Tenable Nessus Primary Use Case

reviewer1239462
CISO at a financial services firm with 201-500 employees
We use it for servers, domain controllers, application servers, Oracle servers, SQL servers, as well as network devices, like routers. For PCs that are used for services such as credit cards and ATMs, we usually do a vulnerability assessment, including Windows Servers, Linux servers, SQL servers, and database servers. We scan everything except basic PCs because it would require a lot of time to check all those reports. Our system administrators use another solution to check regular PCs for Windows and MS updates. We're checking things every month. We created a schedule and it checks automatically. From time to time, we'll use it to check things if something unusual has happened. For example, if a stranger was on a computer, we'll check if is there a vulnerability there. We also use it to prepare reports when the agency asks for them. View full review »
reviewer1229910
Security Architect at a logistics company with 10,001+ employees
We use it for internal and external vulnerability scans. View full review »
Keith S. Crumpton
President and Sr CISO Consultant at CISO Consulting Inc.
I use it for performing vulnerability scans for both my environment and for clients. I provide fractional CISO consulting services. As such, I will perform a vulnerability scan on an environment before I say "yes." Everybody has to have a vulnerability scan. You should do them periodically which, to me, is monthly. It's just good practice to perform that scan monthly and whenever there's a major change, to make sure that you don't have any open environment. I monitor web servers, database servers, app servers, desktops; everything you'd find on a network, besides switches and routers. I don't have that, but I monitor any Windows- and Linux-based nodes. View full review »
Learn what your peers think about Tenable Nessus. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,283 professionals have used our research since 2012.
John-Kang
Senior Systems Administrator at Government Scientific Source
It is used for vulnerability management. We used Nessus to scan our machines to see how they were vulnerable, for patches or security. The CVE numbers is what we looked at, the security vulnerability, and tried to figure out what we were vulnerable to. We monitored Windows Servers, Windows workstations, Linux servers, firewalls, switches, VMware equipment, and Cisco UCS hardware through the application. View full review »
Jairo Willian Pereira
Information Security Manager at a financial services firm with 501-1,000 employees
Over 15.000 active assets|inside 10 companies belonging to the group, the biennium recurrent project mapped the real situation, in parallel with photography of IT/Security maturity through three main domains: processes, people, and technology. 5 TOEs: Infrastructure, Databases (SQL and Oracle in deep), AWS Cloud, Connectivity (Routers, Switches, and Firewalls against/based CIS) and Web Application instances (partial tests). View full review »
MadhavanSrinivasan
CEO at Screenit Labs Pvt Ltd
We are a company that provides cloud migration services. We help companies to migrate to the public cloud. When our customers want to migrate applications, they're worried about the security aspect in the cloud. So we are trying to see how the application security that is on-premises can be migrated to the cloud. We don't have any particular solution, we are working with a few options. The customer selects what best suits their needs. If we have a program, we work with that. It's not specific to what we are working with. View full review »
JianHuang
Network Security Engineer at a construction company with 1,001-5,000 employees
We mainly use it for scanning for vulnerability on our hosts, like network devices and servers; to find the vulnerabilities and do remediation. We monitor Windows and Linux workstations. View full review »
reviewer1392108
Vulnerability Management Analyst at a financial services firm with 10,001+ employees
We primarily use the solution for vulnerability management. We also use it during our IP scans. View full review »
Miguel Angel Hernández Armas
Implementation Engineer at GFx Soluciones
Nessus was used to scan vulnerabilities and compliances in our clients' networks and with this, carry out the remediation process through constant cycles in time until threats to the network are considerably reduced. The environments are small business networks (less than 50 employees), and so far there have been no major impediments in the scans performed. View full review »
Thomas Kung
Senior Consultant at a tech company with 1,001-5,000 employees
My primary use case of this solution is for scanning internal networks. View full review »
KalaiarasuSanthirasekeran
Security Professional at a tech services company with 10,001+ employees
Primarily, I use this for assessment and administration testing. View full review »
Infraprojman67
Senior Infrastructure Project Manager at a energy/utilities company with 501-1,000 employees
Our primary use case of this solution is scanning of our external websites. View full review »
Learn what your peers think about Tenable Nessus. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,283 professionals have used our research since 2012.