2018-08-29T19:26:00Z

What is your primary use case for Tenable Nessus?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
2020 Answers

author avatar
Top 5Real User

We usually use the solution for infrastructure level and web application scanning, although mostly for the former. This is what we are doing at present. We were using the web application portion of Tenable Nessus for several months before switching to Veracode.

2021-05-19T12:15:00Z
author avatar
Top 10Real User

We use Tenable Nessus when we are preparing our audit where we need to do an initial scan of our customers' platform to see if they have any critical issues.

2021-04-06T11:59:58Z
author avatar
Top 10Real User

Our use cases are pretty straightforward. We primarily use it for conducting vulnerability scans.

2021-02-19T09:45:24Z
author avatar
Top 5LeaderboardMSP

I primarily use the solution for vulnerability scanning within our organization.

2021-01-13T19:38:19Z
author avatar
Top 20Real User

I have been using Tenable Nessus for my personal use. It works well. I am using this solution for testing.

2020-12-13T06:30:07Z
author avatar
Top 5Real User

We use it for vulnerability management. We have the latest version because we're using it in the cloud right now. I have a public cloud and a private cloud version.

2020-12-07T21:15:00Z
author avatar
Top 20Real User

We use Tenable Nessus to provide service to our bank. I use it to provide our main service related to our big management. Other than providing information security to our clients, it is our information security provider, service provider — we manage it. Using Nessus, we are able to scan and locate any potential vulnerabilities that our clients may have and point them out to them. I am not sure how many users we have using this solution, but we have more than 100,000 assets distributed between roughly 40 clients.

2020-10-28T20:22:37Z
author avatar
Top 10Real User

We primarily use the solution for vulnerability management. We also use it during our IP scans.

2020-10-04T06:40:14Z
author avatar
Top 5LeaderboardReal User

We are a company that provides cloud migration services. We help companies to migrate to the public cloud. When our customers want to migrate applications, they're worried about the security aspect in the cloud. So we are trying to see how the application security that is on-premises can be migrated to the cloud. We don't have any particular solution, we are working with a few options. The customer selects what best suits their needs. If we have a program, we work with that. It's not specific to what we are working with.

2020-09-21T06:33:15Z
author avatar
Top 5LeaderboardReal User

Over 15.000 active assets|inside 10 companies belonging to the group, the biennium recurrent project mapped the real situation, in parallel with photography of IT/Security maturity through three main domains: processes, people, and technology. 5 TOEs: Infrastructure, Databases (SQL and Oracle in deep), AWS Cloud, Connectivity (Routers, Switches, and Firewalls against/based CIS) and Web Application instances (partial tests).

2020-08-06T15:26:00Z
author avatar
Real User

We use it for servers, domain controllers, application servers, Oracle servers, SQL servers, as well as network devices, like routers. For PCs that are used for services such as credit cards and ATMs, we usually do a vulnerability assessment, including Windows Servers, Linux servers, SQL servers, and database servers. We scan everything except basic PCs because it would require a lot of time to check all those reports. Our system administrators use another solution to check regular PCs for Windows and MS updates. We're checking things every month. We created a schedule and it checks automatically. From time to time, we'll use it to check things if something unusual has happened. For example, if a stranger was on a computer, we'll check if is there a vulnerability there. We also use it to prepare reports when the agency asks for them.

2019-11-27T05:42:00Z
author avatar
MSP

We mainly use it for scanning for vulnerability on our hosts, like network devices and servers; to find the vulnerabilities and do remediation. We monitor Windows and Linux workstations.

2019-11-18T07:22:00Z
author avatar
Consultant

I use it for performing vulnerability scans for both my environment and for clients. I provide fractional CISO consulting services. As such, I will perform a vulnerability scan on an environment before I say "yes." Everybody has to have a vulnerability scan. You should do them periodically which, to me, is monthly. It's just good practice to perform that scan monthly and whenever there's a major change, to make sure that you don't have any open environment. I monitor web servers, database servers, app servers, desktops; everything you'd find on a network, besides switches and routers. I don't have that, but I monitor any Windows- and Linux-based nodes.

2019-11-14T06:34:00Z
author avatar
Real User

We use it for internal and external vulnerability scans.

2019-11-13T05:29:00Z
author avatar
Real User

It is used for vulnerability management. We used Nessus to scan our machines to see how they were vulnerable, for patches or security. The CVE numbers is what we looked at, the security vulnerability, and tried to figure out what we were vulnerable to. We monitored Windows Servers, Windows workstations, Linux servers, firewalls, switches, VMware equipment, and Cisco UCS hardware through the application.

2019-11-07T10:35:00Z
author avatar
Real User

Our primary use case of this solution is scanning of our external websites.

2019-09-08T09:50:00Z
author avatar
Top 20Real User

Nessus was used to scan vulnerabilities and compliances in our clients' networks and with this, carry out the remediation process through constant cycles in time until threats to the network are considerably reduced. The environments are small business networks (less than 50 employees), and so far there have been no major impediments in the scans performed.

2019-01-16T20:28:00Z
author avatar
Top 20Real User

Primarily, I use this for assessment and administration testing.

2019-01-10T08:22:00Z
author avatar
MSP

My primary use case of this solution is for scanning internal networks.

2018-10-28T09:34:00Z
author avatar
User

I use Tenable Nessus to evaluate the security posture of multiples acquisitions before integrating them to our network.

2018-08-29T19:26:00Z
Learn what your peers think about Tenable Nessus. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
509,820 professionals have used our research since 2012.