Try our new research platform with insights from 80,000+ expert users

Tenable Nessus vs The NodeZero Platform by Horizon3.ai comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Tenable Nessus
Ranking in Vulnerability Management
2nd
Average Rating
8.4
Reviews Sentiment
6.0
Number of Reviews
87
Ranking in other categories
No ranking in other categories
The NodeZero Platform by Ho...
Ranking in Vulnerability Management
11th
Average Rating
9.0
Reviews Sentiment
5.7
Number of Reviews
11
Ranking in other categories
Advanced Threat Protection (ATP) (12th), Penetration Testing Services (1st), Breach and Attack Simulation (BAS) (1st), Risk-Based Vulnerability Management (5th)
 

Mindshare comparison

As of February 2026, in the Vulnerability Management category, the mindshare of Tenable Nessus is 5.1%, down from 10.3% compared to the previous year. The mindshare of The NodeZero Platform by Horizon3.ai is 1.5%, up from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Market Share Distribution
ProductMarket Share (%)
Tenable Nessus5.1%
The NodeZero Platform by Horizon3.ai1.5%
Other93.4%
Vulnerability Management
 

Featured Reviews

MohammedJaffir - PeerSpot reviewer
Founder at Cipheroot
Has enabled me to reduce false positives and perform deep credential auditing with seamless integrations
I mostly use the configuration audit feature for the audit configuration as a scan policy, and I will use it for credential audit, which helps me scan credentials access such as local administrator or root access, performing a deeper and more accurate check of local configuration settings and file systems, making it a highly recommended feature. Regarding integration capabilities, we can integrate Tenable Nessus with SIM tools such as Splunk, IBM QRadar, and Azure Sentinel, as well as with ticketing systems such as ServiceNow, Jira, and Slack. There is no complexity as it is very easy to integrate everything. In terms of the reporting feature, while vulnerability scanning can throw some false positives, Tenable Nessus has very few, achieving a reduction of 75% to 80% false positives with manual analysis needed. We can generate standard Nessus reports that typically include host summaries and vulnerabilities by host and plugin, alongside solutions and remediation recommendations. The main benefits I get from Tenable Nessus are complete asset inventory and comprehensive attack surface management, allowing us to prioritize vulnerabilities based on risk, focusing on true risk and threat path analysis.
SH
Chief Information Officer at a construction company with 1,001-5,000 employees
Has unified our IT teams by providing clear visibility into network vulnerabilities and accelerated remediation with real-world attack testing
One of the things that we've shared with Horizon is just the reporting. They've made a lot of changes over time, but when examining computers, most average normal people don't look at a computer and identify it as 114.82.117.180. They identify it as 'the printer for accounting.' When many of the reports give the very detailed technical IP address or serial number, that's really not helpful for anyone other than the person, the hands-on person that's trying to remediate it. All the managers, all the leaders, having information in that format isn't helpful. Being able to have information about what those devices are would be very helpful. There's a technical reason they can't just have an easy button because some people have really complicated networks. When examining things for the average company, the average executive, that 114 number, there's only one of those. But if examining an AT&T or a Walmart, it isn't unique. They haven't solved that problem. But for the 90% of companies, being able to have just a human readable name for all devices on your network in all of the reports all of the time would be the most beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It notifies us of vulnerabilities as they arise, allowing us to respond quickly without manual intervention."
"With the Tenable Nessus enterprise edition, you have unlimited licenses to scan the device."
"A valuable feature of the solution is that it is easy to understand."
"The solution is very stable."
"Tenable Nessus has provided increased visibility across the organization's servers."
"Easy to set up vulnerability scanner with good stability and a responsive technical support team."
"My favorite part about Nessus is that you can customize the tool to scan exactly what you want. Microsoft releases new patches monthly on Patch Tuesday, and a lot of companies track that date. I set up Nessus for the day after Patch Tuesday to see which devices have already pushed those updates from Microsoft, so we can stay updated."
"Its initial setup was simple and straightforward."
"Overall, I'd rate NodeZero at nine to 9.5 out of ten."
"Penetration testing and scans are useful features."
"Honestly, it's one of the most transformational technologies we've implemented in our company."
"For us, The NodeZero Platform is literally the single best security solution we have because the way that it works is we're able to scan every part of our network, both internally and externally, and then get completely actionable feedback that doesn't matter if it's for an application developer or a network admin."
"The NodeZero Platform is amazing; what I love most about it is that it's automated and comparable to the manual pen testing we did with a third-party company, but with the added benefit of unlimited retesting to validate fixes."
"After the third party conducts the pen test, The NodeZero Platform is run, and it finds the same things they found and sometimes a few other things that they did not even identify."
"I rate the stability of the NodeZero Platform a ten out of ten."
"The NodeZero Platform's real attack capabilities help identify vulnerabilities on my on-premise systems by adding an element of validation and offensive security testing on top of known vulnerabilities. The feature that allows security teams to fix and retest vulnerabilities instantly is very useful, even though it may not happen literally 'instantly.' It's a necessary tool for any organization to understand whether vulnerabilities are genuinely exploitable by attackers. With its near-real-time testing capabilities, it's an essential part of any security portfolio."
 

Cons

"The price could be more reasonable. I used the free Nessus version in my lab with which you can only scan 16 IP addresses. If I wanted to put it in the lab in my network at work, and I'm doing a test project that has over 30 nodes in it, I can't use the free version of Nessus to scan it because there are only 16 IP addresses. I can't get an accurate scan. The biggest thing with all the cybersecurity tools out there nowadays, especially in 2020, is that there's a rush to get a lot of skilled cybersecurity analysts out there. Some of these companies need to realize that a lot of us are working from home and doing proof of concepts, and some of them don't even offer trials, or you get a trial and it is only 16 IP addresses. I can't really do anything with it past 16. I'm either guessing or I'm doing double work to do my scans. Let's say there was a license for 50 users or 50 IP addresses. I would spend about 200 bucks for that license to accomplish my job. This is the biggest complaint I have as of right now with all cybersecurity tools, including Rapid7, out there, especially if I'm in a company that is trying to build its cybersecurity program. How am I going to tell my boss, who has no real budget of what he needs to build his cybersecurity program, to go spend over $100,000 for a tool he has never seen, whereas, it would pack the punch if I could say, "Let me spend 200 bucks for a 50 user IP address license of this product, do a proof of concept to scan 50 nodes, and provide the reason for why we need it." I've been a director, and now I'm an ISO. When I was a director, I had a budget for an IT department, so I know how budgets work. As an ISO, the only thing that's missing from my C-level is I don't have to deal with employees and budgets, but I have everything else. It's hard for me to build the program and say, "Hey, I need these tools." If I can't get a trial, I would scratch that off the list and find something else. I'm trying to set up Tenable.io to do external PCI scans. The documentation says to put in your IP addresses or your external IP addresses. However, if the IP address is not routable, then it says that you have to use an internal agent to scan. This means that you set up a Nessus agent internally and scan, which makes sense. However, it doesn't work because when you use the plugin and tell it that it is a PCI external, it says, "You cannot use an internal agent to scan external." The documentation needs to be a little bit more clear about that. It needs to say if you're using the PCI external plugin, all IP addresses must be external and routable. It should tell the person who's setting it up, "Wait a minute. If you have an MPLS network and you're in a multi-tenant environment and the people who hold the network schema only provide you with the IP addresses just for your tenant, then you are not going to know what the actual true IP address that Tenable needs to do a PCI scan." I've been working on Tenable.io to set up PCI scans for the last ten days. I have been going back and forth to the network thinking I need this or that only to find out that I'm teaching their team, "Hey, you know what, guys? I need you to look past your MPLS network. I need you to go to the edge's edge. Here's who you need to ask to give me the whitelist to allow here." I had the blurb that says the plugin for external PCI must be reachable, and you cannot use an internal agent. I could have cut a few days because I thought I had it, but then when I ran it, it said that you can't run it this way. I wasted a few hours in a day. In terms of new features, it doesn't require new features. It is a tool that has been out there for years. It is used in the cybersecurity community. It has got the CV database in it, and there are other plugins that you could pass through. It has got APIs you can attach to it. They can just improve the database and continue adding to the database and the plugins to make sure those don't have false positives. If you're a restaurant and you focus on fried chicken, you have no business doing hamburgers."
"There is room for improvement in finishing the transition to the cloud. We'd like to see them keep on improving the Tenable.io product, so that we can migrate to it entirely, instead of having to keep the Tenable.sc on-prem product."
"One area with room for improvement is instead of there just being a PDF format for output, I'd like the option of an Excel spreadsheet, whereby I could better track remediation efforts and provide reporting off of that."
"Scans aren't done properly and some devices aren't pinged."
"The user interface of Tenable Nessus feels outdated and could be more user-friendly."
"Remediation needs improvement."
"Some things in the user interface could be better. The user interface could allow more adjustments to plugins. The price could also be better."
"It wasn't very clear how the scripts are running the scans. There's information about the script but it's not straightforward. The script information for each of the plugins should be available, but it doesn't give us straightforward direct information about how it was executed. That needs to be more clear."
"One of the areas where improvement is needed is in the visibility and reporting for large enterprises."
"The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools that would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning since the process is currently manual."
"Sometimes even their support doesn't know why we're seeing certain issues."
"The reports are quite useless."
"The only issue we’ve encountered is that sometimes the scans take a long time to complete."
"They've added a chatbot which isn't particularly useful, but when it can't answer questions, it forwards messages to human support."
"I encountered challenges with patch management, as we struggled to test and implement patches due to time constraints. This led to our patch management process being ineffective."
"You need to be cautious about what it scans, as it could potentially cause issues."
 

Pricing and Cost Advice

"The product pricing is dynamic and varies based on the specific needs of each project and customer."
"The is a free version of Tenable Nessus available."
"The price is okay. I would give it a seven out of ten, where one is cheap and ten is expensive."
"The solution has free options."
"The solution is worth the cost. It's a good investment."
"Tenable Nessus needs to be licensed. We own a license for the security center and that license is charged by the number of IP addresses that you can scan. You're allowed to have as many scanners as you want and there's no license for the number of scanners. We have a bunch of Nessus scanners out there, and as long as we're comfortable with staying under that IP address limit, that's really all we have to be concerned about."
"Nessus Manager is not an expensive product. It has its limitations, but the pricing reflects that. We have a yearly subscription."
"Nessus is affordable, but its licensing model could be improved with more flexibility for adding assets."
Information not available
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
881,707 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
10%
Government
10%
Manufacturing Company
10%
Computer Software Company
10%
Computer Software Company
9%
Manufacturing Company
8%
Comms Service Provider
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business39
Midsize Enterprise19
Large Enterprise35
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

How would you choose between Rapid7 InsightVM and Tenable Nessus?
You have full visibility across cloud, network, virtual, and containerized infrastructures with Rapid7 Insight VM. You can easily prioritize vulnerabilities using attacker analytics. Overall, Rapid...
What's the difference between Tenable Nessus and Tenable.io Vulnerability Management?
Tenable Nessus is a vulnerability assessment solution that is both easy to deploy and easy to manage. The design of the program is such that if a company should desire to handle the installation t...
What do you like most about Tenable Nessus?
We have around 500 virtual machines. Therefore, we conduct monthly scans and open tickets for our developers to address identified vulnerabilities. These scans cover the servers, other network equi...
What do you like most about Horizon3.ai?
Penetration testing and scans are useful features.
What needs improvement with Horizon3.ai?
I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good.
What is your primary use case for Horizon3.ai?
We use The NodeZero Platform for control validation and we are also looking for the likelihood of vulnerabilities.
 

Also Known As

No data available
Horizon3.ai
 

Overview

 

Sample Customers

Bitbrains, Tesla, Just Eat, Crosskey Banking Solutions, Covenant Health, Youngstown State University
Government agencies, Defense Industrial Base organizations, and enterprises in regulated industries such as finance, healthcare, manufacturing, and criticalinfrastructure rely on NodeZero to meet rigorous security and compliance requirements with continuous, scheduled, and on-demand testing.
Find out what your peers are saying about Tenable Nessus vs. The NodeZero Platform by Horizon3.ai and other solutions. Updated: December 2025.
881,707 professionals have used our research since 2012.