Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Init15: Vote for Your Favorite Tenable Enhancement (Update: Now closed)

Note:  Nessus Cloud is now a part of Tenable.io Vulnerability Management. To learn more about this application and its latest capabilities, visit the Tenable.io Vulnerability Management web page.

 

Note: Passive Vulnerability Scanner (PVS) is now Nessus Network Monitor. To learn more about this application and its latest capabilities, visit the Nessus Network Monitor web page.

 

Sitting on a sofa on a Sunday afternoon
Going to the candidates’ debate
Laugh about it, shout about it
When you’ve got to choose
Every way you look at it you lose

— Simon And Garfunkel

We're in the midst of campaign season here in the United States, and many people may be thinking about these Simon and Garfunkel lyrics. There are certainly times when having too many choices is a real problem.

Update: We have a winner!

Many thanks to all who voted. There were a number of projects that received many votes, and we are pleased to announce that “Remediation Prioritization (Caught With Your Pants Down)” was the winner.

Several other projects that received votes were also so well done during the three days of work at Init15 that we will be able to include them in upcoming releases as well: Nessus Cloud 2FA, SAML Authentication for Nessus Cloud (Hypersquirrel), and possibly others.

The Tenable Hackathon

Tenable’s Product Management team also has too many choices right now. Tenable just finished our Init15 hackathon, when more than twenty teams competed in a three day effort to create innovative new capabilities for Tenable products, and each team presented its project at the end of the competition. The Tenable team then voted on their favorites to determine the winning projects. For the developers, it was the end of a great week building both technologies and relationships.

Init15 Tenable Hackathon graphic

But for Product Management, our work was just starting as the competition finished. We’re responsible for coordinating with developers to ensure that our products continue to deliver the solutions that our customers and partners need to help secure their networks. At the end of Init15, we found that every one of the projects provided a really valuable capability. With so many choices, what should Project Management do when you’ve got to choose?

That’s where you come in.

Vote!

Listed here are twenty of the projects that were created and presented at Init15 (there were several others dealing with internal-only capabilities like QA automation that, while very useful, are not presented here). We want to hear from you on which projects you’d like to see added to our products. Follow the link below to a SurveyMonkey form to vote for your favorite. We’ll collect votes until Monday August 24; then we’ll tally the results and update our roadmap and this blog with the 3 winning projects. Until then, good luck choosing!

So you got to let me know
Should I stay or should I go?

— The Clash

Project 1 – Nessus Exploit Simulator

Nessus is able to test for the presence of exploitable vulnerabilities; the Nessus Exploit Simulator takes this one step farther by providing a Establish Shell button.

Nessus Exploit Simulator graphic

Project 2 – SAML Authentication for Nessus Cloud (Hypersquirrel)

A micro-services based architecture that lets customers use SAML authentication services (such as Okta) for access to Nessus Cloud.

Project 3 –Localization Tools (Ten-abel Fish)

A framework to enable easy translation of product content and UIs into local languages.

Localization Tools (Ten-abel Fish) graphic

Project 4 – NASL Fuzzer Plugin

A plugin for Nessus that provides fuzzing capabilities to find problems with input validation and handling.

NASL Fuzzer Plugin graphic

Project 5 – Web Application Inventory (Eye of Providence)

A plugin for Nessus that determines web application inventory and versions using non-traditional techniques.

Web Application Inventory (Eye of Providence) graphic

Project 6 – Integrated Asset Discovery (Cover Your Assets)

Enhancements in SecurityCenter to show the coverage of detected assets by various techniques including active scanning, passive detection, and log analysis. Includes a Fix Now button to add coverage.

Integrated Asset Discovery (Cover Your Assets) graphic

Project 7 – Remediation Prioritization (Caught With Your Pants Down)

Filtering capabilities in Nessus that show the most important vulnerabilities to fix – those with exploits in the wild, etc. – so that remediation efforts can be prioritized.

Remediation Prioritization (Caught With Your Pants Down) graphic

Project 8 – SecurityCenter Schedule Load Distribution (Poseidon’s Lullaby)

A tool to distribute the load of various SecurityCenter processes (scanning, dashboard calculations, etc.) evenly over time.

SecurityCenter Schedule Load Distribution (Poseidon’s Lullaby)

Project 9 – Task Wizards (Nessus Feature Tours)

A step-by-step walkthrough to accomplish tasks in Tenable products, guided by in-product pop-up notes.

Task Wizards (Nessus Feature Tours) graphic

Project 10 – Community Ratings (FATE)

A mechanism for customers to create and share ratings for templates, dashboards, etc., inside Tenable products.

Community Ratings (FATE) graphic

Project 11 – User Behavior Analytics

Machine-based learning that evaluates user behavior gleaned from scans, logs, and network activity. Anomalous activity can be identified and then highlighted for follow-up.

User Behavior Analytics graphic

Project 12 – Enhanced Nessus Plugin Search

Enhancements to the Nessus Plugin Search page to enable searching by multiple complex criteria.

Enhanced Nessus Plugin Search graphic

Project 13 – Compliance Baselines

A capability to create a “baseline” out of compliance scan results, and then compare future scans for changes against the baseline.

Compliance Baselines graphic

Project 14 – Honeypot Analysis

A system for using honeypots to prioritize scan findings and assist with the creation of plugins for new vulnerabilities.

Honeypot Analysis graphic

Project 15 –Raspberry Pi PVS (Minion PVS)

A PVS architecture that separates data collection, data analysis, and reporting into unique components. The data collection component can be run on a $35 Raspberry Pi.

Raspberry Pi PVS (Minion PVS) graphic

Project 16 – Nessus Cloud 2FA

Two-factor authentication for Nessus Cloud using Twilio and SMS.

Nessus Cloud 2FA graphic

Project 17 – Fortinet PCap-Based PVS

Integration between Fortinet device’s pcap capabilities and PVS, enabling the capture of traffic without requiring a span port.

Project 18 – NASL Debugger (FANG)

A NASL debugger supporting breakpoints, step-by-step execution, and a Sublime-based UI.

NASL Debugger (FANG) graphic

Project 19 – Nessus in Docker (Terminus)

A Docker repository with ready-to-use versions of Nessus.

Nessus in Docker (Terminus) graphic

Project 20 – Nessus Profiling/Tracing

A profiler and tracing facility for Nessus to debug and improve front end/back end communications.

Nessus Profiling/Tracing graphic

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.