

Tenable Vulnerability Management and SentinelOne Singularity Identity compete in the cybersecurity space. Tenable seems to have the upper hand in terms of visibility and scanning capabilities, while SentinelOne stands out for its threat detection and identity protection based on behavior.
Features: Tenable Vulnerability Management provides comprehensive visibility, robust scanning capabilities, and seamless integrations for on-premises and cloud environments. It offers stability and scalability to accommodate enterprise needs effectively. SentinelOne Singularity Identity delivers strong threat detection and identity protection with dynamic responses. It includes a unified view and advanced threat management, ideally suited for organizations seeking in-depth visibility and enhanced cloud security.
Room for Improvement: Tenable Vulnerability Management could improve its dashboard customization and response times in support. Enhancements to cater to small and mid-sized businesses with intuitive features are necessary, as well as adjustments in pricing to remain competitive. SentinelOne Singularity Identity would benefit from improved endpoint management, better license transparency, and quicker support response times. Increasing user-friendliness and developing clearer pricing strategies could broaden its appeal.
Ease of Deployment and Customer Service: Tenable Vulnerability Management supports various deployment models, including on-premises, cloud, and hybrid options, but often experiences lengthy resolution times in customer service with additional support costs. SentinelOne Singularity Identity focuses on cloud-based deployment and provides competitive support times, though it could enhance first-level support and overall customer interaction.
Pricing and ROI: Tenable Vulnerability Management’s pricing is higher, appealing more to enterprises, yet provides ROI through improved security visibility and operational efficiency. SentinelOne Singularity Identity, while slightly less expensive, faces challenges with annual price increments and transparency in feature development. Both products deliver considerable security value, though pricing strategies affect customer satisfaction.
They have been responsive to our needs as integrators and those of the client.
The technical support of Tenable Vulnerability Management is available 24/7, and whenever we require support, we can get it within five minutes.
It needs improvement in response time and addressing feature requests promptly.
We had used Tenable's expert support services in order to make sure that we run Tenable Vulnerability Management on a continuous basis and are able to utilize their services.
They can seamlessly scale the number of endpoints from 100 to 1,000,000 in a day.
With the growing needs of our company, Tenable Vulnerability Management is able to safely adapt.
It is highly scalable and very user-friendly when it comes to scalability.
The stability is commendable, and I would rate Tenable ten out of ten.
I have faced no stability issues with Tenable.
We have not faced any kind of outages in terms of services.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
Tenable Vulnerability Management is not very effective for real-time risk prioritization for our organization's security strategy.
I would suggest HP WebInspect as a better option than Tenable.io.
They should also accelerate the process of implementing new features upon request.
Tenable charges around $40 per device, while Rapid7 costs $10 to $15 per device.
I would not say very expensive for Tenable Vulnerability Management; it is not prohibitive, but at the same time, there are some other tools in the marketplace which are offering the same kind of services that Tenable offers, the same kind of features that Tenable has offered at a lesser cost.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
The main benefit of integration with Tenable Vulnerability Management is that there will be no lack of missing vulnerabilities when it comes to the patching environment.
Tenable enables vulnerability management through potential AI integration that consolidates efforts and resolves multiple vulnerabilities simultaneously.
The best features of Tenable Vulnerability Management are flexibility, breadth and scope, and the fact that their current vulnerabilities come out, and they have tests for them within a day or two.
| Product | Mindshare (%) |
|---|---|
| Tenable Vulnerability Management | 2.9% |
| SentinelOne Singularity Identity | 0.9% |
| Other | 96.2% |


| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 3 |
| Large Enterprise | 21 |
SentinelOne Singularity Identity offers AI-driven detection, prevention, and cloud protection, providing real-time coverage and streamlined security management through its unified console and customizable interface.
Singularity Identity enhances threat detection with dynamic capabilities, facilitating real-time protection and easy user workflows. Its management console offers a unified view for deeper risk analysis, boosting operational security. Through behavioral analysis and adaptable interfaces, threat response becomes efficient. Key elements include identity guarding and quick incident mitigation. Automated remediation options and rollback features are impactful, ensuring decreased response times. Challenges include improving user accessibility, especially for non-IT individuals, and enhancing customer support with faster solutions and robust reporting. Performance issues like CPU usage demand solutions, while endpoint management and agent updates could benefit from automation. Adding network response features and lowering costs may enhance engagement.
What are the most important features?Industries leverage SentinelOne Singularity Identity for comprehensive threat monitoring across networks. It ensures cloud and endpoint security, plus control over identity and data breaches. By replacing outdated antivirus systems, organizations emphasize proactive defense, visibility, incident response, and detecting lateral movements. Implementing this solution supports strong network and endpoint security, enhances cloud management, and maintains a robust security framework.
Tenable Vulnerability Management offers efficient scanning, reporting, and integration capabilities. It supports extensive visibility and risk management for diverse environments while providing a user-friendly experience with strong cloud capabilities and container scanning.
Tenable Vulnerability Management is crucial for vulnerability assessment and managing security across network infrastructures. It effectively handles cloud and on-premises scans, identifying risks and enhancing cybersecurity measures with detailed reports. With features like automated scanning and risk prioritization, users manage vulnerabilities efficiently. Despite its strong points, improvements in pricing, navigation, and customization are desired, alongside better integration and AI-driven detection.
What are the most important features of Tenable Vulnerability Management?In industries like finance, healthcare, and education, Tenable Vulnerability Management supports robust cybersecurity measures. Organizations utilize it for scanning IT infrastructures, conducting cloud assessments, and performing endpoint analysis to mitigate threats in critical environments.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.