Tenable Vulnerability Management Primary Use Case

SC
CSO at a manufacturing company with 1,001-5,000 employees

Considering regular use cases of the solution, we wanted to cover two things, external vulnerabilities and the ability to identify misconfigurations on the perimeter, like, let's say, if someone is open, something vulnerable to outside, we monitor it. The use case was monitoring the external parameter addresses with Tenable.io and seeing changes there. If something changes or if something becomes vulnerable, as it's seen from the outside, without actual credentials to scan, you know, like, we can have several layers of scans. So, Tenable.io, we used as seen outside without providing any credentials, So it

gives you the true picture of how and what the attackers can use. It might be that if we use it with the credentials, we won't find additional vulnerabilities, but we don't cover that because it's not important because external attackers will not see it, actually. So, it's the first use case, and generally, Tenable.io is used for identifying vulnerabilities in the company infrastructure, servers, endpoints, and additional hardware and software, like routers, switches, and whatever has an IP address. Let's say, not for IoT, just for IT infrastructure and development infrastructure, and that was the use case of Tenable.io.


View full review »
SN
Intake Specialist at Maxtec

I work for a company called Maxtec, and we are a distributor. One of the solutions that we used to distribute, not anymore, is Tenable. I've worked as the product manager for Tenable, and it is one of the products on which I've worked quite extensively. We stopped its distribution last year, and I stopped working with it at the beginning of 2022. We were using its latest version.

View full review »
Yogeswaran Neelagandan - PeerSpot reviewer
Key Account Manager at Uniware

We help clients with their overall cybersecurity assessment. Many start with free tools like Nessus, but eventually require more comprehensive solutions. We use Nessus and Tenable.io (formerly Nessus Professional) to scan environments and then convince clients of the value of a full Tenable.

View full review »
Buyer's Guide
Tenable Vulnerability Management
February 2024
Learn what your peers think about Tenable Vulnerability Management. Get advice and tips from experienced pros sharing their opinions. Updated: February 2024.
763,955 professionals have used our research since 2012.
VR
Security Analyst at a consultancy with 10,001+ employees

We use the solution for our vulnerability management program.

The solution is deployed in the cloud.

View full review »
MM
Security Manager at Yarix S.r.l.

In my company, we use Tenable.io Vulnerability Management is a good solution for vulnerability assessment on the infrastructure and not on the applications. The solution is useful for conducting vulnerability assessments on IT infrastructures. We use Tenable to discover assets on the network and the vulnerabilities in the vulnerability management cycle.

View full review »
MC
Security Specialist at a security firm with 51-200 employees

I primarily implement the solution for clients. It's mostly used for security purposes. 

View full review »
VS
Senior Information Security Engineer at a consultancy with 5,001-10,000 employees

Our company has 25 technicians who use the solution to scan firewalls and produce scheduled compliance reports for various environments.

View full review »
SP
IT Manager at a financial services firm with 1,001-5,000 employees

I was the manager of the vulnerability patching team in my company, and we would use it to go through everything, discover our network, find what vulnerabilities existed, and then use that for a work plan and assignments to decide who would fix what vulnerabilities.

View full review »
AdeelAgha - PeerSpot reviewer
Team Lead - Cyber Security & Compliance at Al Tuwairqi Group

We use Rapid7 InsightVM and Tenable.io Vulnerability Management for similar purposes: a vulnerability assessment. At present, Rapid7 InsightVM is running in our IT infrastructure, while Tenable.io is running in our ICS and OT security, which includes our plants, premises, systems, SCADA systems, and PLCs. We usually find more vulnerabilities in these legacy systems, such as Windows XP and Windows 7, than in Rapid7 InsightVM. However, the use cases for vulnerability assessment are the same.

View full review »
OniRahman - PeerSpot reviewer
Technical Consultant at a tech consulting company with 51-200 employees

Our primary use case for the solution is managing organizations with assets. Our on-premises assets are in the private or public cloud so the customer doesn't need to have the server installed and deployed but can touch and go once the license has a provision. The user can use it right away. 

View full review »
MC
Security Specialist at a security firm with 51-200 employees

We use Tenable.io for vulnerability scanning.

View full review »
HE
IT Manager at a government with 1,001-5,000 employees

We can scan manual stuff through Tenable.io. 

We have a great view to create desktops also in Tenable.io.

View full review »
DK
Security engineer at a construction company with 1,001-5,000 employees

We use the software to manage vulnerabilities in our environment.

View full review »
ZafarUddin - PeerSpot reviewer
Technical Lead Information Security at Australian OpCo Pty Ltd.

Before, they did not have an agent-based solution. Last year, they developed one. For example, before, when users were roaming or working from home, we wouldn't be able to scan previously. Now, we can cover anyone, even off-site. 

View full review »
AndréAndrade - PeerSpot reviewer
Senior Cyber Security Consultant at ATOS

We actually needed clarity on the vulnerabilities in our infrastructure. We used the solution to scan and make a report for us on what is vulnerable in our infrastructure and what is not, what we can improve and update, and what is good as it is.

View full review »
Yusuf-Hashmi - PeerSpot reviewer
Sr. Director - Group Head - IT Security (CISO) at Jubilant Organosys Ltd., India, Leading Chemical M

Vulnerability Management is used to discover assets and identify vulnerabilities across our IT landscape. 

View full review »
GK
IT support at Ganesh

We use Tenable.io Vulnerability Management for our organization's endpoint and server vulnerability management.

View full review »
Aaron Melendez - PeerSpot reviewer
Cybersecurity Analyst / Third-Party Risk Analyst at San Jacinto Community College

We use this solution to scan our network to try to identify all our assets. It is very good at finding all assets depending on how you program it.

View full review »
Venugopal Potumudi - PeerSpot reviewer
Senior Consultant at Tata Consultancy

The solution is mainly for vulnerability scanning management. It's more like an extension of the Nessus.

View full review »
CL
Cyber Security Associate at a consultancy with 10,001+ employees

I primarily use the solution in order to scan assets for our clients. 

View full review »
Faisal Mian - PeerSpot reviewer
CTO at ABM Info. tech

The product operates on a license-based model, where you purchase a license based on the number of IP addresses you intend to scan. For example, if you purchase a license for 50 IP addresses and your network has 200 users, it will only scan for those 50 IPs. You can gain visibility into all IPs within your environment, including subnets with a full license. Also, you can geographically segment your scanning targets based on the number of IPs allocated for each location.

View full review »
DS
Executive Director at Platview Technologies Limited

Our primary use case for this solution is to satisfy the requirement for vulnerability assessments regarding internal assets, CPI assets and web applications. We deploy the solution on private cloud.

View full review »
Iwegbue Godspower Isioma - PeerSpot reviewer
Cyber Security Analyst at Platview Technologies

The solution scans vulnerabilities in assets like workstations, network devices, desktops, or laptops. The product indicates vulnerabilities based on severity levels. There are high, critical, medium, low, and informational levels of severity.

View full review »
Prajot Nair - PeerSpot reviewer
Senior Manager -Cloud Security at Capgemini

Tenable.io Vulnerability Management is used as a unified platform for vulnerability management.

View full review »
YF
Information Security Manager at a international affairs institute with 10,001+ employees

We use the tool to find loopholes in the system.

View full review »
Amr Abdelnaser - PeerSpot reviewer
Senior Information Security Analyst at EastNets Holding Ltd.

We use the solution to scan our environment, ServicePRO. 

View full review »
Teodor Dumitru - PeerSpot reviewer
0 at PTC

Tenable.io Vulnerability Management is used to scan our infrastructure.

View full review »
Buyer's Guide
Tenable Vulnerability Management
February 2024
Learn what your peers think about Tenable Vulnerability Management. Get advice and tips from experienced pros sharing their opinions. Updated: February 2024.
763,955 professionals have used our research since 2012.