2018-08-29 19:26:00 UTC

What is your primary use case for Tenable Nessus?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
1010 Answers

author avatar
Top 10Real User

We use it for servers, domain controllers, application servers, Oracle servers, SQL servers, as well as network devices, like routers. For PCs that are used for services such as credit cards and ATMs, we usually do a vulnerability assessment, including Windows Servers, Linux servers, SQL servers, and database servers. We scan everything except basic PCs because it would require a lot of time to check all those reports. Our system administrators use another solution to check regular PCs for Windows and MS updates. We're checking things every month. We created a schedule and it checks automatically. From time to time, we'll use it to check things if something unusual has happened. For example, if a stranger was on a computer, we'll check if is there a vulnerability there. We also use it to prepare reports when the agency asks for them.

2019-11-27 05:42:00 UTC
author avatar
Top 20Real User

We mainly use it for scanning for vulnerability on our hosts, like network devices and servers; to find the vulnerabilities and do remediation. We monitor Windows and Linux workstations.

2019-11-18 07:22:00 UTC
author avatar
Top 10Consultant

I use it for performing vulnerability scans for both my environment and for clients. I provide fractional CISO consulting services. As such, I will perform a vulnerability scan on an environment before I say "yes." Everybody has to have a vulnerability scan. You should do them periodically which, to me, is monthly. It's just good practice to perform that scan monthly and whenever there's a major change, to make sure that you don't have any open environment. I monitor web servers, database servers, app servers, desktops; everything you'd find on a network, besides switches and routers. I don't have that, but I monitor any Windows- and Linux-based nodes.

2019-11-14 06:34:00 UTC
author avatar
Real User

We use it for internal and external vulnerability scans.

2019-11-13 05:29:00 UTC
author avatar
Top 20Real User

It is used for vulnerability management. We used Nessus to scan our machines to see how they were vulnerable, for patches or security. The CVE numbers is what we looked at, the security vulnerability, and tried to figure out what we were vulnerable to. We monitored Windows Servers, Windows workstations, Linux servers, firewalls, switches, VMware equipment, and Cisco UCS hardware through the application.

2019-11-07 10:35:00 UTC
author avatar
Top 20Real User

Our primary use case of this solution is scanning of our external websites.

2019-09-08 09:50:00 UTC
author avatar
Top 20Real User

Nessus was used to scan vulnerabilities and compliances in our clients' networks and with this, carry out the remediation process through constant cycles in time until threats to the network are considerably reduced. The environments are small business networks (less than 50 employees), and so far there have been no major impediments in the scans performed.

2019-01-16 20:28:00 UTC
author avatar
Real User

Primarily, I use this for assessment and administration testing.

2019-01-10 08:22:00 UTC
author avatar
Consultant

My primary use case of this solution is for scanning internal networks.

2018-10-28 09:34:00 UTC
author avatar
User

I use Tenable Nessus to evaluate the security posture of multiples acquisitions before integrating them to our network.

2018-08-29 19:26:00 UTC
Learn what your peers think about Tenable Nessus. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
425,509 professionals have used our research since 2012.