
Overview
Tenable Vulnerability Management provides the most comprehensive vulnerability coverage in the industry, detection accuracy, and zero-day vulnerability disclosures with the ability to predict which security issues to remediate first. Tenable has built-in compliance profiles, reporting and remediations, and risk-based scoring you can use to prioritize the risk that poses the greatest threat to your business. Quickly detect and respond to security issues as new vulnerabilities are disclosed and as your AWS environment changes.
The Tenable portfolio includes pillars of an exposure management program - vulnerability management, cloud security, and more. To best support your hybrid environment, consider including Tenable Cloud Security, which provides unified vulnerability and cloud security posture management for hybrid environments. In addition, agentless assessment enables you to continuously discover and assess EC2 instances for vulnerabilities in AWS without ever having to configure a scan, manage credentials or install agents.
For Tenable Vulnerability Management orders greater than 250 assets or orders for other products, contact us for an AWS Private Offer at: aws-tackle@tenable.com
Highlights
- See Everything - With coverage for more than 76K vulnerabilities and 186k plugins, Tenable has the industry's most extensive CVE and security configuration support to help you understand all of your vulnerabilities.
- Maximize ROI - Eliminate double or triple counting of assets that have multiple IP addresses with the industry's first asset-based elastic licensing model.
- Gain continuous visibility - Continuously assess the cloud as new assets are discovered or as new vulnerabilities are disclosed. No need to update plugin feeds.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/12 months | Cost savings % |
|---|---|---|---|
100 Assets | 100 Asset Bundle, 5 bundle maximum purchase | $3,500.00 | 0% |
Onboard Bundle | 100 assets + Quickstart (Use "50 Assets" for add'l seats) | $6,500.00 | 0% |
Deploy Bundle | 100 Assets + Training/Quickstart (Use "50 Assets" for add'l seats) | $8,500.00 | 0% |
SERV-NES-EXP-DOM | Nessus Expert Additional Domains & FQDNs | $760.00 | 0% |
Tenable SaaS Product | Tenable Product(s) as configured on the referenced Tenable Quote | $100,000,000.00 | 86% |
Vendor refund policy
All fees are non-cancellable and non-refundable except as required by law.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
Tenable.io Activation: https://static.tenable.com/documentation/Tenable.io_Activation_Help.pdf Tenable.io Tenable.io Documentation: https://docs.tenable.com/TenableIO.htm Tenable Knowledge base: https://community.tenable.com/s/topiccatalog Tenable offers 24x7x365 support for its customers via chat, email, and phone. Customers can login to community.tenable.com with their Support account to create cases and chat with us, or call 1-855-267-7044 with their customer ID number. Documentation can be found at both our community portal and
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.


Standard contract
Customer reviews
Quarterly automated scans have strengthened our global security posture and guided faster remediation
What is our primary use case?
I think we use Tenable Vulnerability Management primarily for our internal use. We are not a reseller; we are a customer.
We have a set of IPs across the globe, and we conduct this scan once a quarter of all the IPs combined. This scanner has updated information with respect to vulnerabilities that exist in the open. We perform vulnerability scans of all the IPs in order to ensure that no vulnerability exists in our environment, infrastructure, or network. We run vulnerability scans which are automated in nature and scheduled over the weekend to make sure that all the IPs are up to date. Once in a quarter, all IPs are scanned and a vulnerability report is generated. This report tells us whether there are low, medium, or high critical vulnerabilities that exist. We have a remediation plan for the high, medium, and low vulnerabilities in terms of the amount of time that we should be taking in order to patch these vulnerabilities. This tool keeps our information security posture high. We also carry out aging analysis because there are some vulnerabilities that cannot be patched due to dependencies. We actively carry out aging analysis in order to see if there are some vulnerabilities that are still in the system for more than one month or two months, and what the reason is. We actively work with all of the business teams and the IT setup within our system is quite regimented in order to run the scans once in a quarter for all the IPs.
What is most valuable?
I think their automated vulnerability scan and the scanning engine of Tenable Vulnerability Management are valuable. There are agents that you can deploy, and you can run the scans on those IPs on an automated basis. The automated scanning feature is probably the most important. They also have a good remediation workflow which can be integrated with your own internal workflow. You can do automated tracking of closure of the vulnerabilities. The ease of use, the automated scanning facility, and their good support mechanism are all valuable. If you were to get stuck somewhere, they can readily make their customer service or technical teams available to take care of our needs. Automated vulnerability scanning is the feature which makes life a little easier.
What needs improvement?
I don't think that there is any very specific area where enhancements need to happen in Tenable Vulnerability Management's feature sets. The only area which possibly is not a part of the feature, but Tenable can look at, is to make their pricing more competitive.
For how long have I used the solution?
I have been using Tenable Vulnerability Management for more than five years.
What do I think about the stability of the solution?
I would give Tenable Vulnerability Management a nine out of ten for stability because the downtime has been next to minimal. We have not faced any kind of outages in terms of services. Reliability is absolutely high.
How would you rate stability?
Positive
What do I think about the scalability of the solution?
I think the scalability level of Tenable Vulnerability Management is fairly good. I don't think we have really found that wanting. I would give that an eight out of ten. We have not faced any problems so far.
With the growing needs of our company, Tenable Vulnerability Management is able to safely adapt.
How would you rate scalability?
Positive
How are customer service and support?
We had used Tenable's expert support services in order to make sure that we run Tenable Vulnerability Management on a continuous basis and are able to utilize their services. At the time of the implementation, we had taken the help of Tenable's expert support to be able to help us use this feature at the outset.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used QualysGuard before using Tenable Vulnerability Management.
We decided to switch from QualysGuard to something else because these were two different companies. This was the previous company where I had exposure to QualysGuard. We have never made any change from Tenable in the current company.
How was the initial setup?
When I started working at my current company, Tenable Vulnerability Management was already there.
What about the implementation team?
I was involved in the decision, but we have chosen Tenable and we continue using Tenable Vulnerability Management in the current company. I was a part of the purchase process.
What's my experience with pricing, setup cost, and licensing?
I would not say very expensive for Tenable Vulnerability Management; it is not prohibitive, but at the same time, there are some other tools in the marketplace which are offering the same kind of services that Tenable offers, the same kind of features that Tenable has offered at a lesser cost.
What other advice do I have?
I use Tenable Vulnerability Management, and that is the tool that I have primary experience with.
Apart from zero-day vulnerability, which obviously none of the tools would know about, I think the scanning engine of Nessus, part of Tenable Vulnerability Management, is quite up-to-date. It provides details on how the remediation should take place and provides detailed steps on how the remediation can be undertaken, which is quite helpful for the various application teams in order to understand. Their platform is something which is quite up-to-date. It appears that in the back-end they have the right set of threat intelligence feeds that come in from all different sources. I would assume that their AI engine and also their database is quite updated. From the perspective of being up to date, we feel very comfortable because we do rely on and trust their AI engine which their scanning facility is powered with.
The importance of real-time risk prioritization for our organization's security strategy is very high. These are the times where you cannot really go loose at all. Remediation becomes prioritized for all organizations. It is extremely important that at least the highly critical vulnerabilities are patched within 24 to 48 hours because they are high targets and valuable targets for adversaries. Therefore, risk prioritization is probably extremely important for organizations to keep these in the highest priority of any activity.
We have not yet integrated Tenable Vulnerability Management as much. We are using Tenable on a standalone basis. We have not yet done an integration with any GRC tool or any other tool. As of now, we are using Tenable as an independent tool.
Tenable Vulnerability Management is deployed on-cloud in our organization, and we are using Amazon Web Services as our cloud provider.
I would give Tenable Vulnerability Management a nine out of ten rating. This is not a matter of concern because, apart from the costing part, which was pretty much okay when we signed up, over a period of time they have been increasing their license fee. That is the only point which I believe that they could possibly look at working upon. Otherwise, it is a nine out of ten for sure. My overall review rating for Tenable Vulnerability Management is eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Versatility and Ease: Complete and Intuitive Tool
the best software
Great Scanning Capabilities, But User Account Setup Is Frustrating
Outstanding TVM Features and Support, Needs Better Asset Licensing Controls
Support from SentinelOne has also been outstanding — responsive, knowledgeable, and proactive in addressing questions or issues.
Also, deployment is a snap.
I'd also like to see better reporting around the management of vulnerabilities over 90-plus days old in the environment and agents.