Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

订阅

Nessus 10.0: Vulnerability Assessment for Today’s Dynamic Environments

New features are designed to offer the portability, efficiency and ease-of-use needed to protect the ever-expanding attack surface.

The widespread shift to remote work has atomized the attack surface, creating new challenges for the security professionals, penetration testers and consultants tasked with keeping data safe and secure. With most organizations expected to maintain a hybrid working model — in which employees will have the option to work at home or in an office — for the next 12 to 24 months, traditional approaches to cybersecurity are being put to the test daily. Today’s challenging and dynamic environment demands a new approach to vulnerability assessment. 

Here are five key elements to consider as you adapt your vulnerability assessment strategy to the new world of work:

  1. Portability is key. A vulnerability management solution needs to be made to move. 原因是什么?The answer depends on your job description. Whether you are a penetration tester, consultant, security analyst in a small business or part of a security team in a large organization, portability is key. Pen testers or consultants, who are regularly working with different clients, need to be able to easily perform risk assessments at different customer locations. A security analyst or large corporate security team must be ready to move around a geographically dispersed environment. A dispersed workforce makes it more important than ever to have a vulnerability assessment tool that is easily portable so users can travel seamlessly between clients or environments. 
  2. Efficiency is the name of the game. Finding vulnerabilities quickly and getting to their root cause is important to reduce risk by quickly addressing any newly discovered vector. This requires the ability to do a deep scan that can yield a detailed analysis of the complete environment. For real-time analysis, packet captures play a key role in meeting forensic and compliance requirements by giving you the ability to zero in down to the packet level. Further, in order to make good decisions or demonstrate historical compliance with regulatory rules or security policies, being able to call up the right reports is critical. Because every environment is different, the option to have a large choice of templated reports as well as the option to design custom reports will further help administrators. 
  3. Ease of use improves efficiency. If your vulnerability assessment tool has a user experience that makes it difficult to work with, is not intuitive or requires a high learning curve, your users will struggle. A vulnerability assessment tool that has easy navigation, and includes access to resource centers, on-demand training and in-program user guides can greatly enhance the adoption of all product capabilities, even in environments where staffing is limited.
  4. Remediation prioritization improves efficiency. There will always be more vulnerabilities than you can handle. Yet, relying on CVSS scores alone only tells part of the story. In order for security practitioners to prioritize remediation, organizations need to be able to understand the severity of a particular vulnerability in the context of what it means in their unique environment. This ability can enable organizations to more effectively triage which vulns need to be dealt with first, and which are second- or third-tier to be addressed, based on their unique mix of users and assets.
  5. Research matters. Your vulnerability assessment tool is only as good as the vulnerability research that feeds it. It is crucial that your vulnerability assessment solution is backed by a research team dedicated to discovering zero day exploits and providing expert guidance about known vulnerabilities. Further, such research needs to be incorporated into your vulnerability assessment tool in real-time. Ultimately, this enables security practitioners to take swift action to close the vulnerability window quickly and reduce your exposure as soon as possible. 

How Nessus 10 meets the needs of the remote workplace

我们凭借对安全从业人员工作方式的深刻理解,从头开始打造 Nessus。Nessus 每个功能的设计都会让漏洞评估简单、轻松且直观。The result: less time and effort to assess, prioritize and remediate issues. 

Nessus 10.0, released on October 28, introduces exciting new functionality that adds to its already feature-rich vulnerability assessment capabilities. Here’s how Nessus 10.0 is designed to meet the vulnerability assessment needs of today’s dynamic workplace:

For portability, Nessus 10.0 is now available on Raspberry Pi. This is specifically useful for pen testers, consultants and others whose job function requires mobility between locations. (Visit https://www.tenable.com/nessus-on-raspberrypi to learn more and enter our contest for a chance to win a free Raspberry Pi.)

To improve efficiency, we have added a dynamic compiled plug-in feature which reduces the footprint of the Nessus Plugin database by up to 75%. This new feature increases scan performance while concurrently decreasing scanner memory overhead.

For ease of use, a big emphasis has been made in Nessus 10.0 on enhancing the overall reporting experience. This includes an updated and improved layout of available static reports. Since each environment is different and every organization has different reporting requirements, we have added customizable reporting functionality that can be optimized to meet specific needs. Other improvements include new built-in logic that offers on-screen guides that are customized and easy to navigate. This reduces the time and effort required to find specific answers and/or guidance that is relevant to the user.

To help with remediation prioritization, Nessus 10.0 comes with a new, built-in packet capture feature that enables a powerful debugging capability to troubleshoot customer scanning issues. 

Underpinning it all is the work of Tenable Research, which tracks threat and vulnerability intelligence feeds to make sure our plugin teams can deliver coverage to our products as soon as possible. Tenable Research is focused on diverse work that makes up the foundations of vulnerability management: developing new detections for assets and vulnerabilities; developing audit and compliance checks; improving vulnerability management automation to accelerate the release of vulnerability detections and finding zero-day vulnerabilities in common and critical products.

With the release of Nessus 10.0, we remain laser-focused on community collaboration and product innovation so we can provide the most accurate and complete vulnerability data — so you don't miss critical issues which could put your organization at risk.

了解详情:

相关文章

您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

试用 Tenable Web App Scanning

您可以通过 Tenable One 风险暴露管理平台完全访问我们专为现代应用程序量身打造的最新 Web 应用程序扫描产品。可安全扫描全部在线资产组合的漏洞,具有高度准确性,而且无需繁重的手动操作或中断关键的 Web 应用程序。立即注册。

Tenable Web App Scanning 试用版还包含 Tenable Vulnerability Management 和 Tenable Lumin。

购买 Tenable Web App Scanning

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

5 个 FQDN

$3,578

立即购买

试用 Tenable Lumin

使用 Tenable Lumin 直观呈现及探索您的风险暴露管理,长期追踪风险降低状况,并比照同行业者进行基准衡量。

Tenable Lumin 试用版还包括 Tenable Vulnerability Management 和 Tenable Web App Scanning。

购买 Tenable Lumin

联系销售代表,了解 Tenable Lumin 如何帮助您获取整个企业的洞见并管理网络安全风险。

免费试用 Tenable Nessus Professional

免费试用 7 天

Tenable Nessus 是当今市场上功能最全面的漏洞扫描器。

新 - Tenable Nessus Expert
不可用

Nessus Expert 添加了更多功能,包括外部攻击面扫描,以及添加域和扫描云基础设施的功能。单击此处试用 Nessus Expert。

填写下面的表格可继续试用 Nessus Pro。

购买 Tenable Nessus Professional

Tenable Nessus 是当今市场上功能最全面的漏洞扫描器。Tenable Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并调动起 IT 团队的积极性。

购买多年期许可,即享优惠价格添加高级支持功能,获取一年 365 天、一天 24 小时的电话、社区和聊天支持。

选择您的许可证

购买多年期许可,即享优惠价格

添加支持和培训

免费试用 Tenable Nessus Expert

免费试用 7 天

Nessus Expert 针对现代攻击面而量身打造,可以查看更多信息,保护企业免遭从 IT 到云中漏洞的攻击。

已经有 Tenable Nessus Professional?
升级到 Nessus Expert,免费试用 7 天。

购买 Tenable Nessus Expert

Nessus Expert 针对现代攻击面而量身打造,可以查看更多信息,保护企业免遭从 IT 到云中漏洞的攻击。

选择您的许可证

购买多年许可证,节省幅度更大。

添加支持和培训