BMC TrueSight Vulnerability Management OverviewUNIXBusinessApplication

BMC TrueSight Vulnerability Management is the #15 ranked solution in our list of top Vulnerability Management tools. It is most often compared to Tenable SC: BMC TrueSight Vulnerability Management vs Tenable SC

What is BMC TrueSight Vulnerability Management?

Helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

  • Powerful dashboards highlight vulnerability data, performance trends, and SLA compliance for quick prioritization of remediation tasks
  • Streamlined workflows combine scan verification and remediation tasks, leveraging BladeLogic Server Automation and Microsoft SCCM systems management
  • Blindspot awareness enables you to identify areas of your infrastructure which are not being monitored, leaving you exposed
  • Rapid import lets you quickly consume vulnerability scanning reports with native integration to Qualys, Tenable, and Rapid 7
  • Data export enables deep analysis and custom reports to help meet audit requirements and fuel process improvements

BMC TrueSight Vulnerability Management is also known as TrueSight Vulnerability Management, SecOps Response Service, BladeLogic Threat Director.

Buyer's Guide

Download the Vulnerability Management Buyer's Guide including reviews and more. Updated: September 2021

BMC TrueSight Vulnerability Management Customers

Online Business Systems

BMC TrueSight Vulnerability Management Video

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
SK
Information Security GRC Senior Consultant with 51-200 employees
Consultant
Good features for infrastructure application; lacking in integrations with other software

What is our primary use case?

We deal with server automation and end-point automation. Right now we're working with a very big client. We're partners with BMC and I'm an Information Security GRC Senior Consultant.

Pros and Cons

  • "Takes reports from other vulnerabilities."
  • "No third-party applications or integrations with additional software solutions."

What other advice do I have?

My advice would be that you should make sure you know the product you are using very well, and know your requirements. To know what is on your system and what you're looking for. I would rate this product a seven out of 10.