

Tenable Nessus and FortiCNAPP are renowned competitors in the field of security and vulnerability management solutions. Tenable Nessus appears to have the upper hand due to its comprehensive vulnerability detection and affordable pricing, especially for small to medium-sized enterprises.
Features: Tenable Nessus stands out for its comprehensive vulnerability detection, predictive prioritization, and easy integration with various tools. It also excels in providing detailed remediation steps and automating processes. FortiCNAPP is strong in network segmentation and automated policy recommendations, enhancing security measures. It utilizes machine learning for faster threat detection and improves response times.
Room for Improvement: Tenable Nessus has received feedback on its reporting capabilities, user interface, and vulnerability ranking flexibility. Enhancements in integration and credential scanning are suggested. FortiCNAPP could improve its user interface and strengthen third-party integrations. Increasing IAM security controls and visibility is also recommended.
Ease of Deployment and Customer Service: Tenable Nessus offers flexibility with on-premises and hybrid cloud deployments. Users find it manageable, with responsive support, although there are concerns about response times and API documentation clarity. FortiCNAPP focuses on cloud deployments, providing solid support with an intuitive dashboard. User satisfaction could increase with improved communication and detailed alert handling.
Pricing and ROI: Tenable Nessus is noted for affordability, providing significant ROI due to its comprehensive features. It's favored by small to medium-sized enterprises for its competitive pricing. FortiCNAPP, though pricier, offers robust security and comprehensive visibility, flexible licensing terms, and delivers strong ROI through enhanced security posture and threat management.
FortiCNAPP is a competitive and robust solution, the only one in the IT sphere that addresses all quadrants in the Gartner Quadrants.
My technical teams do utilize integration with DevOps tools, as it performs significantly with automation regarding sophisticated challenges.
Fortinet's technical support is definitely helpful and responsive.
Technical support from Fortinet is good; I get feedback and responses quickly.
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
For complex large customers, global deployments, or large public sector customers, the process can take longer.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
They respond within the service level agreements and are proactive in their approach.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
The stability of Tenable Nessus is extraordinary.
The vulnerability part is not systematically organized; it is all clumsy in the web UI, and it is not user-friendly.
The solution could be more user-friendly and intuitive.
Policy implementation is quite complex, and the stability will take more time for the solutions.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
An AI feature that helps them discover options without requiring them to deep dive into all features or guides them through advisory functions would be beneficial.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
The pricing is a mediator compared to other products; it is not that much higher and not much lower than other products, making it a very affordable price.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
When we compare it to other solutions, it is more difficult for us to negotiate the price for Tenable Nessus than to negotiate the price with Rapid7.
It functions as a proactive tool, enabling me to identify threats quickly and automate responses.
The machine learning capability in Lacework FortiCNAPP is used for threat detection.
FortiCNAPP definitely brings time-saving benefits.
I mostly use the configuration audit feature for the audit configuration as a scan policy, and I will use it for credential audit, which helps me scan credentials access such as local administrator or root access, performing a deeper and more accurate check of local configuration settings and file systems, making it a highly recommended feature.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
| Product | Mindshare (%) |
|---|---|
| Tenable Nessus | 5.0% |
| FortiCNAPP | 1.8% |
| Other | 93.2% |


| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 4 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
FortiCNAPP is a comprehensive cloud security platform focusing on ease of use and machine learning-driven anomaly detection. It offers robust compliance reporting, seamless integration, and continuous monitoring, making it an essential tool for organizations managing multi-cloud environments and security configurations.
FortiCNAPP provides significant capabilities in cloud security, compliance, and vulnerability management. Designed for organizations needing efficient monitoring, it enables detection of anomalies across cloud infrastructures while optimizing security posture and ensuring compliance with environments like AWS and GCP. The platform offers in-depth insights through scanning of IAC scripts, host systems, and cloud configurations. Recognized for effectively managing security posture, it safeguards Kubernetes and container environments, providing comprehensive threat detection and response. However, some areas like visibility, IAM security controls, and compliance metrics need improvement. Users face challenges with alert setup and lack intuitive design, alongside issues like FedRAMP authorization absence and complexity in the data model.
What are the key features of FortiCNAPP?FortiCNAPP is implemented extensively by industries needing reliable cloud security, such as finance, healthcare, and technology sectors. It supports organizations in enhancing cloud infrastructure protection, ensuring compliance, and strengthening vulnerability management. By integrating with platforms like AWS and GCP, businesses can optimize security posture in their cloud deployments.
Tenable Nessus enhances cybersecurity by detecting vulnerabilities with comprehensive scanning, user-friendly dashboards, and automated reporting, providing value in asset management, configuration audits, and compliance.
Providing real-time monitoring and ease of use, Nessus stands out with its integration capabilities, predictive prioritization, extensive plugin system, and cost-effectiveness. It supports vulnerability assessments for networks, applications, and devices, offering detailed reports for continuous security improvement. Nessus' capabilities extend across on-premise and cloud deployments, aiding compliance and remediation processes while aligning with security standards. While robust, it could benefit from enhanced cloud capabilities, improved scanning accuracy, and more flexible licensing options.
What are the standout features of Tenable Nessus?Tenable Nessus is implemented widely across industries for internal and external vulnerability assessments and management, aiding organizations in scanning servers, workstations, and network devices. Benefiting sectors prioritize security within their unique environments, leveraging Nessus for its thorough reports and compliance assurance.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.