate issues.
For efficiency and accuracy, plugins are dynamically compiled. This reduces the Nessus Plugin database footprint by up to 75% while increasing scan performance.
- Custom plugins allow you to create specific checks to assess the security of applications unique to your organization.
- Custom audit files help you verify your organization’s configuration requirements and compliance standards.
Each automatic Plugin update provides you with a simple set of remediation actions, and a fast and easy way to see if your systems are vulnerable.
Insights through threat intelligence feeds
Gain insight into potential malware and ransomware running on hosts throughout your environment via seamless integration with multiple commercial threat intelligence feeds.
Take advantage of Tenable’s Vulnerability Priority Rating (VPR) to help you zero in on the vulnerabilities that pose the greatest risk specific to your environment. VPR combines Tenable-collected vulnerability data with third-party vulnerability and threat data and analyzes them together with the advanced data science algorithm developed by Tenable Research.
Broad, deep visibility into vulnerabilities
Get broad and deep visibility into vulnerabilities with every assessment. Nessus offers coverage for over 47,000 unique IT assets, including:
- Network devices (e.g., Cisco, Juniper, HP, F5 and SonicWall)
- MobileIron and VMware AirWatch to assess mobile devices for vulnerabilities against policies.
- Operating systems (e.g., Windows, MacOS, and Linux)
- Applications ranging from small driver update utilities to complex Office productivity suites.
Built for security practitioners, by security practitioners, Nessus was created with the single focus of providing an intuitive experience for security pros on the front lines to find and fix vulnerabilities, faster and more confidently.
UX updates have made navigation and user experience easier and more intuitive. Nessus’ new resource center provides users with relevant information at their fingertips. User specific guides provide actionable tips and guidance based on the operations and functions being performed.
Quickly see vulnerabilities with pre-built policies and templates
Out-of-the-box, pre-configured templates for IT and mobile assets, including configuration audits, help you quickly understand where you have vulnerabilities.
Intelligent vulnerability assessment with Live Results
Live Results performs intelligent vulnerability assessment in offline mode with every plugin update – without having to run a scan. Just log in and see the results of potential vulnerabilities based on your scan history. With a click of a button, you can run a scan to validate the presence of the vulnerability, creating a faster, more efficient process for assessing, prioritizing, and remediating issues.
Configure reports easily
Create reports based on customized views (e.g., specific vulnerability types, vulnerabilities by host/plugin, by team/client) – in a variety of formats (HTML, CSV and Nessus XML).
Drilldown & Troubleshooting
As networks become more sophisticated and complex, zeroing in on potential issues has become increasingly time consuming. The Nessus packet capture feature enables a powerful debugging capability to troubleshoot scanning issues.
Laser focus with Grouped View
Similar issues or categories of vulnerabilities are grouped together and presented in one thread. Snoozing allows users to select issues to disappear from view for a specified period of time. This helps with prioritization, allowing you to focus only on the issues you are working on at a given time.
Portable and Flexible
For portability and ease of use, Nessus is now available on Raspberry Pi. This is specifically useful for pen testers, consultants, and others whose job function requires mobility between locations.
Nessus Professional customers can access email, portal, chat, and phone support 24 hours a day, 365 days a year with a subscription to the Advanced level of technical support. This will also help ensure faster response times and resolution.
Qualys
Convex Network is a Qualys partner.
We are proud to announce that Convex Network is a Qualys partner, and we offer the entire range of services and products from their portfolio.
Convex Network and Qualys have a strong partnership whose goals are to improve operational security and increase the degree of compliance for the IT systems of local businesses.
About Qualys.
Qualys – The leading provider of information security and compliance cloud solutions.
70% of the Forbes Global 50 rely on Qualys.
More than 10,000 subscription customers worldwide in more than 130 countries trust Qualys to underpin digital transformation for greater agility, better business outcomes, and substantial cost savings.
The Enterprise TruRisk Platform and its integrated apps help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications.
Risk-based Vulnerability Management, Detection, and Response
Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time across your global hybrid Cloud, IT, OT, and IoT landscape — all from a single platform.
- Prioritize Critical Threats
Qualys TruRisk™ comprehensively quantifies risk across your attack surface, including vulnerabilities, misconfigurations, and digital certificates, reducing critical vulnerabilities by up to 85%.
- Remediate Threats 6x Faster
Rule-based integrations with ITSM tools (ServiceNow, JIRA) automatically assign remediation tickets to vulnerabilities prioritized by risk with dynamic tagging. Remedial actions and orchestration directly from ITSM close vulnerabilities faster and reduce MTTR.
- Streamline Workflows with No-code Workflows
Leverage drag-and-drop visual no-code workflows to automate various time-consuming and complex vulnerability management and IT management tasks.
- Receive Preemptive Attack Alerts
Prevent the spread of malware by correlating actively exploited CVEs using malware and external threat indicators. Includes threat intelligence from 180,000+ vulnerabilities and 25+ threat and exploit intelligence sources to identify your organization’s unique risks and prevent attacks.
- Runtime Software Composition Analysis (Runtime SCA)
Enable SCA in Agent Profile with a single click in configuration profile for deep file system scanning, continuous evaluation, and data enrichment in VMDR.
With Custom Assessment and Remediation (CAR), VMDR customers can use and action scripting languages like Python, PowerShell, and many others to enrich the Qualys out-of-the-box signature library with customer-defined logic for nearly any zero-day threat, risk scenario, and home-grown application. When coupled with risk-based prioritization provided by TruRisk, VMDR offers holistic security coverage using a single agent for any application or any network environment.
Qualys VMDR seamlessly integrates with IT Service Management (ITSM), configuration management
databases (CMDB) and patch management solutions to quickly discover, prioritize, and automatically remediate vulnerabilities at scale to reduce risk. Tight integration with ITSM solutions such as ServiceNow or Jira helps to automate and operationalize vulnerability management across the enterprise and between IT and Security teams.
With VMDR, you get a risk-based vulnerability management solution that prioritizes vulnerabilities, misconfigurations, assets, and groups of assets based on risk, reduces risk by remediating vulnerabilities at scale, and helps organizations measure security program effectiveness by tracking risk reduction over time.
- Automates workflows to reduce risks at scale
Qualys VMDR is powered by the Qualys TruRisk Platform, combining the lightweight Qualys Cloud Agent, virtual scanners, and network analysis (passive scanning) capabilities. It brings together all the key elements of an effective vulnerability management program into a single service unified by powerful no-code orchestration workflows out of the box using Qualys Flow. From asset discovery to risk-based assessment to detection and response, VMDR automates the entire process and significantly accelerates an organization’s ability to respond to threats, thus preventing possible exploitation.
- Flexible and Easy to Deploy
No hardware to buy or manage—it’s all in the cloud. Get set up in 10 minutes or less with unlimited virtual scanners. You can provision a scanner and be ready to go in no time. For small and mid-sized businesses, VMDR TruRisk FixIT and ProtectIT packages offer enterprise-grade VM, Patch Management and Endpoint Security right-sized for your business.
- More Security with Less Complexity
VMDR offers enterprise-grade vulnerability management with the ability to expand security stack functionality with one single agent. Leverage VMDR FixIT packages to extend remediation and patch vulnerabilities up to 40% faster than other solutions. Automatically block malware and ransomware infections with VMDR ProtectIT.
- Detect Threats with Your Own Logic
By adding Custom Assessment and Remediation (CAR), leverage VMDR to detect, manage, and remediate vulnerabilities in custom-developed, first-party software with your own logic and threat signatures.
- Confirm and Repeat
VMDR closes the loop and completes the vulnerability management lifecycle from a single pane of glass that offers real-time customizable dashboards and widgets with builtin trending. Priced on a per-asset basis and delivered in the cloud with no software to update, VMDR also drastically reduces your total cost of ownership.