Cisco Vulnerability Management (formerly Kenna.VM by Kenna Security, which was acquired by Cisco in June of 2021), is a vulnerability management platform featuring real-time cyber-risk analysis and predictive modeling based on intelligence feeds and global attack telemetries to provide accurate, reliable risk prioritization and protection.
N/A
Tenable Nessus
Score 8.7 out of 10
N/A
Tenable headquartered in Columbia offers Nessus, a vulnerability scanning and security assessment solution used to analyze an entity's security posture, vulnerability testing, and provide configuration assessments.
For user end devices this product has worked great for us. We have been able to find vulnerabilities/risks with certain software in bulk on devices and implement fixes for them very quickly. CVM has also provided us visabity on all our devices that we never had before and we can close gaps security wise a lot faster knowing now where problems are at
It is an excellent tool for scanning servers, workstations, and network devices to identify missing patches and misconfiguration; we regularly use it to confirm patch effectiveness after the update; it also helps us for preparing audits such as iso 27001, and regulatory requirements, it also helps us to identify open ports and services that violate security.
Nessus is best at performing vulnerability scans, in fact, it gives findings and moreover accurate findings of the assessments. It does not do penetration testing or exploit the vulnerabilities because it is concerned about scanning the systems/applications.
In fact, Nessus has multiple profiles/policies to perform different types of scans such as, scans oriented for PCI-DSS, malware scans, web application scans, bad shell shock detection scan to name a few.
Nessus has the ability to classify the vulnerabilities into risk-based categories from critical to even informational which I think is one of the things that separates Nessus from other vulnerability scanners.
The tool has lots of options for setting up before scanning any device, this methodology could be simplified further with default configuration for various devices predefined, anyhow we can use this technique by making use of policies.
For advanced users we cannot disable the plugins inside the plugin groups, we can enable the whole set of plugins at a time, for few hundreds its ok, but thousands of plugins are of waste of resource and time.
Nessus is best and easy to use application for Vulnerabilities finding and reporting, it has multiple platforms and wide scope covering almost all devices for security improvement so far, thus we are very likely to continue its services.
CVM provides a very easy to understand and use interfaces. Dashboards and reporting are compiled nicely when risk meters are created. After initial setup of software cisco onboarding teams do an amazing job going over all areas of this software to provide best overall usability of the product. Against other tools setup and usability is at a higher standard
Tenable Nessus is a great product and provides a lot of value, but it is difficult to set up and use and the amount of data it generates can be overwhelming. It does help us prioritize based on the severity of the detection, however there are sometimes mitigating factors that we have implemented that Nessus does not account for, which causes lots of noise in the reports.
I haven't needed to contact support yet. But issues are easily solved with a quick internet search which means support and by extension, the larger community are involved and knowledgeable.
We run a flavor of multiple products and CVM enhances/complements those tools by pinpointing where the vulnerabilities are at on our network. Intune and Automox being products CVM works well with when its time to patch affected systems. Tenable we used prior to CVM and its product was too complex and clunky and always had issues with asset duplication. CVM simplified vulnerability scanning and made it a lot easier to manage compared to Tenable
Sometimes when we identify a vulnerability with Nessus that has an exploit, we made a proof of concept with Metasploit in order to show to the IT managers the importance of the software/hardware hardening.
Nessus certainly has a positive impact while me while performing my job, either as security research, or performing vulnerability assessments for clients. It gives a lot of information about the system/application after performing scans. The number of false positives is also less compared to other vulnerability scanners.
The professional edition is very useful as policy templates available in this edition are very handy and useful even to perform compliance scan like PCI DSS scan.
Also, the ability to export the scan results into reports in formats like HTML, PDF is very useful which could be for performing system/application reviews.