We performed a comparison between Tanium and Tenable Nessus based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"Tanium has made the process of detecting threats more proactive with its detection. So, the process is easier and more efficient."
"Tanium’s linear-chain architecture is valuable."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"Threat hunting is a very good feature on Tanium. We have just started using it and have not used it extensively."
"Tanium's most valuable features are patch management, inventory, and distribution software."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in parallel."
"The security features are very valuable."
"It allows me to prioritize efforts and utilize effective technical resources."
"It also has an executive report where you don't have to provide the client all the detail for them to sift though. But if they wish to dig through the detail they can."
"Quick assessments, compliance scores, and results are provided without having to do agents."
"Out of the box, the product works well for us, so it's not a tool that we need to customize very much."
"Nessus is effortless to integrate."
"The trial version is very good for testing whether it will suit your needs."
"The most valuable feature of Tenable Nessus is real-time monitoring."
"The most valuable feature of Tenable Nessus is vulnerability detection."
"The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used."
"Most of the time, agent-relative issues have to be more equipped with self-healing features. At times, the agent is there, but for some reason, it doesn't report a status. It gives certain problems that are obviously agent-based."
"The solution lacks mobility."
"The reporting could be improved."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
"We had some issues with the solution's OS upgrade."
"Any movement into a SaaS solution has challenges since the processes and data flows are not well defined. Hence, you need to build it at the same time."
"I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments."
"They could make their reporting a little better."
"Tenable Nessus could improve the reporting."
"Tenable Nessus could improve the price."
"We have had some false positives in the past, which we hope can improve in the future."
"The report for counters is too simple and would be improved by a dashboard."
"The reporting feature needs to be improved."
"The solution should be able to support more devices."
"The reporting is a bit cumbersome."
Tanium is ranked 18th in Vulnerability Management with 15 reviews while Tenable Nessus is ranked 3rd in Vulnerability Management with 75 reviews. Tanium is rated 7.4, while Tenable Nessus is rated 8.4. The top reviewer of Tanium writes "Useful tool for vulnerability management and deploying applications, needing improvement in its OS upgrade". On the other hand, the top reviewer of Tenable Nessus writes "Unlimited assets for one price and quick, agentless results". Tanium is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Microsoft Configuration Manager and Qualys VMDR, whereas Tenable Nessus is most compared with Qualys VMDR, Rapid7 InsightVM, Tenable Security Center, Tenable Vulnerability Management and Pentera. See our Tanium vs. Tenable Nessus report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.