Tenable Network Security Reduces Cloud Infrastructure Attack Surface with New Capabilities in Nessus v6
New Nessus Agents for Amazon, Debian and Ubuntu Linux, and new Nessus scanner for AWS help customers simplify cloud vulnerability management
Tenable Network Security®, Inc., the leader in continuous network monitoring™, today announced new capabilities for Nessus® v6 that allow customers to simplify and extend vulnerability management for cloud environments by reducing the cloud infrastructure attack surface.
When moving to cloud computing, many organizations discover that the benefits of the cloud are accompanied by unexpected security challenges separate from the traditional vulnerability management hurdles of securing transient devices and managing credentials. Traditional vulnerability management programs are also limited by the lack of security expertise in the cloud and by solutions that don’t support cloud environments.
Tenable customers upgrading to the latest versions of Nessus Cloud or Nessus Manager can now reduce their cloud infrastructure attack surface with new Nessus Agent support for Amazon, Debian and Ubuntu Linux, simplifying and extending vulnerability management for hard-to-scan devices in any IT environment.
“Since the introduction of Nessus Cloud, Tenable continues to deliver choice and flexibility for customers who want to move some or all of their IT operations to the cloud,” said Ron Gula, CEO, Tenable Network Security. “Expanded Nessus Agents capabilities for three leading cloud OSes, and a new Nessus scanner coming soon to the Amazon Web Services (AWS) Marketplace, enable customers to identify vulnerabilities and perform configuration and compliance assessments across on-premises and cloud environments.”
Tenable’s new Nessus scanner, available soon in the AWS Marketplace, targets and assesses Elastic Compute Cloud (EC2) instances in multiple AWS accounts and reports data back to Nessus Cloud or Nessus Manager, making it easy to include AWS vulnerability assessment results in an overall vulnerability management program.