We performed a comparison between Microsoft Defender Vulnerability Management and Tenable Vulnerability Management based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The product’s most valuable features are compliance, recommendations, and inventories."
"The solution is up-to-date and helps prevent zero-day attacks."
"One valuable feature is the Microsoft Security Scorecard."
"The product's stability is very high...The scalability of the product is amazing."
"The solution helps identify threats and vulnerabilities."
"It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
"The most valuable feature for me is container scanning because I am interested in CICD security."
"The solution creates vulnerability tickets within the VM profile but should also include them under the Remediation tab so the fixes can be viewed in the ticketing queue."
"The initial setup is mostly straightforward."
"It helps us create remediation projects and assign the console’s responsibility to specific engineers."
"It is easy to manage. Most of the information the tool provided helped to further investigate the vulnerability and its impact."
"The vulnerability management itself is the most valuable feature as well as references to the mitigation techniques."
"There is no burden of updating or upgrading this solution."
"The general support could be improved."
"It is challenging to extract and customize reports from the system."
"The technical support takes too much time to resolve tickets."
"The setup phase of the product is not that easy and needs a person to have a certain level of expertise."
"Integration can be improved."
"I would like the solution to cover the whole cycle of mitigation since it's an area where the solution currently lacks."
"They should include better customization of the dashboard, and integration tools."
"The tool's reports are bad. They're not very customizable or flexible. During audits, we often have to exclude things that aren't relevant to our organization, but we can't do that easily with the reports. They come in HTML or PDF format, and we can't compare current results with previous ones in Excel because we never receive reports in Excel."
"The UI has room for improvement."
"Users get confused between VPR and CVSS ratings."
"The reporting was never great in Tenable Vulnerability Management, so, in my company, we imported all the data into Ivanti RiskSense to start using it for reporting."
"An area of improvement for this solution is being able to customize the dashboard. For example, the dashboard does not allow us to view a previous months vulnerability results alongside current results to make comparisons."
"There needs to be better dashboard navigation."
More Microsoft Defender Vulnerability Management Pricing and Cost Advice →
More Tenable Vulnerability Management Pricing and Cost Advice →
Microsoft Defender Vulnerability Management is ranked 23rd in Vulnerability Management with 5 reviews while Tenable Vulnerability Management is ranked 2nd in Vulnerability Management with 38 reviews. Microsoft Defender Vulnerability Management is rated 8.2, while Tenable Vulnerability Management is rated 8.2. The top reviewer of Microsoft Defender Vulnerability Management writes "The vulnerability assessment is very accurate because it runs directly into the vulnerability database". On the other hand, the top reviewer of Tenable Vulnerability Management writes "Discovers vulnerabilities and integrates well with other solutions". Microsoft Defender Vulnerability Management is most compared with Qualys VMDR, Tenable Nessus, Rapid7 InsightVM, Microsoft Sentinel and Microsoft Defender XDR, whereas Tenable Vulnerability Management is most compared with Tenable Security Center, Tenable Nessus, Qualys VMDR, Amazon Inspector and Rapid7 InsightVM. See our Microsoft Defender Vulnerability Management vs. Tenable Vulnerability Management report.
See our list of best Vulnerability Management vendors and best Risk-Based Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.