You are here: SecurityCenter > Hardware Requirements

SecurityCenter Hardware Requirements

The following hardware recommendations for SecurityCenter are to be used as a general guide. Enterprise networks can vary in performance, capacity, protocols, and overall activity. Resource requirements to consider for deployments include raw network speed, the size of the network being monitored, and the configuration of the application. Processors, memory, and network cards will be heavily based on the former. Disk space requirements will vary depending on usage based on the amount and length of time data is stored on the system.

The following guidance is intended for typical activities of Tenable customers.

SecurityCenter Full Safe + Local Checks

# of Hosts Managed by SecurityCenter

CPU Cores

Memory

Disk Space used for Vuln Trending

2,500 active IPs

4 2GHz cores

4 GB RAM

90 days: 125 GB

180 days: 250 GB

10,000 active IPs

8 3GHz cores

16 GB RAM

90 days: 450 GB

180 days: 900 GB

25,000 active IPs

16 3GHz cores

32 GB RAM

90 days: 1.2 TB

180 days: 2.4 TB

100,000 active IPs

32 3GHz cores

64 GB RAM

90 days: 4.5 TB

180 days: 9 TB

SecurityCenter Full Safe + Local Checks + 1 Configuration Audit

# of Hosts Managed by SecurityCenter

CPU Cores

Memory

Disk Space used for Vuln Trending

2,500 active IPs

4 2GHz cores

4 GB RAM

90 days: 225 GB

180 days: 450 GB

10,000 active IPs

8 3GHz cores

16 GB RAM

90 days: 900 GB

180 days: 1.8 TB

25,000 active IPs

16 3GHz cores

32 GB RAM

90 days: 2.25 TB

180 days: 4.5 TB

100,000 active IPs

32 3GHz cores

128 GB RAM

90 days: 9 TB

180 days: 18 TB

In addition to the above guidelines, please consider the following suggestions:

  • If the Nessus scanner is deployed on the same system as SecurityCenter, there will be less CPU and memory available during scans, causing slower performance. Use multi-core and/or multiple CPU servers to alleviate this. Placing the scanner on a secondary machine will alleviate performance bottlenecks.
  • If one or more Passive Vulnerability Scanners are in use, use multi-core and/or multiple CPU servers to increase performance.
  • Use the aggregate of the individual software product resource requirements to determine total hardware system requirements.
  • If Nessus or PVS is deployed on the same server as SecurityCenter, consider configuring the server with multiple network cards and IP addresses.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.