Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable
Nessus® Professional

Vulnerability assessment to stay one step ahead of attackers

Overcome scarce resources and limited time to keep pace with attackers and proactively find and fix vulnerabilities across your constantly changing attack surface.

Trust the No. 1 vulnerability assessment solution to give you peace of mind in a constantly changing security world. Trust Tenable Nessus.

Buy Nessus Pro

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select your license

Buy a multi-year license and save.

Add support and training
Buy now

Try Nessus

Nessus
Expert
Free for 7 days
Nessus
Pro
Real-time vulnerability updates
Vulnerability scanning
External attack surface
Ability to purchase more domains
Scan cloud infrastructure
500 prebuilt scanning policities

Knowledge is power

Eliminate attack paths by gaining the insights you need.

Keeping pace with attackers is hard – especially with the constant barrage of new vulnerabilities and an ever-changing attack surface.

Since 1998, Nessus has helped security teams stay a step ahead. It provides the visibility, accuracy and speed you need to protect your organization against unacceptable risk.

This 4:30 Nessus Professional video demonstrates how you can streamline vulnerability assessments.Try Nessus now for free.

Knowledge is power

#1 in vulnerability assessment. Trusted by customers.

Built by practitioners

Nessus is built from the ground-up with a deep understanding of how security practitioners work. Every feature in Nessus is designed to make vulnerability assessment simple, easy and intuitive. The result: less time and effort to assess, prioritize and remediate issues. Learn more about the features here.

  • Deploy on any platform

    Nessus can be deployed on a variety of platforms, including Raspberry Pi. Regardless of where you are, where you need to go or how distributed your environment is, Nessus is fully portable.

    Read the Press Release

  • Efficiency and accuracy

    Dynamically compiled plugins increase scan performance and efficiency, enabling faster completion of the first scan and time to value.
  • Leverage IaC security scanning

    Download and start scanning with Terrascan to secure your Infrastructure as Code (IaC) before deployment.
  • Zero in on threats that matter most

    With market-leading coverage, Nessus knows every vulnerability. The power of Nessus lets you prioritize vulns by leveraging a variety of inputs, including EPSS, CVSS, and Tenable VPR to then triage and address the threats that matter most.
  • Pre-built policies and templates

    More than 450 pre-configured templates help you quickly understand where you have vulnerabilities. Easily audit configuration compliance against CIS benchmarks and other best practices.
  • Customizable reporting & troubleshooting

    Customizable reporting capabilities can be optimized to meet specific needs and are exportable in formats that are most suited for your security process.
  • Live results

    Live Results automatically performs an offline vulnerability assessment with every plugin update, showing you where you may have vulnerabilities based on your scan history. From here you can easily run a scan to validate the presence of the vulnerability that accelerates accurate detection and prioritization of issues.
  • Ease of use

    Nessus is designed with an intuitive approach to navigation and user experience. This includes a resource center to guide you with actionable tips and guidance on the next steps to take.
  • Grouped view

    Similar issues or categories of vulnerabilities are grouped together and presented in one thread, simplifying the time to research and prioritize issues for remediation. Snoozing lets you select specific issues to disappear from view for a specified period of time. So you only focus on the issues that matter at that time.

Nessus Pro benefits

Easy-to-deploy, easy-to-use

A fully portable vulnerability assessment solution that can be deployed virtually anywhere. Policy creation is simple and only requires a few clicks to scan an entire corporate network.

Advanced detection means more protection

With 70K CVEs, the most in the industry, Nessus scans more technologies and uncovers more vulnerabilities than competing solutions.

Cost effective for companies of all sizes

Cost effective for any consultant or team, Nessus provides complete vulnerability scanning with unlimited assessments for one low price.

Accurate visibility into your networks

Nessus identifies the vulnerabilities that need attention with high-speed, accurate scanning—and highlights which vulnerabilities should be addressed first.

The power of the Tenable Zero Day Research team

Tenable researchers leverage extensive intel sources. Find and provide protection from the latest threats via new plugins.

The power of Tenable grows with you

With operability across Tenable’s product portfolio, easily migrate to other Tenable products to isolate and eradicate the priority exposures that put your business at risk—from IT infrastructure to cloud environments to OT and everywhere in between.


"Nessus is the ultimate time saver for vulnerability scanning."

Penetration Tester on G2

Key use cases for Nessus

Nessus is the world’s No. 1 vulnerability scanning solution. Learn how Tenable customers put it to work in a range of critical situations.

Network pen tester persona

Network pen testers play a unique role in the IT security ecosystem.

Before executing full breach simulations, pen testers use Nessus first to find where those major vulnerabilities are hiding.

Read more
Cybersecurity education programs faculty and students persona

Cybersecurity students are invaluable to this highly specialized field.

Professors use Nessus with cybersecurity students in vulnerability assessment and management courses as a foundational tool to get them up to speed on the essentials of uncovering vulnerabilities.

Read more
Consultant persona

Cybersecurity consultants play pivotal roles in a constantly shifting threat and vulnerability landscape.

Cybersecurity consultants use Nessus to scour clients’ networks for vulnerabilities and create comprehensive reports that summarize security posture and contain key suggestions for remediation.

Read more
SMB Security Admin persona

In years past, small and medium-sized businesses might have considered themselves effectively immune to cyberattacks.

With Nessus, even small companies that lack full-time cybersecurity staff can stay on top of vulnerabilities, customizing comprehensive scans to meet unique business needs.

Read more

To learn more about Nessus features and functionality, visit our Nessus documentation page.
To learn more about purchasing options, please contact your preferred reseller or visit our online store.

Nessus on-demand training

Interested in learning how to use Nessus? Our on-demand course enables the student, pen tester, consultant and security practitioner, through a series of targeted videos, to develop the building blocks for effective use of the Nessus vulnerability assessment solution. From asset discovery to vulnerability assessment to compliance, participants will learn to effectively utilize Nessus in a variety of business use cases.

Course topics

60+ targeted videos and demonstrations covering these topics:

  • Introduction to cybersecurity
  • Installation
  • Configuration
  • Vulnerability assessment
  • Compliance assessment
  • Analysis

Nessus Pro—
Built for security professionals like you

Get the world’s most widely deployed vulnerability assessment solution.

Buy Nessus Pro

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select your license

Buy a multi-year license and save.

Add support and training
Buy now

Try Nessus

Nessus
Expert
Free for 7 days
Nessus
Pro
Real-time vulnerability updates
Vulnerability scanning
External attack surface
Ability to purchase more domains
Scan cloud infrastructure
500 prebuilt scanning policities