We performed a comparison between IBM Guardium Vulnerability Assessment and Tenable Vulnerability Management based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."The reporting features are good and there are many built-in reports that can be quickly configured."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"Tenable.io, in particular, is quite a powerful product. It looks at your traditional environment, which is pretty much anything that is on-premises, and it also goes a step ahead and covers your modern assets, which is anything that is currently sitting in the cloud. You get complete visibility of your entire environment and tech operation. The ability to give you visibility across the entire tech surface is one of the biggest advantages that Tenable.io has."
"The solution can integrate with third parties and meets standard compliance."
"The initial setup is not complex."
"It is very stable, and it is updated periodically by adding new vulnerabilities."
"The tool has an easy-to-use interface."
"The initial setup is straightforward so long as your infrastructure, components, and networks are in place."
"One of the most valuable features of Tenable.io Vulnerability Management is its exportability, which allows us to conduct risk assessments efficiently."
"You can customize each point in new scans."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"The solution’s pricing could be improved."
"The initial setup is complex and has room for improvement."
"The tool's reports are bad. They're not very customizable or flexible. During audits, we often have to exclude things that aren't relevant to our organization, but we can't do that easily with the reports. They come in HTML or PDF format, and we can't compare current results with previous ones in Excel because we never receive reports in Excel."
"It's not a user-friendly tool since it has a complicated interface."
"The solution seems to focus too much on enterprises, and they really need a product that works for SMBs."
"The solution must be promoted more in the market."
"The price could be lower."
"Tenable.io Vulnerability Management could be improved with an increased number of dashboards and MSSP integration."
More IBM Guardium Vulnerability Assessment Pricing and Cost Advice →
More Tenable Vulnerability Management Pricing and Cost Advice →
IBM Guardium Vulnerability Assessment is ranked 38th in Vulnerability Management with 3 reviews while Tenable Vulnerability Management is ranked 2nd in Vulnerability Management with 38 reviews. IBM Guardium Vulnerability Assessment is rated 6.6, while Tenable Vulnerability Management is rated 8.2. The top reviewer of IBM Guardium Vulnerability Assessment writes "Worthwhile from the regulatory requirements and analytics perspective, but is expensive and not easy to use". On the other hand, the top reviewer of Tenable Vulnerability Management writes "Discovers vulnerabilities and integrates well with other solutions". IBM Guardium Vulnerability Assessment is most compared with Tenable Nessus, Qualys VMDR, Acunetix, Rapid7 InsightVM and Orca Security, whereas Tenable Vulnerability Management is most compared with Tenable Security Center, Tenable Nessus, Qualys VMDR, Amazon Inspector and Microsoft Defender Vulnerability Management.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.