AOH :: HP Unsorted O :: VA3109.HTM

OpenVAS now beyond 10000 Network Vulnerability Tests
OpenVAS now beyond 10000 Network Vulnerability Tests
OpenVAS now beyond 10000 Network Vulnerability Tests

Content-Type: text/plain; charset=iso-8859-15
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable


Passing the 10000th Network Vulnerability Test (NVT) is a perfect
occasion to report about the progress of the OpenVAS project[1].

In October 2008 the systematic development of new NVTs started with a
base of around 5800 Tests. With the release of OpenVAS 2.0 in December
2008, the development was boosted and has now reached an average of 10
code updates per day.  The public OpenVAS NVT Feed Service delivers 3-10
new vulnerability tests every day.

The significantly grown and globally distributed developer team will
gather at the second OpenVAS developers conference[2] July 9-12 2009 in
Germany. During the conference features and a roadmap for OpenVAS 3.0
will be scheduled.

The OpenVAS project is backed by a number of companies, which also
supplement the project with professional services[3]. These companies
include Greenbone Networks, SecPod, Intevation and SecuritySpace.
"Reaching the professional enterprise market is a good indicator that
OpenVAS gained maturity very fast" says Tim Brown, founder of the
OpenVAS project.

While OpenVAS 3.0 will likely appear in 2009, users of OpenVAS 1.0
should prepare to migrate as support for 1.0 will end during 2009.


Michael Wiegand

Michael Wiegand | OpenPGP: D7D049EC | Intevation GmbH - 
Neuer Graben 17, 49074 Osnabr=FCck, Germany   |    AG Osnabr=FCck, HR B 18998
Gesch=E4ftsf=FChrer: Frank Koormann,  Bernhard Reiter,  Dr. Jan-Oliver Wagner

Content-Type: application/pgp-signature
Content-Disposition: inline

Version: GnuPG v2.0.11 (GNU/Linux)



The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH
We do not send spam. If you have received spam bearing an email address, please forward it with full headers to