Have maintained accurate vulnerability scans and gained actionable remediation insights across thousands of servers
What is our primary use case?
We usually use
Tenable Vulnerability Management for vulnerability scannings, and we get the reports from Tenable to resolve any vulnerability. We have about 2,000 plus servers where we have installed the agent on those servers to check and scan the vulnerabilities. That is the main key aspect of what we use
Tenable Vulnerability Management for.
Regarding the continuous monitoring feature of Tenable Vulnerability Management, it is not exactly continuous monitoring we get from Tenable. It is used only on the market, where we scan it. We have a scheduled scan for all the servers, so we are not using it for any monitoring at present.
Tenable's advanced analytics and reporting features give very detailed reports where we get most of the information about vulnerabilities. That is one plus point. For example, with 2,000 servers, when we want to calculate the percentage of vulnerabilities that have appeared, it gives us very useful insights. While analyzing, it is one of the greatest tools because the results it produces as outputs scan the networks and each device in an organization.
We have purchased Tenable Vulnerability Management via AWS Marketplace.
What is most valuable?
Tenable Vulnerability Management agents are very lightweight, and the results we get are very accurate. The solutions they provide to us, assuming if one vulnerability exists, there will be a solution. The resolution they give us in wording will be the best solution. The exploit rates and the reports we get provide a lot of information, making it very easy for us to verify.
The main benefit of integration with Tenable Vulnerability Management is that there will be no lack of missing vulnerabilities when it comes to the patching environment. That is one of the key aspects of why we have integrated Tenable to our patching tools. It has a vast capacity of pushing the data to our tools due to its capability and compatibility. That is also one of the reasons why we are using Tenable Vulnerability Management.
What needs improvement?
Tenable Vulnerability Management is not very effective for real-time risk prioritization for our organization's security strategy. It is only used for scheduled tasks, not for real-time execution.
While the agents are very lightweight, when it comes to real-time analysis, there will be significant lagging on the servers and too much traffic on the network. When any server detects vulnerability while scanning, the reports take time to analyze by itself. That is one of the drawbacks of Tenable Vulnerability Management.
For how long have I used the solution?
We have been using Tenable Vulnerability Management for the past eight years.
What do I think about the stability of the solution?
The stability of Tenable Vulnerability Management is highly reliable. Having used Tenable for the past seven to eight years, I have never experienced any glitches or bugs affecting our environment. I can guarantee it is highly stable.
What do I think about the scalability of the solution?
Tenable Vulnerability Management is highly scalable. Mid and larger enterprises can definitely move on to Tenable Vulnerability Management.
Scalability is very important for us because of the lightweight agents. That is the main key feature where for installing, they have many options for scaling to multiple servers. If we need to install it on 500 machines tomorrow, we can push it in different ways. It is highly scalable and very user-friendly when it comes to scalability.
How are customer service and support?
Communication with Tenable Vulnerability Management support occurs on average two to three times monthly because our environment is very small.
The technical support of Tenable Vulnerability Management is available 24/7, and whenever we require support, we can get it within five minutes. Regarding technicality, they deserve a nine out of ten. They are highly technical people. I have communicated with more than 20 to 25 technical engineers. They take every question seriously and help us resolve issues. They have a very strong technical team to support customers.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Before Tenable Vulnerability Management, we used Qualys initially. We moved to Tenable due to pricing considerations. The customer requirement was to reduce the cost. When compared to Qualys, it was much more cost-effective.
How was the initial setup?
I did not participate in the initial setup of Tenable Vulnerability Management as it was already set up and ready to work on.
What about the implementation team?
We have SCCM integrated with Tenable Vulnerability Management to patch the servers, and it has also been integrated with
BigFix where we scan the results from Tenable and push the data to these tools. For endpoints, we use SCCM, and for servers, we use
BigFix. It has been integrated into these two particular patching tools where it analyzes and pushes the patches.
What was our ROI?
For evaluating the effectiveness of Tenable Vulnerability Management in our IT environment, we have our own ratings with integrated multiple metrics that automatically calculate. It has been integrated into our
ServiceNow. Based on that, all the overall metrics are automatically calculated based on AI and ML technology, where we get complete reports.
Which other solutions did I evaluate?
We have not validated other options before choosing Tenable Vulnerability Management. We have already worked with multiple tools, and the customer was very interested in Tenable Vulnerability Management specifically.
What other advice do I have?
We use Tenable Vulnerability Management and are currently using its latest version.
I rate Tenable Vulnerability Management nine out of ten based on my experience. This rating is due to its stability and high scalability. The best part is the solutions they provide for any vulnerability.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Essential for your security efforts
What do you like best about the product?
If you want to holistically manage vulnerabilities in your environment you first need visibility and Tenable definitely hits the spot with this solution.
What do you dislike about the product?
I haven't encountered technical or any other issues.
What problems is the product solving and how is that benefiting you?
Fixing our security posture.
Incomparable with any other vulnerability management tool
What do you like best about the product?
Tenable Vulnerability Management not only identifies issues but also helps teams prioritize the most critical vulnerabilities, optimizing time and resources while strengthening the organization's security posture.
What do you dislike about the product?
Tenable Vulnerability Management is a robust solution, but the cost, dependency on connectivity, and challenges in larger networks can be points to consider before adoption, especially for smaller organizations or those with limited resources.
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management offers me a proactive approach to identify, prioritize, and manage vulnerabilities, optimizing security and ensuring that threats are addressed before they cause problems.
Good vulnerability management
What do you like best about the product?
Fast plugin updates for detecting new vulnerabilities in the environment. You can scan devices through an agent, with credentials or without. Useful for printers, and network equipment to see your full exposure.
What do you dislike about the product?
At times agents fail their agent update, lose their connection, then dropped from the system. Some times the remediation information is lacking leaving you unsure how to correct non-standard vulnerabilities.
Support has not been good from our account manager to those higher up. I had issues with our VAR not receiving the renewal notification and services were shut off. It took them nearly 3 weeks to figure out their backend to restore services.
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management provides a complete platform to identify vulnerabilities with guidance on remediation. Reporting is highly customizable to receive the data you are looking for at a scheduled frequency.
Tenable Vulnerability Management Review
What do you like best about the product?
Pros:
Intuitive, user-friendly interface
Accurate and comprehensive asset discovery
Strong risk-based prioritization
Automated, continuous scanning
Flexible reporting and robust integration capabilities
What do you dislike about the product?
Cons:
Can be costly for smaller businesses
May require a learning curve for new users
Some users report longer scan times for larger environments
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management (formerly Tenable.io) offers an effective solution for identifying, managing, and mitigating security vulnerabilities across various assets within an organization. Its user-friendly interface and comprehensive dashboard allow IT teams to monitor vulnerabilities with clear visual insights, making it ideal for organizations looking to improve their cybersecurity posture proactively.
Great interface and plugins w/ only minor issues
What do you like best about the product?
The easy to use interface makes exploring known and discovered vulnerabilities fairly painless. The fact that the solution to exploits is listed right next to the vulnerability overview, it makes remediation a lot easier.
The number of plugins covers a wide variety of systems and possible exploits.
SAML / SCIM integration is another plus and was fairly easy to setup.
Implementation of scanning via its Nessus agents was a breeze.
What do you dislike about the product?
The plugin manager could use some work. There are often several plugins that do the same thing or just plugins that do not provide the functionality that they claim.
Additionally, some of the exploits that are not exploitable and can cause false positives. For example if I have a HTTPS exploit on a version of a router / switches firmware, but HTTPS management is turned off and only SSH management is used, then that exploit does not need to be listed as high.
What problems is the product solving and how is that benefiting you?
Provides vulnerability insights for servers and user endpoints with a fairly lightweight agent.
The ability to do very targeted scans of specific vulnerabilities throughout an organizaiton or on just one specific machine is very helpful.