Tenable SC Valuable Features

reviewer1230882
Sr. Principal IT Architect at a manufacturing company with 10,001+ employees
The continuous monitoring piece has been very valuable to us. The vulnerability priority setting in the software has been very useful to us as it allows us to focus on what's most important. We use it as a piece of our holistic look into our security stance. The predictive prioritization features are pretty good. They do a lot of research and we trust the research that they do internally. They have knowledge of what's going on with many companies, where we only get a view into what's going on here. So the ability to get best practices out of them as part of this solution, is valuable to us. The Vulnerability Priority Rating is also pretty good. It's a much more holistic view, instead of being very binary, which we tend to see. It lets us focus on what's most important to us, especially because it goes across many products that we have. It's good in that we see how each of these stacks up and where our priorities should be. Should they be in Cisco, should they be in Microsoft, should they be in Linux? That's very useful to us as well. We'd love to do all the work right now, but we have to pick some type of priority in terms of what we're going to focus on, before we focus on the less vulnerable items. View full review »
Joey Smith
Medical Device Cybersecurity Analyst at a healthcare company with 10,001+ employees
What is useful to me is being able to fulfill very customized scanning policies. In the clinical environment, because of vendor control, we can't perform credential-vulnerability scanning. And network scans, which I've done before, can cause a lot of impact. Being able to create very customized policies to be able to routinely scan and audit our clinical networks, while simultaneously not causing impact, is important to us. That requires a lot of flexibility in how we create the policies, so flexibility in policy-creation is a big feature. For me, another useful feature of the tool is the dashboard and reporting. That is a big piece for me. The reporting covers most of my needs. In terms of integrations, so far, from what we've seen and for what we're trying to accomplish, it's been pretty flexible. The Vulnerability Priority Rating is useful. I run scans on all of our medical equipment and we have stuff that's still Windows 2000. Equipment is so expensive to upgrade and replace. I find a lot of it shows up red for vulnerabilities that we really can't do anything about. The predictive stuff helps prioritize some of those risks. At a high level, it helps narrow that scope. There is still a lot of manual work on my end because, as I mentioned, I really have to know what equipment I'm looking at exactly from a medical standpoint. But it does help narrow the scope. View full review »
Justin Kolker
IT Security Specialist at a consultancy with 1,001-5,000 employees
One of the most valuable features is their distributed scan model for allotting engines to work together as a pool and handle multiple scans at once, across multiple environments. Automatic scanning distribution is a distinguishing feature of their toolset. Also, the ability to trend data back as far back as we have disk space for, is helpful. Finally, the ability to write custom audit files is a really helpful and useful feature. That's something that not a lot of assessment companies have gotten right. There's room for improvement, but literally being able to take the text file, open it up, and adjust the changes, write your own regex and write your own checks, is huge. View full review »
Find out what your peers are saying about Tenable Network Security, Qualys, Rapid7 and others in Vulnerability Management. Updated: March 2020.
408,726 professionals have used our research since 2012.
Beej
Information Security Expert at a comms service provider with 5,001-10,000 employees
We really love the Security Center dashboard. It performs vulnerability scanning and then outputs vulnerability data. When you are working with one, two, three, up to 10 IT pieces of equipment, managing the vulnerability data would just be fine, but when you are managing assets across an organization of 10,000+ employees, you have a really hard time normalizing those vulnerability data. The dashboard helps us out to map what things need to be prioritized, what is our current threat landscape and what would be the latest threats that we have in our network. View full review »
Abill Nerry
Senior Manager, IT Security at a financial services firm with 5,001-10,000 employees
One valuable feature is the Assurance Report Card. with the Assurance Report Card, we are able to give our overview about security posters in just a glance. And with a report to cut this we can quickly, our executives can quickly consume that without going into the difficulties of the vulnerability issue. View full review »
Carl Vancil
Network Security Analyst at Arkansas Department of Finance and Administration
The 'raw syslog' search functions are fairly nice for tracking down debug info from an event, but it's usefulness is extremely low when compared with ArcSight in terms of its usefulness in network event investigations. SecurityCenter's strongest focus seems to be its vulnerability scanning, but I'm told I should be able to use it to replace ArcSight, and from experience with both products, I know that's not the case. To be honest, if my mission were more aligned with our other team's goals, I might like SecurityCenter a lot more than I do; but as is, it's like trying to fit a square peg into a round hole. View full review »
SeniorIn3d86
Senior Information Security Analyst at a financial services firm with 1,001-5,000 employees
The most valuable feature is its ability to scan for vulnerabilities in our important systems, networks devices, and so on. View full review »
Manoj Nair
Tech Specialist at select softwares
The dashboard and the templates used to delvelop reports are awesome. It is easy to run, scan, and categorize an asset as and when needed. The same asset can be present in two or more groups based on the identification. This solution can now be deployed in cloud setups. This solution provides a good reporting system and with a reasonably good level of third-party integration. McAfee has leveraged this capability beautifully in its Policy Orchestrator. View full review »
reviewer1317705
IT Consultant - Microsoft Design and Implementation at a tech services company with 1,001-5,000 employees
The scans are the most valuable aspect of this solution. The reporting isn't so good but I use scans the most. The reporting needs a lot of work on the template. View full review »
Find out what your peers are saying about Tenable Network Security, Qualys, Rapid7 and others in Vulnerability Management. Updated: March 2020.
408,726 professionals have used our research since 2012.