

Tenable Nessus and Orca Security compete in the cybersecurity tools category. Orca Security seems to have the upper hand due to its agentless architecture, cloud focus, and rapid support.
Features: Tenable Nessus offers extensive vulnerability scanning, predictive prioritization, and an integration ability that supports risk management across environments. Orca Security's SideScanning technology allows agentless data collection, ranking and prioritizing vulnerabilities, and providing detailed cloud-level visibility.
Room for Improvement: Tenable Nessus could improve in reporting customization, intuitive interfaces, and reducing false positives. Orca Security could expand its on-premise integration and visualization capabilities, automatic remediation features, and enhance communication on updates.
Ease of Deployment and Customer Service: Tenable Nessus is mostly deployed on-premises, and feedback on technical support is mixed. Orca Security is deployed in the cloud with minimal setup and is praised for ease of use and quick support response.
Pricing and ROI: Tenable Nessus is competitively priced for smaller organizations and presents a strong ROI through its management capabilities. Orca Security is generally more expensive but justifies cost with its feature suite and value in reducing the need for multiple tools.
Orca Security significantly improved our visibility from 30% to 100%, enabling better security posture improvements rather than just general cost savings.
I see the benefits of Orca Security immediately because you can see the issues right after deployment, and you can correct the critical issues, so the proof of value is immediate.
Orca Security roughly reduced the operating expenses by around 20-50%.
I would rate the quality of support as nine stars out of ten due to their quick and helpful responses.
The expertise levels could be improved.
The support team assists with issues and provides information on new updates.
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
When you onboard an organization, Orca will find new projects, folders, and resources without any additional effort required.
The seamless integration allows us to automatically reflect any connected project from our cloud into the console.
I believe Orca Security is scalable and can handle small and medium-enterprise businesses effectively.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
I personally have not encountered any bugs or issues with the console.
I have experienced very little downtime.
I do not experience downtime, bugs, or glitches.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
The stability of Tenable Nessus is extraordinary.
Another improvement is in handling alerts for multiple files with the same CVE; it should provide an option to manage each file separately without affecting others.
Orca Security could improve in reporting OS package vulnerabilities, such as missing MS patches or Linux patches.
Security in today's age is important, and if a company can afford it, they should get it as it's the most valuable protection against threats.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
The product's pricing has roughly tripled within the last couple of years, making us reconsider renewing the license for the scanner.
The initial price seemed high, however, after negotiation, the final price was ideal.
Orca Security's pricing is known to be a bit high.
Its license is a bit expensive.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
My experience with the pricing, setup cost, and licensing of Tenable Nessus is that the installation is somewhat easier, but preparing the product, such as the SKU and license options, is quite tricky.
Additionally, it covers a large scope of vulnerabilities, CVEs, malware, and misconfiguration.
It provided us with visibility from a central point, increasing our view from the previous thirty percent to a full one hundred percent of our cloud environment.
This technology allows for coverage of almost all cloud assets without interrupting their operations.
I mostly use the configuration audit feature for the audit configuration as a scan policy, and I will use it for credential audit, which helps me scan credentials access such as local administrator or root access, performing a deeper and more accurate check of local configuration settings and file systems, making it a highly recommended feature.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
| Product | Market Share (%) |
|---|---|
| Tenable Nessus | 5.1% |
| Orca Security | 2.6% |
| Other | 92.3% |

| Company Size | Count |
|---|---|
| Small Business | 12 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 39 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
Orca Security provides comprehensive security management with agentless visibility and SideScanning technology, ensuring efficient threat detection without performance impact.
Orca Security offers agentless visibility across multi-cloud environments, streamlining security management with features like SideScanning technology and centralized security tools. It focuses on automation, vulnerability management, and compliance checks, enhancing a company's security posture with real-time alerts and integrated threat detection. Its intuitive interface prioritizes critical issues, making it suitable for managing DevSecOps processes efficiently.
What are the key features of Orca Security?
What benefits and ROI should companies look for in Orca Security?
Companies in industries such as finance, healthcare, and technology leverage Orca Security for cloud security posture management, ensuring compliance with standards and securing applications and databases. Its agentless approach provides comprehensive visibility across AWS, GCP, and Azure, enhancing risk assessment and vulnerability management without impacting asset performance.
Tenable Nessus provides an efficient vulnerability management system with swift deployment and comprehensive scanning capabilities, making it an ideal choice for organizations seeking to enhance their security posture through effective threat detection and mitigation strategies.
Renowned for its top-tier vulnerability detection, Tenable Nessus offers a robust platform that integrates effortlessly across systems, enhancing threat management through automation, real-time monitoring, and customizable scanning options. Its broad asset coverage, including network devices and applications, coupled with ease of deployment, positions it as a go-to option for risk assessment and compliance. Organizations value its extensive reporting features and database, although they suggest enhancements in reporting formats and false positive detection. A more intuitive interface, improved cloud support, and competitive pricing models are sought after to cater to evolving enterprise needs.
What are the key features of Tenable Nessus?In industries such as finance, healthcare, and tech, Tenable Nessus is implemented for scanning internal and external networks, identifying risks, and ensuring data protection compliance. Organizations conduct regular scans to detect security vulnerabilities in servers and databases, leveraging its capabilities to strengthen their security frameworks while managing cloud infrastructures and enterprise networks efficiently.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.