Evaluation and Vulnerability Management

NESSUS PROFESSIONAL

(by Tenable)

THE INDUSTRY STANDARD FOR VULNERABILITY ASSESSMENT

Scarce resources, limited time, a constantly changing attack surface – it’s a challenge for security practitioners on the front lines to keep pace with attackers. You need a fast, easy way to proactively find and fix vulnerabilities. 

Nessus® Professional automates point-in-time assessments to help quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations, across a variety of operating systems, devices and applications. 

NESSUS IS NUMBER 1 IN VULNERABILITY ASSESSMENT
  • #1 in Accuracy 

Nessus has the industry’s lowest false positive rate with six-sigma accuracy (measured at .32 defects per 1 million scans).

  • #1 in Coverage 

Nessus has the deepest and broadest coverage with more than 62,000 CVE and over 100 new plugins released weekly within 24 hours of vulnerability disclosure.

  • #1 in Adoption 

Nessus is trusted by more than 30,000 organizations globally, including 2 million downloads. 50% of the Fortune 500 and more than 30% of the Global 2000 rely on Nessus technology. 

BREADTH AND DEPTH OF COVERAGE

Tenable Research works closely with the security community to discover new vulnerabilities and provide insights to help organizations mature their vulnerability assessment practices. Tenable’s zero-day team has discovered more than 100 zero-day vulnerabilities over the past three years.

DYNAMIC AND AUTOMATIC PLUGIN UPDATES SHRINKS THE TIME TO ASSESS AND REMEDIATE

With more than 157,000 plugins that automatically update in real-time, Nessus helps you save valuable time to assess, research and remediate issues. 

For efficiency and accuracy, plugins are dynamically compiled. This reduces the Nessus Plugin database footprint by up to 75% while increasing scan performance. 

  • Custom plugins allow you to create specific checks to assess the security of applications unique to your organization. 
  • Custom audit files help you verify your organization’s configuration requirements and compliance standards. 

Each automatic Plugin update provides you with a simple set of remediation actions, and a fast and easy way to see if your systems are vulnerable. 

Insights through threat intelligence feeds 

Gain insight into potential malware and ransomware running on hosts throughout your environment via seamless integration with multiple commercial threat intelligence feeds. 

LEVERAGE THE POWER OF PREDICTIVE PRIORITIZATION

Take advantage of Tenable’s Vulnerability Priority Rating (VPR) to help you zero in on the vulnerabilities that pose the greatest risk specific to your environment. VPR combines Tenable-collected vulnerability data with third-party vulnerability and threat data and analyzes them together with the advanced data science algorithm developed by Tenable Research. 

Broad, deep visibility into vulnerabilities 

Get broad and deep visibility into vulnerabilities with every assessment. Nessus offers coverage for over 47,000 unique IT assets, including: 

  • Network devices (e.g., Cisco, Juniper, HP, F5 and SonicWall) 
  • MobileIron and VMware AirWatch to assess mobile devices for vulnerabilities against policies. 
  • Operating systems (e.g., Windows, MacOS, and Linux) 
  • Applications ranging from small driver update utilities to complex Office productivity suites. 
EASE OF USE

Built for security practitioners, by security practitioners, Nessus was created with the single focus of providing an intuitive experience for security pros on the front lines to find and fix vulnerabilities, faster and more confidently. 

UX updates have made navigation and user experience easier and more intuitive. Nessus’ new resource center provides users with relevant information at their fingertips. User specific guides provide actionable tips and guidance based on the operations and functions being performed. 

Quickly see vulnerabilities with pre-built policies and templates 

Out-of-the-box, pre-configured templates for IT and mobile assets, including configuration audits, help you quickly understand where you have vulnerabilities. 

Intelligent vulnerability assessment with Live Results 

Live Results performs intelligent vulnerability assessment in offline mode with every plugin update – without having to run a scan. Just log in and see the results of potential vulnerabilities based on your scan history. With a click of a button, you can run a scan to validate the presence of the vulnerability, creating a faster, more efficient process for assessing, prioritizing, and remediating issues. 

Configure reports easily 

Create reports based on customized views (e.g., specific vulnerability types, vulnerabilities by host/plugin, by team/client) – in a variety of formats (HTML, CSV and Nessus XML). 

Drilldown & Troubleshooting 

As networks become more sophisticated and complex, zeroing in on potential issues has become increasingly time consuming. The Nessus packet capture feature enables a powerful debugging capability to troubleshoot scanning issues. 

Laser focus with Grouped View 

Similar issues or categories of vulnerabilities are grouped together and presented in one thread. Snoozing allows users to select issues to disappear from view for a specified period of time. This helps with prioritization, allowing you to focus only on the issues you are working on at a given time. 

Portable and Flexible 

For portability and ease of use, Nessus is now available on Raspberry Pi. This is specifically useful for pen testers, consultants, and others whose job function requires mobility between locations.

ADVANCED SUPPORT AVAILABLE

Nessus Professional customers can access email, portal, chat, and phone support 24 hours a day, 365 days a year with a subscription to the Advanced level of technical support. This will also help ensure faster response times and resolution.

Qualys

Convex Network is a Qualys partner. 

We are proud to announce that Convex Network is a Qualys partner, and we offer the entire range of services and products from their portfolio. 

Convex Network and Qualys have a strong partnership whose goals are to improve operational security and increase the degree of compliance for the IT systems of local businesses. 

About Qualys. 

Qualys – The leading provider of information security and compliance cloud solutions. 

Trusted globally.

70% of the Forbes Global 50 rely on Qualys. 

More than 10,000 subscription customers worldwide in more than 130 countries trust Qualys to underpin digital transformation for greater agility, better business outcomes, and substantial cost savings. 

Born in the cloud, with a fresh approach to security.

The Enterprise TruRisk Platform and its integrated apps help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. 

VMDR® with Qualys TruRisk

Risk-based Vulnerability Management, Detection, and Response

Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time across your global hybrid Cloud, IT, OT, and IoT landscape — all from a single platform.

  • Prioritize Critical Threats 

Qualys TruRisk™ comprehensively quantifies risk across your attack surface, including vulnerabilities, misconfigurations, and digital certificates, reducing critical vulnerabilities by up to 85%.

  • Remediate Threats 6x Faster 

Rule-based integrations with ITSM tools (ServiceNow, JIRA) automatically assign remediation tickets to vulnerabilities prioritized by risk with dynamic tagging. Remedial actions and orchestration directly from ITSM close vulnerabilities faster and reduce MTTR.

  • Streamline Workflows with No-code Workflows 

Leverage drag-and-drop visual no-code workflows to automate various time-consuming and complex vulnerability management and IT management tasks.

  • Receive Preemptive Attack Alerts 

Prevent the spread of malware by correlating actively exploited CVEs using malware and external threat indicators. Includes threat intelligence from 180,000+ vulnerabilities and 25+ threat and exploit intelligence sources to identify your organization’s unique risks and prevent attacks.

  • Runtime Software Composition Analysis (Runtime SCA) 

Enable SCA in Agent Profile with a single click in configuration profile for deep file system scanning, continuous evaluation, and data enrichment in VMDR. 

One solution for risk-based discovery, assessment, detection, and response for custom and third-party applications.

With Custom Assessment and Remediation (CAR), VMDR customers can use and action scripting languages like Python, PowerShell, and many others to enrich the Qualys out-of-the-box signature library with customer-defined logic for nearly any zero-day threat, risk scenario, and home-grown application. When coupled with risk-based prioritization provided by TruRisk, VMDR offers holistic security coverage using a single agent for any application or any network environment. 

Seamless integration with ITSM and CMDB accelerates risk reduction across the enterprise.

Qualys VMDR seamlessly integrates with IT Service Management (ITSM), configuration management 

databases (CMDB) and patch management solutions to quickly discover, prioritize, and automatically remediate vulnerabilities at scale to reduce risk. Tight integration with ITSM solutions such as ServiceNow or Jira helps to automate and operationalize vulnerability management across the enterprise and between IT and Security teams. 

With VMDR, you get a risk-based vulnerability management solution that prioritizes vulnerabilities, misconfigurations, assets, and groups of assets based on risk, reduces risk by remediating vulnerabilities at scale, and helps organizations measure security program effectiveness by tracking risk reduction over time.

  • Automates workflows to reduce risks at scale 

Qualys VMDR is powered by the Qualys TruRisk Platform, combining the lightweight Qualys Cloud Agent, virtual scanners, and network analysis (passive scanning) capabilities. It brings together all the key elements of an effective vulnerability management program into a single service unified by powerful no-code orchestration workflows out of the box using Qualys Flow. From asset discovery to risk-based assessment to detection and response, VMDR automates the entire process and significantly accelerates an organization’s ability to respond to threats, thus preventing possible exploitation. 

KEY BENEFITS
  • Flexible and Easy to Deploy 

No hardware to buy or manage—it’s all in the cloud. Get set up in 10 minutes or less with unlimited virtual scanners. You can provision a scanner and be ready to go in no time. For small and mid-sized businesses, VMDR TruRisk FixIT and ProtectIT packages offer enterprise-grade VM, Patch Management and Endpoint Security right-sized for your business.

  • More Security with Less Complexity 

VMDR offers enterprise-grade vulnerability management with the ability to expand security stack functionality with one single agent. Leverage VMDR FixIT packages to extend remediation and patch vulnerabilities up to 40% faster than other solutions. Automatically block malware and ransomware infections with VMDR ProtectIT.

  • Detect Threats with Your Own Logic 

By adding Custom Assessment and Remediation (CAR), leverage VMDR to detect, manage, and remediate vulnerabilities in custom-developed, first-party software with your own logic and threat signatures.

  • Confirm and Repeat 

VMDR closes the loop and completes the vulnerability management lifecycle from a single pane of glass that offers real-time customizable dashboards and widgets with builtin trending. Priced on a per-asset basis and delivered in the cloud with no software to update, VMDR also drastically reduces your total cost of ownership.