Nessus Seminar

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

NESSUS

VULNERABILITY SCANNER

Present by:
E.Srinithi
120011012709
Introduction to Nessus

WHAT IS NESSUS? HOW DOES NESSUS WORK?

N e ssus i s a p ow e r f ul v u l n e rability s ca n n e r N e s s u s u s e s a va r i e ty o f t e c h ni q ue s t o s c a n

th a t h e l p s o r g a n i z atio ns i d e n tify a n d a n d a n a l y ze n e t w o r k d e v i ce s , o p e ra ti n g
s y s t e ms , a p p l i c a tio n s , a n d d a t a b a s e s f o r
a d d r e s s s e cu r i ty r i s k s i n th e i r n e tw or ks ,
v u l n e ra bi li ti e s . I t c a n p e r f o r m b o t h
s y s te m s , a n d a p p l icatio ns . It i s w i d e ly
a u t h e n ti c a te d a n d u n a u th e nti c a te d s c a n s , a n d
u s e d b y s e cu r i ty p r o f e s s io nals a n d IT c a n b e c o n f i g u re d t o s c a n s p e c i f i c I P ra n g e s ,
te a m s to p r oa ctively i d e n tify v uln erab ilitie s p o r t s , a n d p r o t o c o l s . N e s s u s a l s o i n c l u de s a
b e f o r e th ey ca n b e e xp l o ited b y a tta cke rs . c o m p r e he ns i ve d a t a ba se o f k n o w n
v u l n e ra bi li ti e s a n d e x p l o i t s, w h i c h i t u s e s t o
i d e n tif y p o t e n t i a l r i s k s .
Vulnerability Scanning

Vu l n e ra bility s ca n n i n g i s th e p r o ce s s o f
BENEFITS OF NESSUS
i d e n tifyin g a n d a s s e s s i n g s e cu r i ty
v u l n e ra bilities i n a s y s te m o r n e tw o r k .
• Id e ntif ie s v ul ne ra bilities b e f or e the y ca n
N e ssus i s a p op ul ar v ul n e rability s ca n n e r
b e e xp l o ited b y a tta cke rs .
th a t h e l p s o r g a n i z atio ns i d e n tify a n d a d d r e s s
v u l n e ra bilities i n th e i r IT i n f ra s tr uctur e. • A u to mates th e v u l n e ra bility s ca n n i n g
p r o ce s s , s av i n g ti m e a n d r e s o u r ce s .

• Pr ov i de s d e ta iled r e p o r ts o n
v u l n e ra bilities a n d r e m e d iation s te p s .
Integrations

N e s s u s i s d e s i g n e d to i n te g rate w i th a w i d e ra n g e o f s e cu r i ty to o l s , a l l ow ing f o r a m o r e
co m p r e h en s ive a n d e f f e ctive v u l n e rab ility m a n a g e me nt p r o g ra m . So m e o f th e ke y i n te gration s
i n cl ude :

S e cu r i t y In fo r m a t i on a n d E ve n t Ma n a g e m en t ( S I E M) Sy s t e ms

N e s s u s ca n b e i n te grated w i th p o p u la r SIEM s y s te m s s u ch a s Sp l u n k a n d A r cSi g ht, a l l ow ing f o r


r e a l - time m o n i to rin g a n d a l e r tin g o f s e cu r i ty e ve n ts .

Pa t ch Ma n a g e m en t Sy s t em s

N e s s u s i n te g rate s w i th p a tch m a n a g em en t s y s te m s s u ch a s M i cr o s o f t SC C M a n d IB M B i g Fi x,
a l l ow ing f o r a u to m ate d p a tchin g o f v u l n e rab ilitie s i d e n tif ied b y N e s s u s s ca n s .

T i cke t i n g Sy s t em s

N e s s u s ca n b e i n te grated w i th ti cketin g s y s te m s s u ch a s Se r v i ceNo w a n d J IRA , a l l ow ing f o r


a u to m a ted ti cke t cr e a ti on a n d tra ck i ng o f v u l n era bility r e m e d iatio n e f fo r ts .
Demo
THANK YOU

You might also like