Managing Vulnerabilities displays a summary of vulnerabilities detected by NNM. These vulnerabilities can be independently viewed by many different users with different access control. also allows security managers to issue recommendations that help guide network administrators as to which vulnerabilities should be mitigated.

For more information, see the User Guide.

NNM is Real-Time

Since NNM’s vulnerability data is constantly fed into and NNM’s plugins are updated by Tenable®, the accuracy of the passive vulnerability data in greatly enhances the quality of the security information available to users.