{"id":984,"date":"2013-04-05T00:00:00","date_gmt":"2013-04-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/05\/tenable-celebrates-nessus-15th-birthday-and-network-security-leadership\/"},"modified":"2021-12-30T11:38:32","modified_gmt":"2021-12-30T11:38:32","slug":"tenable-celebrates-nessus-15th-birthday-and-network-security-leadership","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/05\/tenable-celebrates-nessus-15th-birthday-and-network-security-leadership\/","title":{"rendered":"Tenable Celebrates Nessus&#8217; 15th Birthday and Network Security Leadership"},"content":{"rendered":"<p>Tenable Network Security, Inc., the leader in real-time vulnerability management, celebrates the 15th anniversary of Nessus, the world&#8217;s most widely deployed vulnerability scanner. With more than 17,000 customers in over 140 countries, the world&#8217;s largest organizations, including the entire U.S. Department of Defense, Merck, Morgan Stanley, and Verizon, use Nessus to scan defense systems, power and utility plant control systems, healthcare information systems, and financial services infrastructures.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shown in a timeline highlighting some of the major milestones over the past 15 years, Nessus was launched on the Linux operating system (OS) on April 4, 1998, by Renaud Deraison, Tenable&#8217;s CRO and co-founder. &#8230; Today, running on Windows, Mac, FreeBSD, Solaris, and a variety of Linux-based OSes or from our cloud service, Nessus scans more OSes, applications, and network infrastructures than any other solution.<\/p>\n<p>Following the product&#8217;s 10-year anniversary, Nessus continued expanding and gained significant recognition as it was named one of SC Magazine&#8217;s &#8220;Top 20 Products&#8221; of the last 20 years in 2009, reached 15,000 Nessus and SecurityCenter customers worldwide in 2012, and surpassed 10,000,000 downloads and 54,000 plugins in 2013.<\/p>\n<p>Link: http:\/\/bw.newsblaze.com\/story\/2013040407025700001.bw\/topstory.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-984","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=984"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/984\/revisions"}],"predecessor-version":[{"id":3471,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/984\/revisions\/3471"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}