Compare Tenable SecurityCenter vs. Tripwire IP360

Tenable SecurityCenter is ranked 4th in Vulnerability Management with 6 reviews while Tripwire IP360 which is ranked 11th in Vulnerability Management with 1 review. Tenable SecurityCenter is rated 7.4, while Tripwire IP360 is rated 0. The top reviewer of Tenable SecurityCenter writes "Enables very customized policies to routinely scan, while simultaneously not causing impact". On the other hand, the top reviewer of Tripwire IP360 writes "A mature and evolving solution that has become the pinnacle point for anything that enters the network". Tenable SecurityCenter is most compared with Rapid7 InsightVM, Qualys VM and ForeScout CounterACT, whereas Tripwire IP360 is most compared with Tenable Nessus, Qualys Web Application Scanning and Acunetix Vulnerability Scanner.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Qualys, Skybox Security, Rapid7 and others in Vulnerability Management. Updated: July 2019.
361,263 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
One of the most valuable features is their distributed scan model for allotting engines to work together as a pool and handle multiple scans at once, across multiple environments. Automatic scanning distribution is a distinguishing feature of their toolset.What is useful to me is being able to fulfill very customized scanning policies. In the clinical environment, because of vendor control, we can't perform credential-vulnerability scanning. And network scans, which I've done before, can cause a lot of impact. Being able to create very customized policies to be able to routinely scan and audit our clinical networks, while simultaneously not causing impact, is important to us.I think that this is a good solution for evaluating vulnerability in the network.We really love the Security Center dashboard. It basically performs vulnerability scanning and then outputs a vulnerability data.The most valuable feature of the product is the Assurance Report Card, which gives us an overview of the security poster in just a simple glance.Initial setup was pretty straightforward.It basically reviews our threat landscape vulnerability.

Read more »

It's become the pinnacle point for anything that enters the network or anything that's passing through to production to first be affected by IP360, hardened, and up to standard. For our integrity management, one was deployed in the bank about two years ago and that's still going to expand the usage and the product itself. That will go hand in hand with training and expanding the product as for where it's deployed.

Read more »

Cons
It's good at creating information, it's good creating dashboards, it's good at creating reports, but if you want to take that reporting metadata and put it into another tool, that is a little bit lacking.If I want to have a very low-managed scan policy, it's a lot of work to create something which is very basic. If I use a tool like Nmap, all I have to do is download it, install it, type in the command, and it's good to go. In Security Center, I have to go through a lot of work to create a policy that's very basic.The web application scanning area can be improved.A good plugin editor would be a good additional option for the Security Center.In terms of configuration, there is some level of flexibility that we are not able to achieve.At times we have had the typical bugs.

Read more »

The reporting functions can use improvement. There is room for growth because reporting functions differ a lot depending on what you're going to output. It depends on whether it's for technical or senior management and how it's interpreted. There could be growth within the reporting functionality side.

Read more »

Pricing and Cost Advice
The pricing is more than Nexpose.The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.We're able to save because we don't have to employ more staff members to help wit ht he scheduling of the scans, running the reports or sending them out to the systems owners. That alone is a big ROI for us.It is slightly more expensive than other solutions in the same sphere.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
361,263 professionals have used our research since 2012.
Ranking
4th
Views
7,812
Comparisons
3,113
Reviews
6
Average Words per Review
1,076
Avg. Rating
7.3
11th
Views
2,072
Comparisons
550
Reviews
0
Average Words per Review
678
Avg. Rating
N/A
Top Comparisons
Compared 21% of the time.
Compared 46% of the time.
Also Known As
Tenable Unified SecurityIP360
Learn
Tenable Network Security
Tripwire
Overview

SecurityCenter consolidates and evaluates vulnerability data across the enterprise, prioritizing security risks and providing a clear view of your security posture. With SecurityCenter, get the visibility and context you need to effectively prioritize and remediate vulnerabilities, ensure compliance with IT security frameworks, standards and regulations, and take decisive action to ensure the effectiveness of your IT security program and reduce business risk.

Tripwire IP360 delivers risk-based vulnerability assessment and asset discovery capabilities. With IP360, you get:

  • Comprehensive discovery and profiling of all network assets.
  • Highly scalable architecture with low network impact.
  • Advanced vulnerability scoring that identifies top risks.
  • Prioritized change results when used with Tripwire Enterprise.
Offer
Learn more about Tenable SecurityCenter
Learn more about Tripwire IP360
Sample Customers
IBM, Sempra Energy, Microsoft, Apple, Adidas, Union PacificState of Iowa, State of Minnesota, U.S. Cellular
Find out what your peers are saying about Qualys, Skybox Security, Rapid7 and others in Vulnerability Management. Updated: July 2019.
361,263 professionals have used our research since 2012.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email