?
Solved

ACAS / Nessus

Posted on 2016-07-24
2
Medium Priority
?
220 Views
Last Modified: 2016-08-02
Hi,

I have ACAS and Nessus Scan.  I am learning this, and I am trying to try a new scan.  WOuld I do this from the Nessus Scanner or ACAS?

Thansk
0
Comment
Question by:Eric Donaldson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 41727395
What is ACAS?
0
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points
ID: 41727586
I believe ACAS is  Assured Compliance Assessment Solution (ACAS). Solution that is ACAS awarded by DISA means this
The award provided a mechanism to enable the assessment of U.S. Department of Defense (DoD) enterprise networks and connected IT systems against DoD standards, as well as to identify any known system vulnerabilities.
http://ask-acas.info/faq/

For Nessus scan, I suggest you see Tenable info and in short, you can do from scanner or PVS as per required by ACAS
•SecurityCenter: Offering a centralized view for all network activity including asset discovery, vulnerability detection, configuration and compliance auditing, and event management for large, complex networks.


•Nessus Vulnerability Scanner: Performing network scanning, patch auditing and configuration testing. Nessus is the world's most widely-deployed vulnerability scanner, with more than five million downloads to-date.

•Passive Vulnerability Scanner (PVS): Providing continuous network monitoring and assessment with real-time visibility into all network activity. Tenable's PVS determines server and client-side application vulnerabilities and sends this data to the SecurityCenter in real time. It also uses advanced protocol analysis to log all file sharing, SQL, HTTP, and other types of protocols for analysis.
https://www.tenable.com/press-releases/tenable-network-security-named-assured-compliance-assessment-solution-for-the-defense
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question