

Tenable Nessus and Vicarius vRx are prominent competitors in vulnerability management. Tenable Nessus holds an upper hand due to its extensive feature set and cost-effectiveness for larger enterprises.
Features: Tenable Nessus offers automated vulnerability detection, extensive database integrations, and predictive prioritization. Vicarius vRx provides unique patchless protection, automation features, and efficient patch deployment for third-party applications.
Room for Improvement: Tenable Nessus could improve in reporting, user interface, and extend support for scanning beyond basic network devices. Vicarius vRx can enhance network scanning, simplify reporting processes, and improve application management.
Ease of Deployment and Customer Service: Tenable Nessus offers on-premises and hybrid cloud deployments, with generally reliable customer service but some reported delays. Vicarius vRx uses public cloud deployment, which simplifies setup, supported by effective and responsive customer service.
Pricing and ROI: Tenable Nessus is cost-effective with subscription pricing for unlimited IP scanning, providing strong ROI by preventing security breaches. Vicarius vRx utilizes a per-asset pricing model, which is scalable but may appear more expensive.
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
Their support is very good, and they respond quickly.
During the POC and the implementation, they were very available and made their best efforts to help us.
Whenever I've contacted them, they respond promptly with a callback or by email.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
It is very simple; you just script it, and then the computers connect themselves.
When we attempted to scale this and update 200 systems, that just locked it.
We have some clients with up to a thousand agents.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
The stability of Tenable Nessus is extraordinary.
There are some issues that they do not even know how to fix at this point.
I would rate the stability of Vicarius vRx ten out of ten.
There are some issues like high CPU usage during updates, but these were fixed.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
An AI feature that helps them discover options without requiring them to deep dive into all features or guides them through advisory functions would be beneficial.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
I am pretty sure that the tool works great when it comes to Windows, but when you are in an environment that has different flavors of Linux at different version levels, that may pose an issue.
We have the ability to search across the network for all switches, routers, and printers, but some devices might be outdated and have vulnerabilities.
Enhancing Vicarius vRx with improved third-party integrations, like notifications for external systems, and increased cloud integration for richer instance information, would be valuable improvements.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
When we compare it to other solutions, it is more difficult for us to negotiate the price for Tenable Nessus than to negotiate the price with Rapid7.
It was very cheap.
In the past, Vicarius vRx was cheap, but now they have adjusted their pricing policy, resulting in higher renewal costs.
From a pricing perspective, Vicarius was cheaper compared to other competitors.
I mostly use the configuration audit feature for the audit configuration as a scan policy, and I will use it for credential audit, which helps me scan credentials access such as local administrator or root access, performing a deeper and more accurate check of local configuration settings and file systems, making it a highly recommended feature.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
It's a valuable tool that reduces tension between IT and security teams by providing time to properly install patches.
The system prioritizes vulnerabilities, identifying high, medium, and low risks, allowing us to focus on high-risk applications.
The most valuable feature is the system's ability to provide information about open CVEs and how it compares the local version with available updates.
| Product | Mindshare (%) |
|---|---|
| Tenable Nessus | 5.0% |
| Vicarius vRx | 0.9% |
| Other | 94.1% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 7 |
| Large Enterprise | 3 |
Tenable Nessus enhances cybersecurity by detecting vulnerabilities with comprehensive scanning, user-friendly dashboards, and automated reporting, providing value in asset management, configuration audits, and compliance.
Providing real-time monitoring and ease of use, Nessus stands out with its integration capabilities, predictive prioritization, extensive plugin system, and cost-effectiveness. It supports vulnerability assessments for networks, applications, and devices, offering detailed reports for continuous security improvement. Nessus' capabilities extend across on-premise and cloud deployments, aiding compliance and remediation processes while aligning with security standards. While robust, it could benefit from enhanced cloud capabilities, improved scanning accuracy, and more flexible licensing options.
What are the standout features of Tenable Nessus?Tenable Nessus is implemented widely across industries for internal and external vulnerability assessments and management, aiding organizations in scanning servers, workstations, and network devices. Benefiting sectors prioritize security within their unique environments, leveraging Nessus for its thorough reports and compliance assurance.
Vicarius vRx automates patching and vulnerability mitigation with patchless protection, appreciated for effective third-party app patching and vulnerability prioritization. The platform offers streamlined management via intuitive dashboards, consolidating vulnerability discovery and remediation.
Vicarius vRx streamlines the patching and vulnerability mitigation process, delivering automation through patchless protection. It is favored for its ability to handle third-party applications effectively while providing vulnerability prioritization. The platform's intuitive dashboards allow for efficient management, consolidating vulnerability discovery and remediation efforts. Users note the robust scripting engine and supportive community as significant assets in mitigating critical threats, reducing manual effort and remediation time. Despite the strengths, enhancements in areas like automating patchless solutions, simplifying the login process, and refining networking vulnerability scanning capabilities are needed. The patch update process, reporting, and scripting functionalities require improvements. Name changes have resulted in some confusion, and additional filtering options are desired, along with better cloud integration and system feedback on update statuses. Logging options and mobile device management support are sought after by organizations.
What are the key features of Vicarius vRx?Managed service providers utilize Vicarius vRx for compliance needs, focusing on PCI and HIPAA requirements, vulnerability management, and patching. They use it extensively for patch management, covering both Microsoft and third-party updates, and for centralized update management. It aids in achieving visibility and automation, ensuring quick application of necessary patches across numerous assets while enhancing cybersecurity effectiveness with its network functionality and audit compliance features.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.