We performed a comparison between Microsoft Defender Vulnerability Management and Tenable Nessus based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is up-to-date and helps prevent zero-day attacks."
"The solution helps identify threats and vulnerabilities."
"The product’s most valuable features are compliance, recommendations, and inventories."
"The product's stability is very high...The scalability of the product is amazing."
"One valuable feature is the Microsoft Security Scorecard."
"It gives you an unlimited IP scan."
"The vulnerability scanner is the most valuable feature."
"I like its ease of use. It has the script that is pre-built in it, and you just got to know which ones you're looking for."
"Out of the box, the product works well for us, so it's not a tool that we need to customize very much."
"A valuable feature of the solution is that it is easy to understand."
"Its initial setup was simple and straightforward."
"The solution is great for scanning servers."
"The most valuable features of Tenable Nessus are the scanning option. Advanced scanning is highly useful. The offline config audits and application assessments are useful."
"The general support could be improved."
"Integration can be improved."
"The setup phase of the product is not that easy and needs a person to have a certain level of expertise."
"It is challenging to extract and customize reports from the system."
"The technical support takes too much time to resolve tickets."
"The solution should be able to support more devices."
"Some things in the user interface could be better. The user interface could allow more adjustments to plugins. The price could also be better."
"This is still a maturing product. Tenable is only a scanner for one ability, while other solutions like Rapid7 have more tools for verification. We still have to manually verify to see if the vulnerability is a false positive or not."
"The reports should be improved in Tenable Nessus. For example, when you are auditing compliance with CIS standards. It provides very poor reports."
"Multiple user access would be an area for improvement from a user-access perspective. A role-based access control feature would be great because at present, there is a limitation with only one account. If that account gets compromised or gets locked, then we will encounter problems."
"The price could be reduced."
"Technically, it is an excellent and the best solution available in Libya. My only concern is related to its pricing. They are an emerging company in Libya, and they need to put in some effort to provide us with very good prices so that customers can go with the best solution. Chinese companies are getting into the market here, and they're providing very cheap solutions."
"Vulnerability recommendations are outdated and not in line with industry standards."
More Microsoft Defender Vulnerability Management Pricing and Cost Advice →
Microsoft Defender Vulnerability Management is ranked 23rd in Vulnerability Management with 5 reviews while Tenable Nessus is ranked 3rd in Vulnerability Management with 75 reviews. Microsoft Defender Vulnerability Management is rated 8.2, while Tenable Nessus is rated 8.4. The top reviewer of Microsoft Defender Vulnerability Management writes "The vulnerability assessment is very accurate because it runs directly into the vulnerability database". On the other hand, the top reviewer of Tenable Nessus writes "Unlimited assets for one price and quick, agentless results". Microsoft Defender Vulnerability Management is most compared with Qualys VMDR, Rapid7 InsightVM, Tenable Vulnerability Management, Microsoft Sentinel and Microsoft Defender XDR, whereas Tenable Nessus is most compared with Qualys VMDR, Rapid7 InsightVM, Tenable Security Center, Tenable Vulnerability Management and Rapid7 Metasploit. See our Microsoft Defender Vulnerability Management vs. Tenable Nessus report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.