

Tenable Security Center and XM Cyber compete in the cybersecurity landscape. Tenable Security Center appears to have a stronger focus on comprehensive vulnerability management, while XM Cyber stands out for advanced threat simulation.
Features: Tenable Security Center offers extensive asset coverage, detailed vulnerability insights, and robust risk assessment capabilities. It ensures comprehensive vulnerability tracking and reporting. XM Cyber provides advanced breach and attack simulation tools, emphasizing continuous cyber risk assessment and proactive mitigation strategies.
Room for Improvement: Tenable Security Center may benefit from enhanced cloud capabilities, more streamlined deployment processes, and improved simulation features. XM Cyber could focus on expanding its asset coverage, providing more detailed vulnerability insights, and reinforcing reporting functionalities.
Ease of Deployment and Customer Service: Tenable Security Center uses a traditional deployment model, with potentially longer initial setup times, but offers strong customer support for integration and maintenance. XM Cyber features a streamlined deployment process with a cloud-first approach, leading to quicker setup and potentially more agile customer service experiences.
Pricing and ROI: Tenable Security Center may involve higher initial setup costs due to its extensive feature set but delivers significant ROI through comprehensive vulnerability management. XM Cyber offers competitive pricing and a potentially quicker ROI, focusing on simulated threat assessments and proactive security measures.
If we cannot adjust how to operate the solution, then it becomes very difficult, so hearing and initial tuning are very important.
Through the use of Tenable Security Center, my clients achieve more efficient patching and gain visibility and understanding of security operations, leading to improved resilience and infrastructure insight.
There was a specific issue that our other security tooling did not pick up, but XM Cyber did.
It's reduced the timescale to remediate vulnerabilities that are identified as representing a high risk.
Longer response times and less thorough assistance.
They are helpful and were very helpful to us, coordinating with us on several issues.
The customer support is fantastic; it's probably some of the best we've received across all our security vendors.
Customer support for XM Cyber is good, responsive, and it follows up on issues.
I can scale it extensively with the use of agents, allowing scanning in restrictive environments and loosely connected devices.
Scalability is a bit limited with Tenable Security Center.
Its scalability is great; it's easy to deploy and fully scalable.
We have not experienced any issues with scalability or reached its limits.
The stability of the solution is outstanding.
We have quite a complex and large IT estate, and we've certainly experienced no limitations or problems arising from the ability of XM Cyber's product to scale across that estate.
It's important for Tenable to catch up on testing capabilities that are present in solutions like Qualys.
The reports and plugins for reports and scans could benefit from enhancements.
Translating reports into European languages is especially relevant in Central Eastern Europe, where clients often require reports in local languages.
We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments.
They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks.
The part that can be improved is the mobile exposure and the IBM i specific equipment.
The product is somewhat pricey, reflecting its valuable features and status as a high-quality solution in the vulnerability management market.
Tenable Security Center is quite expensive, particularly for the CEE region, causing us to lose cases due to its pricing.
The price of Tenable Security Center is not so high; it's relatively a cheaper solution.
We have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the complication, the number of PCs and servers that we have.
We obtained good reports showing when patches were closed and the details of each patch, including who executed it and everything related to the patching process until it was closed.
Tenable Security Center provides an overall score of vulnerabilities, comparing an organization with others in the same industry.
The most effective feature of Tenable Security Center for detecting vulnerabilities is its capability for critical mapping.
Our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
By far, the best feature of XM Cyber is being able to map out the way vulnerabilities can be exploited based on what they call the choke points in the network where the path that a bad actor would take comes closest to assets within our environment that are most vulnerable but also most valuable.
XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.
| Product | Mindshare (%) |
|---|---|
| Tenable Security Center | 2.8% |
| XM Cyber | 1.0% |
| Other | 96.2% |

| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 10 |
| Large Enterprise | 27 |
Tenable Security Center offers vulnerability scanning, reporting, and customizable dashboards, aiding in security posture enhancement through Asset Discovery and Vulnerability Priority Rating. Its user-friendly interface and third-party integration support provide real-time insights and risk assessment.
Tenable Security Center efficiently manages vulnerabilities, offering valuable analytics, risk prioritization, and real-time insights. It supports automated updates, false-positive reduction, and compliance reporting. Users benefit from its asset discovery capabilities and its integrations with third-party tools. However, there's room for improvement in reporting customization, integration with tools like Jira, and the accuracy and speed of vulnerability scanning. The system could enhance its dynamic data displays, language support, and offer more pricing flexibility. While valued for scanning servers, workstations, and IoT devices, the setup complexity and policy modification challenges are noted.
What are the key features?Organizations in sectors like IT, finance, and healthcare implement Tenable Security Center for vulnerability management across internal and cloud networks. It facilitates compliance with industry standards and aids IT teams in conducting network-wide assessments, streamlining patch management, and strengthening overall security.
XM Cyber quantifies risk for different organizational levels, enhances patching by targeting choke points, and offers precise attack simulations, optimizing management time and vulnerability resolutions.
XM Cyber empowers organizations to identify significant risks by focusing on choke points and improving patching strategies. The platform excels in providing reliable and precise simulations, informing users about critical vulnerabilities without false positives. It enhances vulnerability management and internal reconnaissance, reducing loss exposure while supporting attack surface management. Users seek improved mobile exposure capabilities and IBM i specific solutions along with better visualization and AI integration.
What are the key features of XM Cyber?XM Cyber is deployed to manage risks in internet-exposed assets and hybrid cloud environments. Its implementation allows organizations to optimize IT resources by identifying vulnerabilities in critical attack paths, thus enhancing efficiency and supporting robust security strategies across industries.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.