No more typing reviews! Try our Samantha, our new voice AI agent.

JupiterOne vs Tenable Security Center comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

JupiterOne
Ranking in Vulnerability Management
51st
Ranking in Cloud Security Posture Management (CSPM)
30th
Average Rating
8.0
Reviews Sentiment
6.5
Number of Reviews
2
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (21st), Cyber Asset Attack Surface Management (CAASM) (5th)
Tenable Security Center
Ranking in Vulnerability Management
6th
Ranking in Cloud Security Posture Management (CSPM)
11th
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
56
Ranking in other categories
Risk-Based Vulnerability Management (3rd)
 

Mindshare comparison

As of May 2026, in the Vulnerability Management category, the mindshare of JupiterOne is 0.4%, up from 0.2% compared to the previous year. The mindshare of Tenable Security Center is 2.8%, down from 5.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Tenable Security Center2.8%
JupiterOne0.4%
Other96.8%
Vulnerability Management
 

Featured Reviews

CO
Security Analyst at a outsourcing company with 501-1,000 employees
Unified asset visibility has improved investigations and now simplifies tracking security assets
There are some features that I have shared with our customer service manager. One of them that is relevant to us at this time is the need for better determination of unified devices. Currently, JupiterOne uses hostname weights, MAC addresses, or IP addresses to tie devices together, but we have actually requested a way for us to make those determinations ourselves. For example, when externally scanning a device using Qualys, internally it gives an IP address or FQDN, while externally it might be different. We want to be able to decide ourselves that these two devices are the same device even when they have different names and IP addresses for external and internal use. The unified devices feature is valuable and did not used to exist, and it has been fantastic. However, I believe more can be done regarding unified devices, and giving users the privilege to tie them together would be a good addition to the platform. One of the other things that interest us in JupiterOne and why we really wanted to use the tool is the compliance feature. We wanted to use it to track our compliance since we are ISO 27001 certified. However, the compliance module has not worked well, and we have had to continue tracking our compliance manually with the tools we use. Although there are some works in progress to improve the compliance part of the tool, I think if they can get it up to speed, that would be a really good improvement.
reviewer1534134 - PeerSpot reviewer
Head of Information Security at a consultancy with 1,001-5,000 employees
Centralized analytics have strengthened patch visibility and support efficient regulatory reporting
From my experience, I assess the product's analytics capabilities as successful. It helped us significantly with patching and managing the risk of the patching process across all our environments, including network devices with Windows and Unix systems. The product covered several environments and gave us exactly what we needed in our environment. Tenable Security Center's centralized platform helped with risk assessment and management across our IT environments. It covered the patching process, and we previously faced many issues regarding how to patch different environments, how to monitor the patching process, and whether it was successful or not. We obtained good reports showing when patches were closed and the details of each patch, including who executed it and everything related to the patching process until it was closed. This gave us good details about the process which helped us significantly in our reporting and even in audits, whether internal or external. We learned how to close audit issues safely and successfully. We used the dashboards for real-time threat insights and extracted several dashboards from Tenable Security Center. We use these dashboards in our cybersecurity dashboard and committees that we have. These dashboards are part of our committees, especially the cybersecurity committee and other committees that we attend.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product’s UI is pretty decent and fast."
"JupiterOne helps us aggregate all those things on one single platform, allowing us to quickly identify what environment that asset lives in and what type of asset it is."
"The tool provides us insight into the happens of the network and its hosts. It provides me with a list of hosts."
"The usability is really good. It's very easy to use and a good platform. It is scalable and very stable. The technical support is fine and the setup is super easy."
"I think that this is a good solution for evaluating vulnerability in the network."
"Tenable is the leading product for vulnerability scanning."
"Tenable Security Center is a relatively very good solution, and I don't think it needs improvement; it's a perfect solution."
"It allows financial institutions to compare their vulnerability management to others in the same sector."
"The scans are the most valuable aspect of this solution."
"The initial setup process is simple."
 

Cons

"However, the compliance module has not worked well, and we have had to continue tracking our compliance manually with the tools we use."
"You can only write Python queries in Jupiter, not other languages, like, SQL or PySpark."
"Deploying Tenable.sc is highly complex because it's an on-prem solution, whereas Tenable.io is cloud-based, so you can go live as soon as you log in. Tenable.sc involves significant integration with other on-prem solutions, and the deployment takes about two to three weeks with the help of a system integrator"
"The solution needs to improve the vulnerability assessment because we have experienced some challenges with accuracy."
"They are not currently handling call flows properly. Some call flows are being deleted from the registry but still show as active."
"I will say it's a lot slower compared to an MS scan. It takes so much longer, so the performance could definitely be worked on."
"For downloading reports, we have to go to the scan and then we have to go to the reports and download the Excel or CSV or PDF. I think these menus and clicks can be minimized."
"The solution's user interface has some issues."
"Current web page needs improvement, slows down processes."
"At times we have had the typical bugs."
 

Pricing and Cost Advice

Information not available
"Though reasonable, the main competitor of Tenable SC, Rapid7, offers a more aggressive and better priced product."
"I would rate the pricing a nine out of ten, where ten is expensive. It is the most expensive tool my company is using."
"This solution's price is quite high."
"We're a Fortune 500 company... our licensing costs [are] in the seven figures."
"Tenable is open-source."
"The price can start at €10,000 ($13,000 USD) for between 500 and 1,000 assets, and the price can climb into the millions as more assets are added."
"It is a bit expensive. Everything is included in the license."
"For 500 users the licensing fee is roughly $100,000."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
892,943 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Construction Company
15%
Outsourcing Company
8%
Manufacturing Company
7%
Financial Services Firm
12%
Manufacturing Company
11%
Government
9%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business22
Midsize Enterprise10
Large Enterprise27
 

Questions from the Community

What needs improvement with JupiterOne?
There are some features that I have shared with our customer service manager. One of them that is relevant to us at this time is the need for better determination of unified devices. Currently, Jup...
What is your primary use case for JupiterOne?
Our main use case for JupiterOne is as an asset catalog tool where we document all our assets that are integrated from different platforms such as Device42, Qualys, Microsoft M365, and Defender. We...
What advice do you have for others considering JupiterOne?
JupiterOne has many features. Although none comes to mind almost immediately, I know it often depends on how we are able to write or craft the queries. JupiterOne has been very instrumental to me i...
What is your experience regarding pricing and costs for Tenable SC?
The price of Tenable Security Center is not so high; it's relatively a cheaper solution.
What needs improvement with Tenable SC?
We did conduct a long implementation which relates to what I think can be improved about Tenable Security Center. In some cases, we needed to refer back to Tenable itself, and in other cases, we ne...
What is your primary use case for Tenable SC?
The typical use case for Tenable Security Center is that it is an on-premise solution, and it can use the agent and active scanning, which is needed by governmental organizations and manufacturers,...
 

Also Known As

No data available
Tenable.sc, Tenable Unified Security, Tenable SecurityCenter
 

Overview

 

Sample Customers

Information Not Available
IBM, Sempra Energy, Microsoft, Apple, Adidas, Union Pacific
Find out what your peers are saying about JupiterOne vs. Tenable Security Center and other solutions. Updated: April 2026.
892,943 professionals have used our research since 2012.