When the word ‘Nessus’ is brought into any conversation, almost no one thinks about a computer program, let alone a specific application software that audits networks in order to provide vulnerability reports.
As Nessus is the name of the centaur that tricked Heracles’ wife into killing him in the Greek mythology, you can sense a similarity between the mythic creature and the software.
Nessus, the centaur, searched for a vulnerability in Deianeira and exploited it to serve his goal, while Nessus, the program, does the same thing for computer networks, leaving aside the exploiting part of the legend.
On the contrary, Nessus does what it takes to keep exploiters at bay by patching the vulnerabilities found in the system. Its plugin library holds tens of thousands of items for you to add the the core application in order to make it your way, to match your expectations and preferences in the most simple, elegant, possible and, why not, plausible way.
Nessus can be used in small companies as well as in larger ones as its scalability is not limited to a specific number of networks, servers and workstations. Its integrated technologies help you perform physical as well as virtual device discoveries alongside software auditing.
Furthermore, Nessus also audits mobile devices in order to provide a broad asset coverage and profiling of the entire organization environment, both cable-depending and wireless-enabled hardware. You can now rest assured that you have an application to detect suspicious behavior or known malware such as botnets.
All in all, Nessus adds a few layers of protection to your network by providing solutions to potential vulnerabilities, categorizes them, prioritizes them while also performing non-intrusive sensitive content auditing for better management and faster patching of the most important problems.