Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Tenable Nessus Scanner Capabilities Receive Red Hat Recognition

The Red Hat Vulnerability Scanner Certification for Tenable Nessus represents our commitment to continue providing customers with visibility into their Red Hat Enterprise Linux systems. Read about what this means and how it benefits our customers.

Tenable is proud to announce that it has received the Red Hat Vulnerability Scanner Certification. This certification recognizes that the Tenable Nessus scanner has been tested and certified to meet the high standards of Red Hat's certification program. Nessus is available from Tenable as a standalone product and is also included with the Tenable Security Center and Tenable Vulnerability Management products.

The recent addition to Tenable’s certifications comes on the heels of a commissioned study in which Tenable was found to provide the fastest and broadest coverage of CISA KEV vulnerabilities. The Red Hat certification marks a significant achievement for Tenable and represents the company’s commitment to continue providing customers with visibility into their exposure.

Innovation inspired by collaboration

Since early 2020, Tenable has collaborated closely with Red Hat Product Security to develop best practices for vulnerability scanning of Red Hat Enterprise Linux (RHEL) systems. This collaboration has resulted in a deep understanding of the unique security needs of RHEL environments. The journey can be summarized in two parts.

First, through iterative improvements, we have continuously evolved our vulnerability detections for RHEL, with the goal of delivering the most accurate view of exposure. One way we have done this is by correctly correlating affected Red Hat Package Manager (RPM) versions by analyzing repository URLs. As a result, we minimized false positives in RHEL systems, reducing the noise in customer environments.

Second, collaborating with Red Hat’s Product Security team to adopt the latest machine-readable security advisory intelligence standards has enabled us to provide consistent, fast and accurate vulnerability detections. Often, vulnerability detection plugins are available within hours of disclosure.

As a result, Tenable customers can be confident they are using the latest vulnerability intelligence to protect their RHEL environments and have peace of mind that Tenable can help them identify, prioritize and remediate vulnerabilities present in RHEL environments. Throughout the yearslong collaboration, the Nessus scanner has been thoroughly tested to meet the high standards of Red Hat, which include:

  • Up-to-date coverage of RHEL vulnerabilities, including common and emerging vulnerabilities.
  • Accurate and reliable reporting, enhanced by consuming, normalizing, and enriching Red Hat Product Security vulnerability disclosure data.

Exposure management with Tenable One

Tenable detects vulnerabilities in RHEL systems via vulnerability detections located in the “Red Hat Local Security Checks” family. More information on how they operate can be found in a Tenable Community blog post. RHEL plugin findings can be further enriched with context through the Tenable One Exposure Management Platform.

The platform combines the broadest vulnerability coverage spanning IT assets, cloud resources, containers, web apps and identity systems, builds on the speed and breadth of vulnerability coverage from Tenable Research and adds comprehensive analytics to prioritize actions and communicate cyber risk. Tenable One allows organizations to:

  • Gain comprehensive visibility across the modern attack surface
  • Anticipate threats and prioritize efforts to prevent attacks
  • Communicate cyber risk to make better decisions

Conclusion

This certification is a testament to the strong partnership between Tenable and Red Hat. It demonstrates the commitment of both companies to help organizations protect their RHEL environments from the latest cybersecurity threats.

Learn more

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.