Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

4 AWS reviews
  • 4
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

138 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Steve B.

Great interface and plugins w/ only minor issues

  • October 29, 2024
  • Review provided by G2

What do you like best about the product?
The easy to use interface makes exploring known and discovered vulnerabilities fairly painless. The fact that the solution to exploits is listed right next to the vulnerability overview, it makes remediation a lot easier.
The number of plugins covers a wide variety of systems and possible exploits.
SAML / SCIM integration is another plus and was fairly easy to setup.
Implementation of scanning via its Nessus agents was a breeze.
What do you dislike about the product?
The plugin manager could use some work. There are often several plugins that do the same thing or just plugins that do not provide the functionality that they claim.
Additionally, some of the exploits that are not exploitable and can cause false positives. For example if I have a HTTPS exploit on a version of a router / switches firmware, but HTTPS management is turned off and only SSH management is used, then that exploit does not need to be listed as high.
What problems is the product solving and how is that benefiting you?
Provides vulnerability insights for servers and user endpoints with a fairly lightweight agent.

The ability to do very targeted scans of specific vulnerabilities throughout an organizaiton or on just one specific machine is very helpful.


    John T.

Tenable Vulnerability Management

  • October 29, 2024
  • Review provided by G2

What do you like best about the product?
Tenable Vulnerability Management makes it easy to keep vulnerabilities organised and easily reference how to remediate them.
What do you dislike about the product?
The feature rich solution does not lend itself to many short comings.
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management helps to bring any security shortcomings to light and suggests how to remediate them.


    Logistics and Supply Chain

Best Cybersecurity Vulnerability Management Tool

  • October 23, 2024
  • Review provided by G2

What do you like best about the product?
I have been using this tool for a Long time and they were developing new features like vulnerability intelligence which helps us make a successful vulnerability management program. Integration with ServiceNow helps us in getting the results better.
What do you dislike about the product?
The support team should give a proper response. This needs to be improved.
What problems is the product solving and how is that benefiting you?
Earlier we faced so many issues with other products and Tenable helped here by getting better Vulnerability program arranged to us.


    Andrey C.

A Must-Have Security Tool!

  • October 22, 2024
  • Review provided by G2

What do you like best about the product?
Excellent coverage across various systems and networks, ease of use, intuitive dashboard, automated scanning, simplifies operations.
What do you dislike about the product?
Performance slowdowns during large-scale scans, initial setup and configuration a bit complex, the reporting feature, price.
What problems is the product solving and how is that benefiting you?
Managing security vulnerabilities, detecting weak spots. Proactive approach, clear remediation guidance, improved overall security posture.


    Jackson L.

Product overview

  • August 14, 2024
  • Review provided by G2

What do you like best about the product?
the robust cuantity of options the high speed when it comes to find vulnerabilities
What do you dislike about the product?
the price and also sometimes as little companies I can feel a bit overprices. learning curve is a bit high also
What problems is the product solving and how is that benefiting you?
Detecting industry vulnerability all in one, while usually cloud providers offer beneficial benefits, I believe that when t comes to benefits Tenable Vulnerability Management wins, nonetheless false positive detection could improve


    Banking

Tenable Vulnerability Management - Vulnerability Scans

  • August 10, 2024
  • Review provided by G2

What do you like best about the product?
What I like best is the organization in creating templates for scanning vulnerabilities and the way the reports are generated for the threats found, I used it daily to perform vulnerability assessments.
What do you dislike about the product?
I can't find anything that I dislike about the platform right now.
What problems is the product solving and how is that benefiting you?
Tenable Vulnerability Management solves the problem of identifiying and prioritizing vulnerabilities across our network, which is crucial for maintaining


    David W.

A baseline for cyber security

  • August 08, 2024
  • Review provided by G2

What do you like best about the product?
Scheduleling the scans is very helpful in that you can then have those results sent to your email. Report fatigue and email fatigue are real things but with the simplified email at a quick glance you can tell if you need to dive deeper or just review at the standard time.
What do you dislike about the product?
They could be better about some of the mitigation information, I understand that it must be a huge task but would be really helpful to have.
What problems is the product solving and how is that benefiting you?
Staying ahead of issues that I have public facing before they become an issue.


    Sirish Kumar

Assesses vulnerabilities and finds anomalies and has an easy-to-use interface

  • April 18, 2024
  • Review provided by PeerSpot

What is our primary use case?

The solution is used for the vulnerability assessment of the network infrastructure.

What is most valuable?

The solution finds vulnerabilities, anomalies, and threats. Tenable has basic and ad hoc scanning features. The tool schedules scans for continuous monitoring. The main advantage of the solution is that it assesses the vulnerabilities and provides a CVE score. Reporting is very easy. The management dashboard is very easy. The tool has an easy-to-use interface. It is easy to implement the product.

What needs improvement?

The product is a bit expensive.

For how long have I used the solution?

I have been using the solution for 7 years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable up to a certain point. I rate the scalability a seven to eight out of ten. Our customers are medium to large businesses.

How are customer service and support?

The support is very good.

How would you rate customer service and support?

Positive

How was the initial setup?

The configuration is easy. My engineers can work on it seamlessly. The deployment of the basic solution does not take more than four to eight hours. We need one or two persons to deploy and maintain the product. There are no other challenges if we have the network and can access the IPs.

What was our ROI?

The product impacts our client's operational cost related to vulnerability management in a good way. It automates a few things and saves the engineers' costs.

What's my experience with pricing, setup cost, and licensing?

I rate the pricing a seven out of ten.

What other advice do I have?

We are resellers. The solution is easy to implement. It has an easy-to-use interface, enabling organizations to go faster to market. Overall, I rate the product a nine out of ten.


    DivyaJyoti

Useful for penetration testing but reporting functionality needs improvement

  • April 17, 2024
  • Review provided by PeerSpot

What needs improvement?

The tool's reports are bad. They're not very customizable or flexible. During audits, we often have to exclude things that aren't relevant to our organization, but we can't do that easily with the reports. They come in HTML or PDF format, and we can't compare current results with previous ones in Excel because we never receive reports in Excel.

For how long have I used the solution?

I have been using the product for a year, and my organization has been using it for six to seven years.

What do I think about the stability of the solution?

Tenable Vulnerability Management is stable.

What do I think about the scalability of the solution?

I rate the tool's scalability a seven out of ten.

How are customer service and support?

The solution's support is okay, but it could be more customer-friendly. The people providing support have knowledge, but they could improve customer interaction.

How was the initial setup?

The tool's deployment can be challenging, especially for those unfamiliar with Kali Linux, as it operates on this platform. This might make the setup process difficult for users accustomed to other operating systems like Windows. It may take a couple of tries to get comfortable with the process. However, once you have set it up a few times, it becomes easier.

What other advice do I have?

Sometimes, we use the tool for tasks like configuration and running scans. However, it's a bit difficult to use compared to Qualys. One issue we've noticed is that it takes up a lot of space, which customers often complain about. They promised more system coverage and updates, but it isn't happening.

I rate Tenable Vulnerability Management a seven out of ten. It might be challenging if you're used to working on Windows. However, it's a recommended tool for penetration testers because it's effective for that purpose.

We use it for audit and PT.


    Kelvin Oladipo

Provides seamlessness, a perfect UI, and identity management for office operations

  • April 08, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the Tenable Vulnerability Management solution for internal web applications, asset management, and remediation. It helps us transfer and leverage the remediation of websites, effectively addressing vulnerabilities.

How has it helped my organization?

We need to deploy this on internal assets. It resides within the internal infrastructure and communication.

It encompasses everything at some point. From development to deployment, it receives the necessary attention.

What is most valuable?

The solution provides seamlessness, a perfect UI, and identity management for office operations. We are most vulnerable to users. Therefore, it is crucial to implement the right solution to ensure proper user access and resource management.

For how long have I used the solution?

I have been using Tenable Vulnerability Management for 4 years.

What do I think about the scalability of the solution?

200 users are using this solution.

Which solution did I use previously and why did I switch?

We have used Qualys. It is tricky and expensive.

How was the initial setup?

The initial setup is seamless and takes three days to complete. Two people are required for the deployment but one person can do as well.

What other advice do I have?

This process is seamless because checks are scheduled at different intervals, typically every ten minutes. Once a log is generated, we attend to it immediately. Also, the maintenance is straightforward.

Overall, I rate the solution an eight out of ten.