Tenable Nessus Review
Use Cases and Deployment Scope
We use Tenable Nessus to scan for vulnerabilities and insecure misconfigurations to improve our security posture. Nessus identifies missing patches and firmware updates and provides basic information on the CVEs to help with remediation. I sleep better at night knowing we are proactively preventing breaches and unauthorized access. It is also valuable tool to achieve compliance and provides evidence for our auditors.
Pros
- Identifies vulnerabilities and misconfigurations across many platforms.
- Helps us achieve compliance with our auditors
- Helps us prioritize remediation based on severity of the CVE/misconfiguration
Cons
- There are some legacy systems that we are unfortunately not able to patch. There is no way to flag these so they are not in all our reports. We still need to track these but they don't need to be included in the weekly scan every time.
- The Service Now integration is very complex.
- We get quite a few false positives, especially when scanning network infrastructure such as siwtches and firewalls.
Likelihood to Recommend
Tenable Nessus is good for any organization that is concerned with tier on-prem IT security, especially those with any kind of regulatory compliance requirements. It does have a learning curve and takes quite a bit of time to set up and monitor, so having a dedicated security staff would be necessary to get its full value. I don't think I would recommend it for organizations that are cloud-native or don't have much in the way of on-prem infrastructure.
