

Tenable Nessus and Pentera both offer solutions in the vulnerability management space. Pentera appears to have an edge, especially due to its continuous validation and penetration testing capabilities which provide real-time insights.
Features: Nessus is known for its extensive database and automated scanning, offering features that include reliable integration with other security tools, an extensive database for vulnerability detection, and automated scanning capabilities. Pentera's standout features are its continuous penetration testing, detailed reporting capabilities, and real-time validation integrated with AI-based analysis.
Room for Improvement: Nessus users suggest improvements in user accessibility, reporting enhancements, and better cloud integration. Pentera could benefit from improving dashboard visibility, offering more flexible licensing terms, and scaling better for organizations with fewer assets.
Ease of Deployment and Customer Service: Nessus supports hybrid deployments, catering to both on-premises and cloud environments, with generally positive technical support feedback, though some delays in complex issues. Pentera, mainly on-premises, is noted for easy setup but needs better support for smaller implementations, though its customer service is responsive to deployment issues.
Pricing and ROI: Nessus is competitively priced, with a favorable cost-benefit ratio for large enterprises, enhancing security posture and reducing vulnerabilities. Pentera, perceived as more expensive, is valued for advanced capabilities in network weakness identification, offering significant benefits in environments requiring immediate remediation insights despite its higher pricing.
Some customers consider the ROI favorable, but facing difficulties now due to changes in the licensing model, which has made it more expensive compared to last year.
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
I can usually fix all of the issues myself.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
The stability of Tenable Nessus is extraordinary.
When the IP is imported into a system, we cannot withdraw or revoke the license.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
Tenable could improve by integrating Gemini or ChatGPT for deeper analysis in risk assessment.
The product's pricing has roughly tripled within the last couple of years, making us reconsider renewing the license for the scanner.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
My experience with the pricing, setup cost, and licensing of Tenable Nessus is that the installation is somewhat easier, but preparing the product, such as the SKU and license options, is quite tricky.
We can automate the Pentera processes by automatically creating scenarios to validate the system.
The main benefits I get from Tenable Nessus are complete asset inventory and comprehensive attack surface management, allowing us to prioritize vulnerabilities based on risk, focusing on true risk and threat path analysis.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
| Product | Market Share (%) |
|---|---|
| Pentera | 24.9% |
| Cymulate | 17.0% |
| Picus Security | 14.6% |
| Other | 43.5% |
| Product | Market Share (%) |
|---|---|
| Tenable Nessus | 5.2% |
| Wiz | 7.5% |
| Qualys VMDR | 5.0% |
| Other | 82.3% |


| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 39 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
Pentera is the category leader for Automated Security Validation, allowing every organization to evaluate its security readiness, to know its real security risk at any given moment. Test all cybersecurity layers across the attack surface – inside and out – by safely emulating attacks & prioritize patching with a risk-based remediation roadmap.
Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io
Tenable Nessus provides an efficient vulnerability management system with swift deployment and comprehensive scanning capabilities, making it an ideal choice for organizations seeking to enhance their security posture through effective threat detection and mitigation strategies.
Renowned for its top-tier vulnerability detection, Tenable Nessus offers a robust platform that integrates effortlessly across systems, enhancing threat management through automation, real-time monitoring, and customizable scanning options. Its broad asset coverage, including network devices and applications, coupled with ease of deployment, positions it as a go-to option for risk assessment and compliance. Organizations value its extensive reporting features and database, although they suggest enhancements in reporting formats and false positive detection. A more intuitive interface, improved cloud support, and competitive pricing models are sought after to cater to evolving enterprise needs.
What are the key features of Tenable Nessus?In industries such as finance, healthcare, and tech, Tenable Nessus is implemented for scanning internal and external networks, identifying risks, and ensuring data protection compliance. Organizations conduct regular scans to detect security vulnerabilities in servers and databases, leveraging its capabilities to strengthen their security frameworks while managing cloud infrastructures and enterprise networks efficiently.
We monitor all Breach and Attack Simulation (BAS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.