Tenable SecurityCenter Continuous View Overview

Tenable SecurityCenter Continuous View is the #35 ranked solution in our list of best Network Monitoring Tools. It is most often compared to Cisco Stealthwatch: Tenable SecurityCenter Continuous View vs Cisco Stealthwatch

What is Tenable SecurityCenter Continuous View?

SecurityCenter Continuous View is the market-leading continuous network monitoring platform. It integrates SecurityCenter along with multiple Nessus Network Monitor sensors and Log Correlation Engine (LCE) to provide comprehensive continuous network monitoring.

Tenable SecurityCenter Continuous View is also known as SecurityCenter Continuous View, SecurityCenter CV.

Tenable SecurityCenter Continuous View Buyer's Guide

Download the Tenable SecurityCenter Continuous View Buyer's Guide including reviews and more. Updated: January 2021

Tenable SecurityCenter Continuous View Customers

Methodist Healthcare Ministries

Tenable SecurityCenter Continuous View Video

Pricing Advice

What users are saying about Tenable SecurityCenter Continuous View pricing:
  • "We did a three-year deal where the cost is amortized over the three years. The Elite Support was an additional cost to the standard licensing fees... If you use Security Center, most of the time it is on-premise, so you're going to have some sort of infrastructure to build out and there's going to be a cost associated with that."

Tenable SecurityCenter Continuous View Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Director0e2b
Director - Information Risk Management at a consultancy with 1,001-5,000 employees
Real User
Jun 10, 2019
Provides the best network-based vulnerability scanning, but the dynamic scanning is lackluster

What is our primary use case?

We have three or four use cases. The first is enterprise vulnerability management through continuous scanning. Twice a week, every week, we fully authenticate every host in the environment to perform authenticated scans. The caveat there is our mobile workstations, like our Macs or our Windows laptops. We've deployed agents on them and we do those scans daily. The second use case is baseline adherence. We have tailored, customized, secure baselines for about 40 technologies in the environment and we attest to them once a week: everything from common server versions, to a dozen or more database… more »

Pros and Cons

  • "The first of the valuable features is how easy it is to access all of the information that's gathered from the assessments... With a lot of other technologies, like Rapid7, if you're using Nexpose you effectively have to be a DBA to get some of the lower-level results from the scans. And Qualys wasn't very intuitive."
  • "The next big one is supportability. In a large enterprise, we have many types of technologies. The technology we previously had didn't even support authentication to a lot of those technologies."
  • "When it comes to... dynamic application scanning, I think they are lagging behind the curve. They have a lackluster solution, to the point where I think they need to determine, as a company, whether or not that's a space they even want to play in."

What other advice do I have?

My advice isn't vendor-specific, it's much more agnostic. Whoever is looking for a new solution for vulnerability management or configuration management, needs to ensure that they take their time. Develop a strong RFP process that's objective and quantitative and removes bias. Then, perform a well-thought-out PoC and let the data speak for itself. For me, it's extremely important that when you're planning on spending millions of dollars, or making a large purchase, that you remove any emotion or bias. You take the relationships out of the picture, and you let the best product win, given a…
Eric Noe
Senior Information Technology Security Engineer at a insurance company with 10,001+ employees
Real User
Top 20
Jun 10, 2019
Enables us to find vulnerabilities and maintain PCI compliance

What is our primary use case?

We use it for scanning across our network. We leverage the Nessus scanners to scan the environments we have. That includes the external view, scanning across our DMZ, PCI, and internal environments. We have our Windows and Linux clients and servers. We have IP enabled on almost everything, including the printers, cameras, and elevator banks. It does some analysis on anything that's plugged into the network, with varying degrees of efficiency based on what the device is. We do full IP-import scans periodically. When we do the actual scans themselves they're usually more narrowed and focused… more »

Pros and Cons

  • "The scanning itself is really the core of the tool, and it's what we're most interested in."
  • "There are certain circumstances where they may have found a vulnerable service and they just removed the service completely from the device because nobody was using it. There's no way to go into SecurityCenter and mark it, to say, "This is no longer an issue. It doesn't exist anymore." Or, "The risk was accepted for one year, so let's not report it as 'high' until that one year period is done." The handling of operational flow around vulnerability management could be improved."

What other advice do I have?

The fundamentals are the most important part. Make sure you can access and scan all the different parts of your network with the correct authenticated scans. That is what is most important. Everything else derives from that base data, so you have to make sure that's in place and organized correctly. In terms of vulnerability prioritization, a lot of it is based on the CVSS score. We're just starting to look into the VPR feature and see how well we agree with that. The way we have it, within our architecture, is that SecurityCenter will run the scans, and then we export the scanned results into…
Product Categories
Network Monitoring Software
Buyer's Guide
Download our free Network Monitoring Software Report and find out what your peers are saying about Tenable Network Security, LogRhythm, ManageEngine, and more!