View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
November 29, 2009

Tenable releases new version of Nessus Vulnerability Scanner

Features configuration auditing, sensitive data discovery and vulnerability analysis

By CBR Staff Writer

Tenable Network has released a new version of Nessus Vulnerability Scanner 4.2, which features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of security posture.

According to Tenable Network, the new version enables users to gain access to a new web-based interface to manage the initiation and results of their scans and not necessary to use a standalone NessusClient to connect to the Nessus Server. The scan results and scan policies are stored directly on the server and is possible to log out of the interface and log back in without disrupting scans that are in progress.

The company said that the new version also has improved reporting capabilities that can analyse vulnerability scan results. Multiple users can log into the web-based interface concurrently and can use a compare function to show differences against a previous scan. It has also improved the .nessus format that allow for easier parsing of report data. Also included is a new HTML export format.

The Nessus Scanner offers 32-bit and 64-bit binaries for every major platform, virtual appliance and physical appliance. Its plugin database is updated on a daily basis and all the plugins can be retrieved through the automatic update feature of Nessus or updated manually.

Content from our partners
Sherif Tawfik: The Middle East and Africa are ready to lead on the climate
What to look for in a modern ERP system
How tech leaders can keep energy costs down and meet efficiency goals

Renaud Deraison, chief research officer of Tenable and author of Nessus, said: “We are very pleased to announce the release of Nessus 4.2. The user experience with this release will raise the standard for what is expected from enterprise-class vulnerability scanners.”

Topics in this article :
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU