Tenable.io Vulnerability Management Alternatives and Competitors

Get our free report covering Tenable Network Security, Tenable Network Security, Rapid7, and other competitors of Tenable.io Vulnerability Management. Updated: June 2021.
512,711 professionals have used our research since 2012.

Read reviews of Tenable.io Vulnerability Management alternatives and competitors

TG
Program Manager at a tech services company with 201-500 employees
Real User
Top 10
Monitors our whole environment in real time and makes everything more secure

What is our primary use case?

At work we use the enterprise version of Tenable, Tenable.io, and I also use Tenable.sc — which I refer to as SecurityCenter — for local scanning. I use Tenable SecurityCenter every day to scan our entire environment for vulnerabilities. I use a local license during the discovery process for penetration testing. So I'll do an en masse scan, and then also do a scan with Tenable to scan for IPs and vulnerabilities. User-wise, with Tenable SecurityCenter, there's different roles. We have security analysts, admin, etc. I'd say there's probably four or five different roles from people that can just… more »

Pros and Cons

  • "The feature we've liked most recently was being able to take the YARA rules from FireEye and put them into Tenable's scan for the most recent SolarWinds exploit. That was really useful."
  • "I will say it's a lot slower compared to an MS scan. It takes so much longer, so the performance could definitely be worked on."

What other advice do I have?

I can easily recommend Tenable SecurityCenter, and I have nothing really bad to say about it. I think it's a great tool for what it does. I enjoy the webinars, and the people that run the company seem very engaged with what's going on when you're into current events and the overall security climate, and they're continuously looking to improve. I can't speak to every option that they have, but I have no reservations recommending them. I would rate Tenable SecurityCenter an eight out of ten.
JS
Director Of Information Technology at a government with 201-500 employees
Real User
Top 10
Good at identifying vulnerabilities but had issues with scans and endpoint accuracy

What is our primary use case?

The solution is primarily used for vulnerability management, specifically vulnerability scanning of the endpoint devices.

Pros and Cons

  • "The main functionality of identifying item endpoints that weren't properly patched or had vulnerabilities is the solution's most valuable feature."
  • "We found that after you passed an endpoint, it didn't always reflect it in the next scan. I'm not sure if it was a glitch or some issue with the product's software. That was never clear. That was always an issue and something that definitely needed improvement."

What other advice do I have?

The company I worked for was just a customer and I was just an end-user. There was no business relationship between the two companies that I was aware of. The company is considering moving from on-premises to the cloud. I am unsure of which version of the solution is being used currently. I'm no longer at the company where I used the product. While the solution worked well, I have never compared other solutions, so I don't know if it's best in class or not. I'd rate the solution six out of ten.
FF
IT Security Operations Analyst at a manufacturing company with 10,001+ employees
Real User
Top 20
Fast and easy to use, with good reporting and good support

What is our primary use case?

I have been using Tenable Nessus for my personal use. It works well. I am using this solution for testing.

Pros and Cons

  • "The most valuable features are that it's fast, it's easy to use and it provides good reports."
  • "Remediation needs improvement."

What other advice do I have?

For anyone who is interested in this solution, they should test the scan timing to see if it consumes a lot of time or not. Research the remediation information to see if it is okay, or trust proof or not. The reporting works well and it allows you to share. Also, support is important. I would rate Tenable Nesuss an eight out of ten.
SK
Information Security GRC Senior Consultant with 51-200 employees
Consultant
Good features for infrastructure application; lacking in integrations with other software

What is our primary use case?

We deal with server automation and end-point automation. Right now we're working with a very big client. We're partners with BMC and I'm an Information Security GRC Senior Consultant.

Pros and Cons

  • "Takes reports from other vulnerabilities."
  • "No third-party applications or integrations with additional software solutions."

What other advice do I have?

My advice would be that you should make sure you know the product you are using very well, and know your requirements. To know what is on your system and what you're looking for. I would rate this product a seven out of 10.
PW
Global Infrastructure Architect at a energy/utilities company with 5,001-10,000 employees
Real User
Top 10
Good technical support that is always there when you need them, but the prioritization of vulnerabilities needs to be improved

What is our primary use case?

We are currently using Qualys for vulnerability detection, as part of our security solution. We're moving towards Defender ATP because I am looking more at the Operational Technology (OT) side of things than I am at the Information Technology (IT) side.

Pros and Cons

  • "Technical support is great and we've never really had a problem."
  • "We are moving away from Qualys to Defender ATP because I find that Defender ATP is much better at prioritizing the vulnerabilities that I should be looking at."

What other advice do I have?

I would rate this solution a seven out of ten.
Get our free report covering Tenable Network Security, Tenable Network Security, Rapid7, and other competitors of Tenable.io Vulnerability Management. Updated: June 2021.
512,711 professionals have used our research since 2012.