{"id":607,"date":"2004-12-16T00:00:00","date_gmt":"2004-12-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/16\/nessus-no-longer-free\/"},"modified":"2021-12-30T11:37:47","modified_gmt":"2021-12-30T11:37:47","slug":"nessus-no-longer-free","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/16\/nessus-no-longer-free\/","title":{"rendered":"Nessus no longer free"},"content":{"rendered":"<p>Vendors relying on open-source Nessus won&#8217;t automatically get free, timely &#8220;plugin&#8221; programs after project managers of the popular vulnerability scanner announced a new feed structure that provides the most recent releases for a fee.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Though no company names were mentioned by Nessus leaders during their recent announcement, the popular vulnerability scanner reportedly is used in many commercial security products and services.<\/p>\n<p>I got [responses that ranged from] looks of disbelief to veiled threats in some cases,&#8221; said Ron Gula, a Nessus project manager and president and CTO at Tenable Network Security, which also manages the Nessus project.  &#8220;The vendors who were using Nessus and not contributing anything to it were not happy.&#8221;<\/p>\n<p>Jay Jacobson, CEO of Edgeos Inc. in Phoenix, would be screaming if people took credit for his creation for years.<\/p>\n<p>A wide range of testing gizmos are available that can perform security vulnerability assessments, including basic port scanners, network and OS vulnerability assessment tools &#8212; even complex Web application penetration testing programs.<\/p>\n<p>Almost all of the Nessus engine is made by those at Tenable, which includes Nessus founder Renaud Deraison as its chief research officer.<\/p>\n<p>&#8220;It is difficult to financially justify releasing the work of a corporate developer to the open source community when that developer is supported by thousands of dollars of equipment, salary and benefits,&#8221; said Richard Bejtlich, technical director for the Monitoring Operations Division of ManTech&#8217;s Computer Forensics and Intrusion Analysis group. <\/p>\n<p>In response to the &#8220;exploitation&#8221; of his brain child, Deraison, who still leads the Nessus project, announced that Nessus feeds will still be available in three forms: for a fee; for those who register, but with a seven day delay; and under copyright as part of the GNU Public License.<\/p>\n<p>A &#8220;Registered Feed&#8221; is available for free to the general public, but new plugins are added seven days after they are added to the Direct Feed.<\/p>\n<p>Plugins accepted with a copyright under the GNU Public License will be distributed to the Direct, Registered and GPL feeds at the same time.<\/p>\n<p>http:\/\/searchsecurity.techtarget.com\/originalContent\/0,289142,sid14_gci1034903,00.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-607","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=607"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/607\/revisions"}],"predecessor-version":[{"id":3094,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/607\/revisions\/3094"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}