Solved

ACAS / Nessus

Posted on 2016-07-24
2
193 Views
Last Modified: 2016-08-02
Hi,

I have ACAS and Nessus Scan.  I am learning this, and I am trying to try a new scan.  WOuld I do this from the Nessus Scanner or ACAS?

Thansk
0
Comment
Question by:Eric Donaldson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 41727395
What is ACAS?
0
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 41727586
I believe ACAS is  Assured Compliance Assessment Solution (ACAS). Solution that is ACAS awarded by DISA means this
The award provided a mechanism to enable the assessment of U.S. Department of Defense (DoD) enterprise networks and connected IT systems against DoD standards, as well as to identify any known system vulnerabilities.
http://ask-acas.info/faq/

For Nessus scan, I suggest you see Tenable info and in short, you can do from scanner or PVS as per required by ACAS
•SecurityCenter: Offering a centralized view for all network activity including asset discovery, vulnerability detection, configuration and compliance auditing, and event management for large, complex networks.


•Nessus Vulnerability Scanner: Performing network scanning, patch auditing and configuration testing. Nessus is the world's most widely-deployed vulnerability scanner, with more than five million downloads to-date.

•Passive Vulnerability Scanner (PVS): Providing continuous network monitoring and assessment with real-time visibility into all network activity. Tenable's PVS determines server and client-side application vulnerabilities and sends this data to the SecurityCenter in real time. It also uses advanced protocol analysis to log all file sharing, SQL, HTTP, and other types of protocols for analysis.
https://www.tenable.com/press-releases/tenable-network-security-named-assured-compliance-assessment-solution-for-the-defense
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A hard and fast method for reducing Active Directory Administrators members.
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question