What is Tenable Nessus?

Nessus is a fully featured Vulnerability Management Software designed to serve Enterprises, Startups. Nessus provides end-to-end solutions designed for Windows. This online Vulnerability Management system offers Network Scanning, Vulnerability Assessment, Asset Discovery, Policy Management, Web Scanning at one place.

Pricing

Tenable Nessus Starting Price

Awards
Tenable Nessus Award

Our Awards and Recognition

More Awards
Need a Little Help?

Talk with a software expert for free. Get a list of software that's great for you in less than 10 minutes.

Tenable Nessus Screenshots

Key Features of Tenable Nessus

Here are the powerful features that make Tenable Nessus stand out from the competition. Packed with innovative tools and advanced functionalities, this software offers a range of benefits.

  • Asset Discovery
  • Asset Tagging
  • Asset Discovery
  • Asset Tagging
  • Compliance Reporting
  • Compression
  • Continuous Backup
  • Database Security Audit
  • Diagnostic Tools
  • IOC Verification
  • Local Server Options
  • Maintenance Scheduling
  • Multiple System Support
  • Network Scanning
  • Patch Management
  • PCI Assessment
  • Policy Management
  • Prioritization
  • Real Time Monitoring
  • Risk Management
  • Secure Data Storage
  • Sensitive Data Identification
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Scanning
  • Whitelisting / Blacklisting
Show More
  • Access control
  • Application Security
  • Application Security Orchestration and Correlation (ASOC)
  • Application Server
  • Applied Behavior Analysis (ABA)
  • Authentication and Authorization
  • Code Review
  • Compliance monitoring
  • Content Security Policy (CSP)
  • Cross-Site Request Forgery (CSRF) Prevention
  • Cross-Site Scripting (XSS) Prevention
  • Data Encryption
  • DevSecOps
  • Dynamic Application Security Testing (DAST)
  • Electronic medical records (EMR)
  • Error handling and logging
  • HIPAA Compliance
  • Input Validation and Sanitization
  • Medical Practice Management
  • Mental Health
  • Occupational Therapy
  • Penetration Testing
  • Red Team Tools
  • Role-Based Access Control (RBAC)
  • Secure API Development
  • Secure Coding Practices
  • Secure Database Management
  • Secure Deployment and Configuration Management
  • Secure File Handling
  • Secure Software Development Lifecycle (SDLC) Integration
  • Security configuration management
  • Security Headers Management
  • Security incident response
  • Security Logging and Monitoring
  • Security Testing and Reporting
  • Session management
  • Speech Therapy
  • SQL Injection Prevention
  • SSL/TLS certificate management
  • Therapy
  • Two-factor authentication (2FA)
  • User Account Management
  • Vulnerability Management
  • Vulnerability Scanning
  • Web Application Firewall (WAF)
  • XML External Entity (XXE) Prevention
Show More
  • API Security Assessment
  • Application Scanning
  • Asset Discovery
  • Asset Inventory Management
  • Attack Surface Analysis
  • Cloud Security Assessment
  • Compliance Reporting
  • Configuration Assessment
  • Continuous Monitoring
  • Database Scanning
  • Exploit Detection
  • Host Intrusion Detection System (HIDS)
  • Log Analysis
  • Malware Detection
  • Misconfiguration Detection
  • Network Intrusion Detection System (NIDS)
  • Network Scanning
  • Patch Management
  • Penetration Testing Support
  • Risk Assessment
  • Security Policy Compliance
  • Threat Intelligence Integration
  • Vulnerability Identification
  • Vulnerability Prioritization
  • Vulnerability Remediation
  • Vulnerability Scanning
  • Vulnerability Trend Analysis
  • Web Application Testing
  • Web Crawler
  • Wireless Network Scanning
Show More
  • Brute-Force Attack Simulation
  • Command Execution Testing
  • Compliance Testing
  • Continuous Monitoring and Testing
  • Cross-Site Scripting (XSS) Testing
  • Denial of Service (DoS) Testing
  • Directory Traversal Testing
  • DNS Spoofing
  • Exploit Generation
  • File Inclusion Testing
  • Firewall and Intrusion Detection System (IDS) Testing
  • Malware Analysis
  • Man-in-the-Middle (MitM) Attacks
  • Multi-Platform Support
  • Network Mapping
  • Password Cracking
  • Penetration Testing
  • Penetration Testing Methodologies
  • Phishing Simulation
  • Port Scanning
  • Remote Access Testing
  • Reporting and Documentation
  • Reverse Engineering
  • Security Configuration Review
  • Security Information and Event Management (SIEM) Integration
  • Security Policy Testing
  • Social Engineering Testing
  • SQL Injection Testing
  • Vulnerability Scanning
  • Web Application Testing
  • Wireless Network Testing
  • Zero-Day Exploit Testing
Show More
  • API and Web Service Security Testing
  • Authentication and Session Management Testing
  • Authorization and Access Control Testing
  • Automated Vulnerability Detection
  • Business Logic Testing
  • Compliance Testing (e.g.
  • PCI DSS
  • HIPAA)
  • Continuous Integration (CI) and Continuous Deployment (CD) Integration
  • Cookie Security Testing
  • Cross-Site Request Forgery (CSRF) Testing
  • Cross-Site Scripting (XSS) Testing
  • Directory Traversal Testing
  • Dynamic Application Security Testing (DAST)
  • File Upload Security Testing
  • Fingerprinting of Web Technologies
  • Form and Parameter Manipulation Testing
  • Identification of Security Risks and Weaknesses
  • Input Validation and Output Encoding Testing
  • Integration with Issue Tracking Systems
  • Malware Analysis
  • Remediation Guidance and Recommendations
  • Reporting and Vulnerability Dashboards
  • Sandbox
  • Security Header Analysis
  • Security Scan Customization and Configuration
  • Security Testing of Web Services and APIs
  • Server-side Code Injection Testing
  • Session Management Testing
  • SQL Injection Testing
  • SSL/TLS Security Testing
  • Support for Multiple Browsers and User Agents
  • Support for Single-page Applications (SPAs)
  • Test Coverage and Crawling Capabilities
  • Testing for OWASP Top 10 Vulnerabilities
  • Web Application Scanning
Show More

Tenable Nessus Specifications

Get a closer look at the technical specifications and system requirements for Tenable Nessus. Find out if it's compatible with your operating system and other software.

Deployment :
On Premises
Subscription Plan :
Monthly, Yearly
Accessibility :
API
Customization
Mobile Support
Desktop Platforms :
Web app
MacOs
Windows
Language Support :
English
Business :
StartUps
SMBs
Agencies
Enterprises
Available Support :
Email
Company Details :
Company Name : Tenable Network Security
Website : Visit Website
Tenable Network Security logo
Do you work for Tenable Network Security?
Claim This Profile

Tenable Nessus Videos

Overall Tenable Nessus Reviews

Thinking about using Tenable Nessus? Check out verified user reviews & ratings based on Tenable Nessus's features, user-friendliness, customer support, and other factors that contribute to its overall appeal.

5/5

Based on 2 Reviews

Write a Review Or
Ask a question
Feature Feature 4.5

Feature

Out of 5

Ease of use Ease of use 5

Ease of use

Out of 5

Value for money Value for money 5

Value for money

Out of 5

Customer support Customer support 5

Customer support

Out of 5

Likelihood to recommend Likelihood to recommend 0%

Likelihood to recommend

Out of 100%

Tenable Nessus Pros and Cons

"The false-positive rate is too low. Easy to use and user-friendly makes me impressed. Technical staffs both local partners and vendor are willing to help. The other thing the most important is to create new signatures for the latest vulnerabilities quickly and The Nessus does."

"The myriad features, the ease of use and the relatively low resource consumption"

"I think they need to improve their reporting features. I can not get a pdf report on the Professional license."

"In some cases, Nessus is known to give false positives. However, this is more annoying then concerning as we have learned to identify them and verify their authenticity"

2 Tenable Nessus Reviews

Hear directly from customers who have used Tenable Nessus. Read their experiences, feedback, and ratings to gain valuable insights into how this software has benefited their businesses.

barisg.

Security Consultant

Used the software for : 2+ years (Weekly)

Company Size :51-200 employee

5.0

May 09, 2022

Nessus is the best vulnerability management tool

I think and relate to my experience Nessus is the best security vulnerability tool. I can easily find the vulnerabilities in my network. The false-positive rate is low.

Feature Feature 4

Feature

Out of 5

Ease of use Ease of use 5

Ease of use

Out of 5

Value for money Value for money 5

Value for money

Out of 5

Customer support Customer support 5

Customer support

Out of 5

Tenable Nessus Mobile App Experience

1 2 3 4 5 6 7 8 9 10

Tenable Nessus After Sales Service Rating

1 2 3 4 5 6 7 8 9 10

What do you like best about Tenable Nessus?

The false-positive rate is too low. Easy to use and user-friendly makes me impressed. Technical staffs both local partners and vendor are willing to help. The other thing the most important is to create new signatures for the latest vulnerabilities quickly and The Nessus does.

What do you dislike about Tenable Nessus?

I think they need to improve their reporting features. I can not get a pdf report on the Professional license.

What features is Tenable Nessus currently missing?

PDF Reporting

What other products like Tenable Nessus have you used or evaluated?

Rapid 7,OpenVas

How Tenable Nessus is better/different from its competitors?

Quick and low false-positive rate and technical support

AsifB.

Used the software for : 2+ years

Company Size :51-200 employee

5.0

May 02, 2022

Nessus Vulnerability Scanner Review

Nessus has significantly simplified vulnerability assessment and penetration testing engagements. Its ease of use and numerous features make it a must-have tool for any network security engagement. Additionally, there are modules for various additional tasks, such as compliance scanning as per CIS, NIST, and even PCI DSS. Also, one can even use it to carry out a preliminary application security assessment. The availability of conducting credentialed scanning makes it simple to perform scanning of missing patches remotely for a large number of devices. All in all, an excellent and must have a tool

Feature Feature 5

Feature

Out of 5

Ease of use Ease of use 5

Ease of use

Out of 5

Value for money Value for money 5

Value for money

Out of 5

Customer support Customer support 5

Customer support

Out of 5

Tenable Nessus Mobile App Experience

1 2 3 4 5 6 7 8 9 10

Tenable Nessus After Sales Service Rating

1 2 3 4 5 6 7 8 9 10

What do you like best about Tenable Nessus?

The myriad features, the ease of use and the relatively low resource consumption

What do you dislike about Tenable Nessus?

In some cases, Nessus is known to give false positives. However, this is more annoying then concerning as we have learned to identify them and verify their authenticity

Do you think Tenable Nessus delivers value for the money spent?

Yes

Are you satisfied with Tenable Nessus features?

Yes

Did implimentation of Tenable Nessus was easy?

Yes

What features is Tenable Nessus currently missing?

No

What other products like Tenable Nessus have you used or evaluated?

Open VAS

How Tenable Nessus is better/different from its competitors?

Nessus has more features, is user friendly and cheaper

Alternatives of Tenable Nessus

Explore alternative software options that can fulfill similar requirements as Tenable Nessus. Evaluate their features, pricing, and user feedback to find the perfect fit for your needs.

Tenable Nessus FAQs

What are the top 5 features for Tenable Nessus?

The top 5 features for Tenable Nessus are:

  • Policy Management
  • Prioritization
  • Asset Discovery
  • Network Scanning
  • Vulnerability Assessment

What type of customer support is available from Tenable Nessus?

The available support which Tenable Nessus provides is:

  • Email
Free Demo Get Pricing
Free Demo