Most Helpful Review
Use IBM Guardium Vulnerability Assessment? Share your opinion.
Researched IBM Guardium Vulnerability Assessment but chose Tenable Nessus: Saves me significant time when putting together reports for compliance agencies
Find out what your peers are saying about IBM Guardium Vulnerability Assessment vs. Tenable Nessus and other solutions. Updated: July 2020.
426,772 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The scalability is good. The scalability is more than good because it can operate both as a standalone and it can be integrated as part of applications. So that really makes it a very, very versatile solution to have.
For us, the most valuable aspect of the solution is the log-sequence feature.
It can operate both as a standalone and it can be integrated with other applications, which makes it a very versatile solution to have.
Our developers can run the attacks directly from their environments, desktops.
The vulnerability scanning option for analyzing the security loopholes on the websites is the most valuable feature of this solution.
The automated approach to these repetitive discovery attempts would take days to do manually and therefore it helps reduce the time needed to do an assessment.
Their technical support has been very active. If I have an issue, I can reach out to them and get an answer pretty quick.
We are able to create a report which shows the PCI DSS scoring and share it with the application teams. Then, they can correlate and see exactly what they need to fix, and why.
The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered.
The reporting features are good and there are many built-in reports that can be quickly configured.
Nessus gives me a good preview of vulnerabilities and good suggestions for remediation. It's easy to find a description of a given vulnerability and solutions for it.
The most valuable feature is how it scanned and detected through its database to let us know exactly what fixes we needed to put in place for the vulnerabilities. It detects and it also gives you the way to fix it.
Among the most valuable features are scanning for vulnerabilities and the reporting. The reporting templates are okay. I like that I can see all the hosts with different vulnerabilities.
The most valuable feature is the breadth of vulnerabilities that it finds. It's able to find across a lot of different platforms and operating systems. It's also able to combine local testing with network-based testing.
Nessus is good at finding out what nodes you have in place. It will then provide you a report, by node, of what the vulnerabilities are. It does it quickly and stealthfully.
It also has an executive report where you don't have to provide the client all the detail for them to sift though. But if they wish to dig through the detail they can.
The solution is very stable.
I find the features that are most valuable are the policies that help us identify the vulnerabilities. These policies are then used for scanning instabilities and then identifying the particular vulnerabilities.
We want to see how much bandwidth usage it consumes. When we monitor traffic we have issues with the consumption and throttling of the traffic.
The solution limits the number of scans. It would be much better if we could have unlimited scans.
When monitoring the traffic we always have issues with the bandwidth consumption and the throttling of traffic.
Tools that would allow us to work more efficiently with the mobile environment, with Android and iOS.
In terms of what needs improvement, the way the licensing model is currently is not very convenient for us because initially, when we bought it, the licensing model was very flexible, but now it restricts us.
It would be nice to have a feature to "retest" only a single vulnerability that the customer reports as patched, and delete it from the next scans since it has already been patched.
You can't actually change your password after you've set it unless you go back into the administration account and you change it there. Thus, if you're locked out and don't remember your password, that's a thing.
We have had issues during upgrades where their scans worked on some apps better with previous versions. Then, we had to work with their tech support, who were great, to get it fixed for the next version.
The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster.
Building policies is not that easy. There are some things that are turned off by default, for example, displaying values.
One area that has room for improvement is the reporting. I'm preparing reports for Windows and Linux machines, etc. Currently, I'm collecting three or four reports and turning them into one report. I don't know if it is possible to combine all of them in one report, but that would be helpful.
There is room, overall, for improvement in the way it groups the workstations and the way it detects, when the vulnerability is scanned. Even when we would run a new scan, if it was an already existing vulnerability, it wouldn't put a new date on it.
We use credentialed scans. They need more permissions and more changes or settings on Windows and Linux.
There is room for improvement in finishing the transition to the cloud. We'd like to see them keep on improving the Tenable.io product, so that we can migrate to it entirely, instead of having to keep the Tenable.sc on-prem product.
One area with room for improvement is instead of there just being a PDF format for output, I'd like the option of an Excel spreadsheet, whereby I could better track remediation efforts and provide reporting off of that.
I would like to see an improvement in the ranking of high, medium and low vulnerability.
We have had some false positives in the past, which we hope can improve in the future.
This is still a maturing product. Tenable is only a scanner for one ability, while other solutions like Rapid7 have more tools for verification. We still have to manually verify to see if the vulnerability is a false positive or not.
Pricing and Cost Advice
The costs aren't very expensive. It costs around $3000 or $4000.
All things considered, I think it has a good price/value ratio.
The pricing and licensing are reasonable to a point. In order to run multiple scans at a time, we are going to have to purchase a 100 count license, which is an overkill. Though, compared to what we were paying for, the cost seems reasonable.
When we looked at all other vendors and what they were asking for, to provide a third of what Acunetix was capable of doing, it was an easy decision... But now that it's coming to a cost where it's line with market value, it becomes more of a competition... Acunetix is raising the cost of licensing. It's 3.5 times what we were initially quoted.
Acunetix was around the same price as all the other vendors we looked at, nothing special.
Information Not Available
I think the price is fairly affordable. It provides a license that is fair.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
The pricing is much more manageable versus other products.
Compared 25% of the time.
Compared 10% of the time.
Compared 10% of the time.
Compared 7% of the time.
Compared 7% of the time.
Compared 45% of the time.
Compared 22% of the time.
Compared 21% of the time.
Compared 20% of the time.
Compared 12% of the time.
Compared 0% of the time.
Also Known As
|Acunetix||IBM||Tenable Network Security|
Acunetix Web Vulnerability Scanner is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross site scripting, and other exploitable vulnerabilities.
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges.
Nessus Professional is the industry’s most widely deployed assessment solution for identifying the vulnerabilities, configuration issues, and malware that attackers use to penetrate your, or your customer's network. With the broadest coverage, the latest intelligence, rapid updates, and an easy-to-use interface, Nessus offers an effective and comprehensive vulnerability scanning package for one low cost.
Learn more about Acunetix Vulnerability Scanner
Learn more about IBM Guardium Vulnerability Assessment
Learn more about Tenable Nessus
|Joomla!, Digicure, Team Random, Credit Suisse, Samsung, Air New Zealand|
Information Not Available
|Bitbrains, Tesla, Just Eat, Crosskey Banking Solutions, Covenant Health, Youngstown State University|
Financial Services Firm38%
Comms Service Provider13%
Software R&D Company43%
Comms Service Provider12%
No Data Available
Comms Service Provider11%
Software R&D Company34%
Comms Service Provider15%
See our list of best Vulnerability Management vendors.