References in periodicals archive ?
Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements.
The biggest advantage of the Nessus Security Scanner is that it is very fast.
Tenable's Nessus, the industry's most widely deployed vulnerability scanner, provides the deepest database of known vulnerabilities and compliance risks on the market today.
Tenable's USM platform incorporates the world's most accurate vulnerability sensors the award-winning Nessus vulnerability scanner and the Passive Vulnerability Scanner with the industry's largest database of vulnerabilities, threats, and compliance data, delivering real-time network vulnerability intelligence and threat correlation.
a leading developer of security management solutions and creator of the popular, award-winning Nessus vulnerability scanner.
Tight Integration between Nessus and Mobile Device Management Information Helps Enterprises Reduce BYOD Risk from Employee Smartphones and iPads
nCircle Solutions Now Integrate Nessus Data, Helping Organizations Transition to a True Enterprise Solution While Preserving Existing Technology Investments
This new feature, which is available immediately for Nessus, Perimeter Service, and SecurityCenter[TM] customers, extends Tenable's ability to help organizations fight malware and advanced persistent threats (APTs) including:
Exploit Detection currently supports IDS to vulnerability scanner mappings for Snort to Nessus and ISS Real Secure to HFNetCKPro.
Tenable's SecurityCenter incorporates the world's most accurate vulnerability sensors -- the award-winning Nessus vulnerability scanner and the Passive Vulnerability Scanner -- with the industry's largest database of vulnerabilities, threats, and compliance data, delivering real-time network vulnerability intelligence and threat correlation.
Guardent's Managed Security Services are based upon TeraGuard(TM), an open service delivery platform that makes it possible to deploy any combination of security technologies, including NetScreen, Check Point, Cisco, ISS, Snort and Nessus.