Tenable Network Security transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable’s customers range from Fortune Global 500 companies, to the global public sector, to mid-sized enterprises in all sectors, including finance, government, healthcare, higher education, retail and energy.
Nessus® is the world’s most widely-deployed vulnerability assessment scanner, chosen by more than 1.6 million users across the globe. Available as a single scanning solution as Nessus Professional or for multi-user teams as Nessus Manager, Nessus quickly and accurately identifies vulnerabilities, configuration and compliance issues, and malware in physical, virtual and cloud environments.
Tenable.io™ is the first Cyber Exposure platform to provide visibility into any asset on any computing platform. It enables security teams and executives to manage vulnerabilities and risks across the entire attack surface with confidence. Built on the leading Nessus technology from Tenable, Tenable.io delivers a modern approach that supports dynamic assets like cloud and containers.
The SecurityCenter® family manages and analyzes vulnerability data across the organization, prioritizes security risks and provides automated frameworks and compliance reporting. With continuous monitoring, security teams can measure and visualize the effectiveness of the security program using SecurityCenter’s pre-built, highly customizable dashboards and reports and the industry’s only Assurance Report Cards®.
|Feature||Nessus Professional||Nessus Manager||Tenable.io Vulnerability Management||Tenable.io Container Security||Tenable.io Web Application Scanning||SecurityCenter||SecurityCenter Continuous View|
|Vulnerability Scanning & Assessment||✔||✔||✔||✔||✔||✔||✔|
|Web Application Tests Using the Nessus Scan Policy Template||✔||✔||✔||✔||✔|
|Scan Modern HTML5 and AJAX Web Applications||✔|
|Detect OWASP Top 10 Vulnerabilities in Web Applications||✔|
|Sensitive Data Searches||✔||✔||✔||✔||✔|
|PCI Internal Vulnerability Scanning||✔||✔||✔||✔||✔|
|PCI External Vulnerability Scanning (ASV Certified)||✔|
|Elastic Licensing Based on Assets Instead of IP Addresses||✔|
|Container Image Policy Enforcement||✔|
|Private Container Registry “Built for Security”||✔|
|Reporting & Dashboards||✔ (Basic Reporting)||✔ (Basic Reporting)||✔||✔||✔ (Basic Reporting)||✔||✔|
|Centralized Scan & Scan Policy Management||✔||✔||✔||✔|
|Scan Resource Sharing||✔||✔||✔||✔|
|Group and Role-Based Access||✔||✔||✔||✔||✔|
|Mobile Device Management Integration||✔||✔||✔||✔|
|Patch Management System Integration||✔||✔||✔||✔|
|Credential Management System Integration||✔||✔||✔||✔|
|Assurance Report Cards||✔||✔|
|Trouble Ticketing & Tracking||✔||✔|
|Dynamic Asset Lists with Policy-Based Grouping||✔||✔|
|Role-Based Scan Zone & Repository Access||✔||✔|
|Near Real-Time Asset Discovery||✔||✔|
|Host Activity Monitoring & Analytics||✔|
|Near Real-Time Anomalous Behavior Detection & Analysis||✔|
* Requires Tenable.io Vulnerability Management or Nessus Manager for agent management.