Nessus Overview

Nessus

By Tenable Network Security

4.8★★★★★(147 Ratings)Write review

What is Nessus?

Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive.

Who is Nessus best for?

Ideal for security practitioners, consultants and pen testers.

Nessus Details

Nessus Platforms supported

Cloud, SaaS, Web-Based

Desktop Mac

Desktop Windows

Desktop Chromebook

Desktop Linux

Mobile Android

Mobile iPad

Mobile iPhone

On-Premise Linux

On-Premise Windows

Nessus Support options

Chat

Email Help Desk

FAQ Forum

Knowledgebase

Phone Support

Nessus Training options

Documentation

In-Person

Live Online

Webinars

Videos

Nessus Typical customers

Freelancers

Small Businesses

Small to Mid size businesses

Mid size businesses

Mid to Large size enterprises

Large enterprises

Very Large enterprises

Nessus Pricing

Nessus Essentials is available as a free download for students and educators to scan up to 16 IPs.
Nessus Pro:
$2,390 for one year, or $2,790 for one year with Advanced Support.
$4,660 for two years, or $5,460 for two years with Advanced Support.
$6,811.50 for three years, or $8,011.50 for three for Advanced Support.
A 7-day free trial of Nessus Pro is also avail

Nessus Features

Most valued Nessus features by users

API

Access Controls/Permissions

Alerts/Notifications

Asset Discovery

Network Scanning

Password Protection

Reporting/Analytics

Runtime Container Security

Vulnerability / Threat Prioritization

Vulnerability Assessment

Web-Application Security

Website Crawling

Top Nessus Alternatives & Competitors

1

AppTrana

By Indusface

4.7★★★★★(48 Ratings)

Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing. Read More