I use it to scan assets to evaluate vulnerabilities, define the risk, and create a resolution process for vulnerability management.

Tenable Vulnerability Management
Tenable, Inc.External reviews
External reviews are not included in the AWS star rating for the product.
Tenable Vulnerability Management Review
Intuitive, user-friendly interface
Accurate and comprehensive asset discovery
Strong risk-based prioritization
Automated, continuous scanning
Flexible reporting and robust integration capabilities
Can be costly for smaller businesses
May require a learning curve for new users
Some users report longer scan times for larger environments
Efficient risk management enhances asset visibility and security
What is our primary use case?
How has it helped my organization?
It has greatly impacted us by providing asset visibility, allowing us to know which assets have higher vulnerabilities and to calculate the risk for them.
The return on investments is adequate since we need this vulnerability management, and without Tenable, visibility was not possible. It saved us time and improved our security.
What is most valuable?
The most useful feature in managing vulnerabilities is risk management.
What needs improvement?
It needs additional reporting and intelligence features, as well as enhancements in AI-driven detection, which is still in its early stages.
For how long have I used the solution?
I have been working with Tenable Vulnerability Management for six years.
How are customer service and support?
The technical support is fast and efficient, and I am satisfied with it. I would rate their support nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I worked with Qualys before Tenable. I find Tenable to be better due to its broader system coverage, better efficiency on discovery, and better capabilities of analysis.
How was the initial setup?
If you have knowledge of networking and security, the initial setup is easy. If you don't, it can be difficult and you might make dangerous mistakes.
What was our ROI?
The return of investments is good enough as vulnerability management is crucial for us.
What's my experience with pricing, setup cost, and licensing?
The pricing is expensive, and the cost depends on the number of assets. However, the cost is not the most important thing due to the value it provides.
Which other solutions did I evaluate?
I evaluated Qualys before using Tenable.
What other advice do I have?
Small companies might find it difficult because of the knowledge required to drive vulnerability management successfully. If you lack that knowledge, you should contract the service.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Great interface and plugins w/ only minor issues
The number of plugins covers a wide variety of systems and possible exploits.
SAML / SCIM integration is another plus and was fairly easy to setup.
Implementation of scanning via its Nessus agents was a breeze.
Additionally, some of the exploits that are not exploitable and can cause false positives. For example if I have a HTTPS exploit on a version of a router / switches firmware, but HTTPS management is turned off and only SSH management is used, then that exploit does not need to be listed as high.
The ability to do very targeted scans of specific vulnerabilities throughout an organizaiton or on just one specific machine is very helpful.
Tenable Vulnerability Management
Best Cybersecurity Vulnerability Management Tool
Product overview
Tenable Vulnerability Management - Vulnerability Scans
A baseline for cyber security
Assesses vulnerabilities and finds anomalies and has an easy-to-use interface
What is our primary use case?
The solution is used for the vulnerability assessment of the network infrastructure.
What is most valuable?
The solution finds vulnerabilities, anomalies, and threats. Tenable has basic and ad hoc scanning features. The tool schedules scans for continuous monitoring. The main advantage of the solution is that it assesses the vulnerabilities and provides a CVE score. Reporting is very easy. The management dashboard is very easy. The tool has an easy-to-use interface. It is easy to implement the product.
What needs improvement?
The product is a bit expensive.
For how long have I used the solution?
I have been using the solution for 7 years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable up to a certain point. I rate the scalability a seven to eight out of ten. Our customers are medium to large businesses.
How are customer service and support?
The support is very good.
How would you rate customer service and support?
Positive
How was the initial setup?
The configuration is easy. My engineers can work on it seamlessly. The deployment of the basic solution does not take more than four to eight hours. We need one or two persons to deploy and maintain the product. There are no other challenges if we have the network and can access the IPs.
What was our ROI?
The product impacts our client's operational cost related to vulnerability management in a good way. It automates a few things and saves the engineers' costs.
What's my experience with pricing, setup cost, and licensing?
I rate the pricing a seven out of ten.
What other advice do I have?
We are resellers. The solution is easy to implement. It has an easy-to-use interface, enabling organizations to go faster to market. Overall, I rate the product a nine out of ten.
Useful for penetration testing but reporting functionality needs improvement
What needs improvement?
The tool's reports are bad. They're not very customizable or flexible. During audits, we often have to exclude things that aren't relevant to our organization, but we can't do that easily with the reports. They come in HTML or PDF format, and we can't compare current results with previous ones in Excel because we never receive reports in Excel.
For how long have I used the solution?
I have been using the product for a year, and my organization has been using it for six to seven years.
What do I think about the stability of the solution?
Tenable Vulnerability Management is stable.
What do I think about the scalability of the solution?
I rate the tool's scalability a seven out of ten.
How are customer service and support?
The solution's support is okay, but it could be more customer-friendly. The people providing support have knowledge, but they could improve customer interaction.
How was the initial setup?
The tool's deployment can be challenging, especially for those unfamiliar with Kali Linux, as it operates on this platform. This might make the setup process difficult for users accustomed to other operating systems like Windows. It may take a couple of tries to get comfortable with the process. However, once you have set it up a few times, it becomes easier.
What other advice do I have?
Sometimes, we use the tool for tasks like configuration and running scans. However, it's a bit difficult to use compared to Qualys. One issue we've noticed is that it takes up a lot of space, which customers often complain about. They promised more system coverage and updates, but it isn't happening.
I rate Tenable Vulnerability Management a seven out of ten. It might be challenging if you're used to working on Windows. However, it's a recommended tool for penetration testers because it's effective for that purpose.
We use it for audit and PT.