Vulnerability management streamlines decision-making and enhances security assessment
What is our primary use case?
My experience is with Tenable Vulnerability Management, specifically regarding vulnerability management.
My particular use case for Tenable Vulnerability Management is vulnerability management, benchmark scanning, and I'm somewhat familiar with their product line, utilizing the CIS benchmarks and DISA STIG benchmarks.
Tenable Vulnerability Management is the backbone of our vulnerability management and has affected my organization positively.
What is most valuable?
The best features of Tenable Vulnerability Management are flexibility, breadth and scope, and the fact that their current vulnerabilities come out, and they have tests for them within a day or two.
Operationally, Tenable Vulnerability Management finds issues that would otherwise be missed, but I don't have an ROI.
The impact of Tenable's analytic capabilities shows that our other programs are working in our prioritization process.
What needs improvement?
I don't think I have any additional features to add for improvement, as Tenable Vulnerability Management does a pretty good job of what it does.
My pain points would have been on the internal side of lining assets up to owners, and that's not something that Tenable Vulnerability Management can help me with.
I have no suggestions for where they could do better.
For how long have I used the solution?
I have one year of experience with Tenable Vulnerability Management.
What do I think about the stability of the solution?
Tenable Vulnerability Management is stable.
What do I think about the scalability of the solution?
Tenable Vulnerability Management's scalability is fantastic.
How are customer service and support?
I would evaluate Tenable Vulnerability Management's customer service and technical support as average.
I would rate them a seven on a scale from 1 to 10, with 10 being the best and 1 the worst.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have not personally used a different vulnerability management solution.
How was the initial setup?
The initial setup was pretty straightforward.
What about the implementation team?
I made it my own, and the initial setup was done by Address Block, which I tied to elements in the CMDB.
What was our ROI?
I wasn't party to the comparison or purchasing, so I'm not completely sure.
What's my experience with pricing, setup cost, and licensing?
I am unaware of the pricing, setup costs, or licensing details for Tenable Vulnerability Management.
Which other solutions did I evaluate?
I don't know why we switched to Tenable Vulnerability Management for vulnerability management, but my assumption is that it is the first solution they tried and we've been happy with it since.
What other advice do I have?
I have used Tenable Vulnerability Management's reporting features to a lesser degree.
The metrics I track for decision-making include what systems need upgrading, what software needs replacing, and whether or not we can hold off on things, accept some risks, and get other risks resolved.
They have cloud scanners that are effectively point and click, and although I'm not sure if it's an extra licensing, we also have an on-prem scanner, which is a virtual appliance that I can download and put in place.
The data that we pull from Tenable Vulnerability Management is the data that we drive and use for decision-making, although we don't use that visibility extensively. I don't utilize the real-time visibility with Tenable Vulnerability Management.
On a scale of 1-10, I rate Tenable Vulnerability Management a 9.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Limited coverage prompts search for better options while assessing system survivability
What is our primary use case?
We don't have a specific use case. My primary purpose for using Tenable is to conduct survivability tests, mainly to determine whether the system crashes, particularly when subjected to DOS attacks. I do not use it for more than that because, for other aspects, we have manual VAPT procedures in place.
What is most valuable?
Currently, I have only used Tenable for DOS attack-related purposes and thus, I am not fully acquainted with its other features. However, it provides survivability benefits. It helps me understand if the system is capable of withstanding certain levels of stress. Though it's not core technical security testing, it provides us with survivability insights.
What needs improvement?
I would suggest HP WebInspect as a better option than Tenable.io. My current client doesn't have access to it. However, from my experience, HPE WebInspect provides more extensive reports and detailed information about all findings. The count and type of findings are also more specific with HPE WebInspect. On the other hand, Tenable is not as deep or as comprehensive in covering vulnerability types. They could incorporate software composition analysis (SCA), which would be a beneficial addition. If they venture into the SaaS market, more thoughts can be shared. But currently, they are not.
For how long have I used the solution?
I have used the solution for around one and a half years.
What do I think about the stability of the solution?
The stability is commendable, and I would rate Tenable ten out of ten. I have no concerns.
How are customer service and support?
I do not have any contact with Tenable. I have been using it as a regular user.
How would you rate customer service and support?
How was the initial setup?
The setup process is quite simple.
What about the implementation team?
It was set up by someone else, and I am not aware of who did it. I am just utilizing it.
Which other solutions did I evaluate?
I would recommend HP WebInspect, having used it for around two and a half years. It offers both cloud and standalone versions, both of which are fantastic. It is applicable for both legacy applications and the latest applications in the market. HP WebInspect features extensive libraries and recursive methods to traverse everything, which I find really impressive.
What other advice do I have?
I would rate it four out of ten. For startups, freelancers, or companies between startup and midsize, Tenable is recommended. However, for midsize or enterprise-level companies, I would not prefer it. We use it because the client suggested it. Otherwise, my preferences might differ. The type of application matters, too. For new applications, such as those based on Node.js, Tenable could be a good option. However, for legacy technologies with complex databases, newer systems like Tenable are not recommended. If the budget allows, HP WebInspect is preferable. Budget considerations are as important as choosing the right technology. If limited by budget, Tenable is a viable option for new, growing companies, but not for enterprises. Overall, I rate the solution four out of ten.
Streamlines vulnerability management with excellent reporting and potential AI integration
What is our primary use case?
I use Tenable Vulnerability Management to scan the network, including servers and endpoints, to identify risks in our environment and provide mitigation and solutions. I also use it to assess our security posture through asset discovery and risk identification.
What is most valuable?
Tenable is user-friendly and excels in reporting. It allows me to easily fetch and schedule reports. The software's discovery feature aids in strengthening our security posture. The single-sensor installation process on various operating systems is smooth, unlike Rapid7, which requires different versions for separate systems. Furthermore, Tenable enables vulnerability management through potential AI integration that consolidates efforts and resolves multiple vulnerabilities simultaneously.
What needs improvement?
AI integration for reporting in Tenable would be beneficial. The response time of Tenable's customer support needs improvement. They should also accelerate the process of implementing new features upon request.
For how long have I used the solution?
I have used Tenable Vulnerability Management for almost six to eight years.
What do I think about the stability of the solution?
I have faced no stability issues with Tenable. In comparison, Rapid7 encountered challenges with data transfer to the cloud, requiring us to compress packets to manage network hiccups.
What do I think about the scalability of the solution?
Both Tenable and Rapid7 are cloud-based solutions, which ensures excellent scalability. They can seamlessly scale the number of endpoints from 100 to 1,000,000 in a day.
How are customer service and support?
Technical support from Tenable is rated six out of ten. It needs improvement in response time and addressing feature requests promptly. Other services like Rapid7 are more responsive.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I used Rapid7, which is less expensive than Tenable. My preference now aligns with Tenable due to its superior user-friendliness and reporting capabilities, although some issues persist with installation complexity in various environments.
How was the initial setup?
The setup experience for Tenable Vulnerability Management is rated nine out of ten, indicating that it is relatively easy.
What about the implementation team?
Implementation involves coordination with internal network teams due to environmental complexities.
What's my experience with pricing, setup cost, and licensing?
Tenable is costly, priced significantly higher than Rapid7. For instance, Tenable charges around $40 per device, while Rapid7 costs $10 to $15 per device.
Which other solutions did I evaluate?
I evaluated Rapid7 alongside Tenable. Although Tenable has a higher cost, its user-friendly interface and robust reporting made it a preferred choice.
What other advice do I have?
I recommend Tenable Vulnerability Management for its comprehensive security capabilities and effective risk identification. However, potential users should be prepared for the higher expense compared to alternatives like Rapid7.
My rating is eight out of ten, mainly due to the support aspect needing improvement.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Incomparable with any other vulnerability management tool
What do you like best about the product?
Tenable Vulnerability Management not only identifies issues, but also helps teams prioritize the most critical vulnerabilities, optimizing time and resources while strengthening the organization's security posture.
What do you dislike about the product?
Tenable Vulnerability Management is a robust solution, but the cost, dependency on connectivity, and challenges in larger networks can be points to consider before adoption, especially for smaller organizations or those with limited resources.
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management offers me a proactive approach to identify, prioritize, and manage vulnerabilities, optimizing security and ensuring that threats are addressed before causing problems.
Good vulnerability management
What do you like best about the product?
Fast plugin updates for detecting new vulnerabilities in the environment. You can scan devices through an agent, with credentials or without. Useful for printers, and network equipment to see your full exposure.
What do you dislike about the product?
At times agents fail their agent update, lose their connection, then dropped from the system. Some times the remediation information is lacking leaving you unsure how to correct non-standard vulnerabilities.
Support has not been good from our account manager to those higher up. I had issues with our VAR not receiving the renewal notification and services were shut off. It took them nearly 3 weeks to figure out their backend to restore services.
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management provides a complete platform to identify vulnerabilities with guidance on remediation. Reporting is highly customizable to receive the data you are looking for at a scheduled frequency.
Tenable Vulnerability Management Review
What do you like best about the product?
Pros:
Intuitive, user-friendly interface
Accurate and comprehensive asset discovery
Strong risk-based prioritization
Automated, continuous scanning
Flexible reporting and robust integration capabilities
What do you dislike about the product?
Cons:
Can be costly for smaller businesses
May require a learning curve for new users
Some users report longer scan times for larger environments
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management (formerly Tenable.io) offers an effective solution for identifying, managing, and mitigating security vulnerabilities across various assets within an organization. Its user-friendly interface and comprehensive dashboard allow IT teams to monitor vulnerabilities with clear visual insights, making it ideal for organizations looking to improve their cybersecurity posture proactively.
Efficient risk management enhances asset visibility and security
What is our primary use case?
I use it to scan assets to evaluate vulnerabilities, define the risk, and create a resolution process for vulnerability management.
How has it helped my organization?
It has greatly impacted us by providing asset visibility, allowing us to know which assets have higher vulnerabilities and to calculate the risk for them.
The return on investments is adequate since we need this vulnerability management, and without Tenable, visibility was not possible. It saved us time and improved our security.
What is most valuable?
The most useful feature in managing vulnerabilities is risk management.
What needs improvement?
It needs additional reporting and intelligence features, as well as enhancements in AI-driven detection, which is still in its early stages.
For how long have I used the solution?
I have been working with Tenable Vulnerability Management for six years.
How are customer service and support?
The technical support is fast and efficient, and I am satisfied with it. I would rate their support nine out of ten.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I worked with Qualys before Tenable. I find Tenable to be better due to its broader system coverage, better efficiency on discovery, and better capabilities of analysis.
How was the initial setup?
If you have knowledge of networking and security, the initial setup is easy. If you don't, it can be difficult and you might make dangerous mistakes.
What was our ROI?
The return of investments is good enough as vulnerability management is crucial for us.
What's my experience with pricing, setup cost, and licensing?
The pricing is expensive, and the cost depends on the number of assets. However, the cost is not the most important thing due to the value it provides.
Which other solutions did I evaluate?
I evaluated Qualys before using Tenable.
What other advice do I have?
Small companies might find it difficult because of the knowledge required to drive vulnerability management successfully. If you lack that knowledge, you should contract the service.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Great interface and plugins w/ only minor issues
What do you like best about the product?
The easy to use interface makes exploring known and discovered vulnerabilities fairly painless. The fact that the solution to exploits is listed right next to the vulnerability overview, it makes remediation a lot easier.
The number of plugins covers a wide variety of systems and possible exploits.
SAML / SCIM integration is another plus and was fairly easy to setup.
Implementation of scanning via its Nessus agents was a breeze.
What do you dislike about the product?
The plugin manager could use some work. There are often several plugins that do the same thing or just plugins that do not provide the functionality that they claim.
Additionally, some of the exploits that are not exploitable and can cause false positives. For example if I have a HTTPS exploit on a version of a router / switches firmware, but HTTPS management is turned off and only SSH management is used, then that exploit does not need to be listed as high.
What problems is the product solving and how is that benefiting you?
Provides vulnerability insights for servers and user endpoints with a fairly lightweight agent.
The ability to do very targeted scans of specific vulnerabilities throughout an organizaiton or on just one specific machine is very helpful.
Tenable Vulnerability Management
What do you like best about the product?
Tenable Vulnerability Management makes it easy to keep vulnerabilities organised and easily reference how to remediate them.
What do you dislike about the product?
The feature rich solution does not lend itself to many short comings.
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management helps to bring any security shortcomings to light and suggests how to remediate them.
Best Cybersecurity Vulnerability Management Tool
What do you like best about the product?
I have been using this tool for a Long time and they were developing new features like vulnerability intelligence which helps us make a successful vulnerability management program. Integration with ServiceNow helps us in getting the results better.
What do you dislike about the product?
The support team should give a proper response. This needs to be improved.
What problems is the product solving and how is that benefiting you?
Earlier we faced so many issues with other products and Tenable helped here by getting better Vulnerability program arranged to us.