We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Nowadays, your vulnerability applications are going to be kind of pricey because lots of them, including Rapid7, are based upon a base price, but then they add in the nodes. That's where they get you. If you're a big network, obviously, you need to scan everything. Therefore, it's going to be costly. The risk and insurance money associated with having ransomware on my networks is going to cost me more money, time, and marketing than the price of the tool. That's why I'm speaking only as an information security officer to security operations. This is the tool that is there in my toolbox to say whether we vulnerable or not. At this point, I don't care about how much it costs my company to have it because if I wasn't able to report it and we got ransomware, then who cares? I'm probably going to be out of business because it happened. That's why I don't care about the price. I have it, and I could use it effectively and do my report. At the end of the day, even if we get ransomware, as long as I reported it, followed my protocol, and put in the change, irrespective of whether it was ignored or denied, I did my job."
"We pay approximately $2,500 on a yearly basis."
"We have a subscription, the licensing fees are paid yearly, and I am using the latest version."
"We incurred a single cost for a perpetual license, although I cannot comment on the price as this is above my management level."
"The price is reasonable."
"In general, it is extremely expensive."
"The price of the solution is reasonable."
"One problem with Tenable is its pricing policy. Optimal results can be achieved with Greenbone Solutions which has much more friendly pricing policies."
Earn 20 points
The SecPoint Penetrator is a vulnerability scanning device that simulates how a hacker could penetrate a given system (hence the term) and reports vulnerabilities, which should then help strengthen security measures against online outlaws, virtual villains, cyber criminals, techno terrorists, and other nefarious elements of the Worldwide Web at large.
The SecPoint Penetrator is a vulnerability scanner, vulnerability management of great significance because it's actually capable of simulating cyber attacks against systems so that they are better prepared for anything a hacker might have under his sleeve, so to speak. In essence, the Penetrator will scan your device, network, or database to ensure that it is vulnerability-free.
To be more specific, vulnerabilities are the holes and coding flaws that hackers exploit so that they could wreak havoc on any supposedly secure website or domain. Their malware programs will likelier gain access to a given network if they could identify vulnerabilities that the network owner neglected to find. Therefore, the Penetrator is an essential reporting device that records in XML, HTML, and PDF all those minor-to-critical vulnerabilities before these online outlaws do.
Nessus Professional is the industry’s most widely deployed assessment solution for identifying the vulnerabilities, configuration issues, and malware that attackers use to penetrate your, or your customer's network. With the broadest coverage, the latest intelligence, rapid updates, and an easy-to-use interface, Nessus offers an effective and comprehensive vulnerability scanning package for one low cost.
SecPoint Penetrator Vulnerability Scanner is ranked 25th in Vulnerability Management while Tenable Nessus is ranked 1st in Vulnerability Management with 25 reviews. SecPoint Penetrator Vulnerability Scanner is rated 0.0, while Tenable Nessus is rated 8.4. On the other hand, the top reviewer of Tenable Nessus writes "Easy to use, good support, and gives full reports of what's vulnerable per device". SecPoint Penetrator Vulnerability Scanner is most compared with Microsoft Intune, Tenable SC, Qualys VM, Rapid7 InsightVM and Rapid7 Metasploit, whereas Tenable Nessus is most compared with Tenable.io Vulnerability Management, Rapid7 InsightVM, Qualys VM, Tenable SC and Rapid7 Metasploit.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.