We have clients, and we are a vendor. We have deployed Tenable Nessus users with the help of the Principal on the client's environment. I have experience with the deployment and the scanning.
Information security engineer at Cyberisk
Has individual options available for web servers
Pros and Cons
- "The features I personally like include host discovery."
- "The support has been really cooperative."
- "Sometimes, the categorization for clients was tricky at first, however, they eventually got used to it."
What is our primary use case?
What is most valuable?
The features I personally like include host discovery. For web servers, there are individual options available. There are many options that are useful to us.
What needs improvement?
Sometimes, the categorization for clients was tricky at first, however, they eventually got used to it.
What do I think about the stability of the solution?
I haven't faced any issues as of now. It has been stable with no critical issues, technical issues, or downtimes.
Buyer's Guide
Tenable Nessus
September 2025

Learn what your peers think about Tenable Nessus. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
How are customer service and support?
The support has been really cooperative. Whenever any issue arises, we contact the support, and they are always there for us. The support is pretty good.
How would you rate customer service and support?
Positive
What about the implementation team?
The deployment was done by the Tenable team, and I was part of this process.
What other advice do I have?
I definitely recommend Tenable Nessus for network scanning and other tasks.
I'd rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. partner

Information Security Analyst at a retailer with 1,001-5,000 employees
You can customize the tool to scan exactly what you want
Pros and Cons
- "My favorite part about Nessus is that you can customize the tool to scan exactly what you want. Microsoft releases new patches monthly on Patch Tuesday, and a lot of companies track that date. I set up Nessus for the day after Patch Tuesday to see which devices have already pushed those updates from Microsoft, so we can stay updated."
- "You can scale Nessus to the extent that you can afford it. You need to have a license for every device you scan. As long as you can afford the increased costs, you won't have a problem scaling it."
What is our primary use case?
Tenable Nessus is vulnerability management software. We install Nessus scanners on all our workstations and laptops. It runs scans to check for outdated software and vulnerabilities. At the beginning of each month, I send notes out to the admins about what needs to be updated, and I check at the end of the month to make sure it's done.
How has it helped my organization?
Nessus helps us keep our software up to date to avoid security vulnerabilities. It's a good tool for auditing our vulnerability management.
What is most valuable?
My favorite part about Nessus is that you can customize the tool to scan exactly what you want. Microsoft releases new patches monthly on Patch Tuesday, and a lot of companies track that date. I set up Nessus for the day after Patch Tuesday to see which devices have already pushed those updates from Microsoft, so we can stay updated.
Tenable stays on top of new IT trends in vulnerability management because there's constant innovation. They keep up with the industry. In the past few years, everything has shifted to cloud-based servers. It's a long-term trend that COVID accelerated. Tenable came out with a tool for that.
What do I think about the stability of the solution?
Nessus is pretty stable if you have a disaster recovery plan in place. We've never had an outage. The stability depends on the servers where it is running.
What do I think about the scalability of the solution?
You can scale Nessus to the extent that you can afford it. You need to have a license for every device you scan. As long as you can afford the increased costs, you won't have a problem scaling it.
How are customer service and support?
I rate Tenable support 10 out of 10. They're top-of-the-line. It's the best support I've worked with so far.
How would you rate customer service and support?
Positive
What other advice do I have?
I rate Tenable Nessus nine out of 10. I recommend creating a Tenable Community account. Tenable uses that for support, but they also have a massive library of training videos that they call Tenable University. You can also access the Tenable Community forums where experts and general users can share information and ask questions.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Tenable Nessus
September 2025

Learn what your peers think about Tenable Nessus. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Senior Consultant at Tata Consultancy
A mature product that's easy to set up and offers reasonable pricing
Pros and Cons
- "The solution can scale well."
- "We'd like to see the solution embrace more user-friendliness."
What is our primary use case?
Tenable is for scanning the vulnerabilities on the endpoint. That's the prime use case. It can also be extended for scanning web publications, et cetera.
What is most valuable?
Nessus is a very stable product. And it has been a pioneer and has been around for a long time. Their vulnerability dashboards are very good to use.
It is easy to set up.
The solution can scale well.
The pricing is reasonable.
What needs improvement?
While the pricing is quite good, any client would, of course, like it to be a bit less.
We'd like to see the solution embrace more user-friendliness. That said, currently, we are happy with the product.
For how long have I used the solution?
I've used the solution for a while. it's been a couple of years.
What do I think about the stability of the solution?
It is a stable, reliable product. The performance is good. There are no bugs or glitches. It doesn't crash or freeze.
What do I think about the scalability of the solution?
I have found the product to be scalable.
How are customer service and support?
We generally don't have a lot of requirements for tech support with Tenable. We have been using it for so long, we have received quite a good amount of training from them at this point. Therefore, we don't look for a lot of tech support.
How was the initial setup?
The setup is quite straightforward and simple. I wouldn't describe the process as overly complex.
The deployment time depends on how the endpoints are distributed. If it is a single one within one country and one region, it is very fast. We can do it in less than three months.
What about the implementation team?
We are consultants. We can assist users with the setup process.
What's my experience with pricing, setup cost, and licensing?
It's not an overly expensive solution. It's pretty affordable.
Users pay an annual licensing fee.
What other advice do I have?
I'm a consultant.
We can deploy the solution either on-premises or on the cloud.
I'd advise potential new users to look at what the landscape is. And based on the landscape, they should be able to fit the product. You need to first consider your strategy and build towards that. We would recommend this solution to others if it seems to fit their needs.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Chief Executive Officer at a outsourcing company with 11-50 employees
User-friendly, easy to install, has good functionality, and technical support
Pros and Cons
- "The results are not that bad, but the key selling point is that it is an affordable tool set."
- "They have added a new Tenable Nessus Expert. That is their new product, which caters to the cloud and everything else. I am assuming that the new features and product enhancements are based on that tool set, but we haven't reviewed it yet."
What is our primary use case?
We use Tenable Nessus for vulnerability scanning.
What is most valuable?
The results are not that bad, but the key selling point is that it is an affordable tool set.
It is a very easy tool to use.
We are happy with the existing features.
We are happy with the functionality, and what we get from the tool.
What needs improvement?
I am not sure. I see they have released new products that we haven't yet evaluated. I believe the new products are the opportunity for improvement that they are bringing to market. But for the time being,
They have added a new Tenable Nessus Expert. That is their new product, which caters to the cloud and everything else.
I am assuming that the new features and product enhancements are based on that tool set, but we haven't reviewed it yet.
For how long have I used the solution?
I have been working with Tenable Nessus for 10 years.
It's a proper toolkit, it goes a long way with us.
We are working with the latest version.
What do I think about the stability of the solution?
Tenable Nessus is very stable.
I would rate the stability of this solution a five out of five.
What do I think about the scalability of the solution?
Tenable Nessus is a scalable solution, I would rate the scalability a five out of five.
It is based on the number of endpoints. We have 1,500 endpoints in our company.
How are customer service and support?
We can contact technical support using their web console. We can log a support ticket as end users, although we seldom use this feature.
I would rate their technical support a five out of five.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are also working with Rapid7 InsightVM.
It is not as good as Rapid7 from our perspective, but it is part of our toolbox arsenal. As a result, we have it on board and solely use it internally.
How was the initial setup?
It is very easy to deploy.
This solution was deployed in 30 minutes, or less. It is very easy. It is straightforward, and out of the box.
What about the implementation team?
The deployment was completed in-house. We did it ourselves.
We only need one engineer to deploy and maintain this solution.
What was our ROI?
I would rate the return on investment a five out of five.
What's my experience with pricing, setup cost, and licensing?
Cost-wise, it's an affordable tool.
Licensing fees are paid annually.
I would rate the licensing cost a five out of five.
What other advice do I have?
I would rate Tenable Nessus a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Principal Security Architect at a tech vendor with 10,001+ employees
Is easy to use and configure, and has a lot of plugins
Pros and Cons
- "The ease of use is the primary valuable feature. This specific version is very straightforward. I like the ability to modify it and configure it based on the different policies."
- "Multiple user access would be an area for improvement from a user-access perspective. A role-based access control feature would be great because at present, there is a limitation with only one account. If that account gets compromised or gets locked, then we will encounter problems."
What is our primary use case?
We use it predominantly for vulnerability scanning and compliance scanning as part of the vulnerability and compliance protocols in one of our programs.
What is most valuable?
The ease of use is the primary valuable feature. This specific version is very straightforward. I like the ability to modify it and configure it based on the different policies.
I also like the number of plugins. It has quite a lot of plugins that keep it up to date with the different vulnerabilities coming out.
What needs improvement?
Multiple user access would be an area for improvement from a user-access perspective. A role-based access control feature would be great because at present, there is a limitation with only one account. If that account gets compromised or gets locked, then we will encounter problems.
It would be good to have a way to store filters from searches so that you don't have to recreate them from scratch every time. To be able to have them saved as a list of filters would be really useful.
It would be really useful to have a way to assess the risk of a specific vulnerability based on a number of factors which could be tailored. It could be a tailored set of factors you introduce to see a potential risk score or a different view of the CVSS score.
A lot of organizations do this manually, and some of them have some other ways of identifying or assessing the risk of vulnerabilities. It would be really useful to have a framework which allows you to create a way to assess the risk of vulnerabilities on the platform and potentially prioritize them or provide information as a report to management or to other teams for resolution.
It would be really nice to have a way to visualize the different results from the scans. For example, if you scan a Windows 2016 Server and you have a number of vulnerabilities, it would be nice to somehow show the vulnerabilities in a graphical format and potentially combine some of the outcomes into a graphical representation showing trending. Trending is quite important, especially when I speak to my senior management stakeholders and try to show the security posture and status. It would help to provide a long and wide view of where the vulnerabilities are and what kind of aging is present.
For how long have I used the solution?
I've used it for three and a half years.
What do I think about the stability of the solution?
Nessus Manager is very stable; I haven't had any problems. I'd give the stability of the product a five out of five.
What do I think about the scalability of the solution?
The product itself is not scalable by design. It is a single-user product, so it doesn't allow you to have multiple users at the same time. You have only one account. The type of product that we're using is not really meant for huge enterprises, and it's a bit more limited in terms of usage.
At present, I use the personal version for the account I'm looking after, but we probably have less than five people using this platform.
How was the initial setup?
The initial setup was easy.
What about the implementation team?
We implemented it ourselves. The deployment was done by one engineer, and it did not take too long.
What was our ROI?
The project in which I have been using it, it has been great because we satisfy a very crucial requirement. We have brought around vulnerability management, so it's really good ROI for what we have.
What's my experience with pricing, setup cost, and licensing?
Nessus Manager is not an expensive product. It has its limitations, but the pricing reflects that.
We have a yearly subscription.
What other advice do I have?
I would recommend Nessus Manager and rate it at eight on a scale from one to ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at a computer software company with 11-50 employees
Simple implementation, beneficial vulnerability assessments, and helpful support
Pros and Cons
- "The most valuable feature of Tenable Nessus is vulnerability assessments. There are a lot of threats around the world and this solution is the first to come out with detection rules."
- "Tenable Nessus could improve the reporting by adding some dashboards. The reports are a hassle at this time. Tenable.io has more detailed reports. Having a better dashboard that can show where the vulnerabilities are and be categorized would be helpful. We then could present them to upper management for a deep overview of our network posture which they do not see."
What is our primary use case?
We are using Tenable Nessus for vulnerability management. Not exactly the management, but we perform vulnerability assessments mostly for internal networks. Additionally, we use Acunetix and it comes into play for the web application.
What is most valuable?
The most valuable feature of Tenable Nessus is vulnerability assessments. There are a lot of threats around the world and this solution is the first to come out with detection rules.
What needs improvement?
Tenable Nessus could improve the reporting by adding some dashboards. The reports are a hassle at this time. Tenable.io has more detailed reports. Having a better dashboard that can show where the vulnerabilities are and be categorized would be helpful. We then could present them to upper management for a deep overview of our network posture which they do not see.
For how long have I used the solution?
I have been using Tenable Nessus for approximately seven years.
What do I think about the stability of the solution?
Tenable Nessus is stable.
What do I think about the scalability of the solution?
Tenable Nessus is scalable, it can scale up and down.
We have five or six people using this solution occasionally. We have monthly schedules for scanning, the solution is not used daily.
How are customer service and support?
The support of Tenable Nessus is responsive and helpful.
I rate the support from Tenable Nessus a five out of five.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have previously used Acunetix and they are more focused on web applications instead of vulnerability assessments. Tenable Nessus lacks in this area, they should focus more on the web applications side.
How was the initial setup?
The initial setup of Tenable Nessus is straightforward. There is helpful documentation that is provided.
I rate the setup of Tenable Nessus a five out of five.
What about the implementation team?
We did the implementation of the solution in-house.
What's my experience with pricing, setup cost, and licensing?
When comparing the price of Tenable Nessus to other similar solutions, such as Acunetix, Tenable Nessus is not as expensive. It is averagely priced in the market. We pay for the solution annually.
What other advice do I have?
My advice to others wanting to implement this solution is they need to understand what will be scanned. For example, if they are using internal servers or something similar, and is it on the cloud, or web applications, this is something they need to know. It's a good idea to evaluate these things on their end before choosing to use the solution. This solution focuses more on the servers or the network security side. Acunetix focuses more on the web application side. This is where the buyer has to evaluate and know their use case.
I rate Tenable Nessus a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Manager at Clearsale
Does everything that it needs to, provides good value for money, and is very easy to use
Pros and Cons
- "I like this solution because it is complete. It can scan and check many types of vulnerabilities. It can also check for compliance."
- "There should be a possibility to install agents on scanned machines. Tenable IO provides the capability of using local agents to check local problems, but this feature is not there in Tenable Nessus Professional. It would be nice to have something similar in Tenable Nessus Professional. We should have the capability to use local agents installed on the machines to locally check a problem."
What is our primary use case?
I am using it for scanning and checking vulnerabilities. I am using the Azure version of Tenable Nessus.
What is most valuable?
I like this solution because it is complete. It can scan and check many types of vulnerabilities. It can also check for compliance.
It fits very well in my environment. It is very easy to use, and there is a very good cost-benefit of this solution.
What needs improvement?
There should be a possibility to install agents on scanned machines. Tenable IO provides the capability of using local agents to check local problems, but this feature is not there in Tenable Nessus Professional. It would be nice to have something similar in Tenable Nessus Professional. We should have the capability to use local agents installed on the machines to locally check a problem.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is, for sure, scalable. We have 10 or 12 people who use this solution.
How are customer service and support?
We never have any kind of problem or lack of response. I would rate them a ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
It is very easy. It is pretty straightforward.
What's my experience with pricing, setup cost, and licensing?
It has a fair cost and very good cost-benefit ratio.
What other advice do I have?
I would recommend it to others. It does everything that such a solution needs to do. It can check for vulnerabilities and compliance. It is also very easy to use. It is better than its competitors, such as Rapid7.
I trust Tenable solutions. I have worked with Tenable IO a few years ago, and with Tenable Nessus, I had the same feeling that I had with Tenable IO. It is a very good solution. It is more expensive than Tenable IO, but it is a complete solution.
I would rate it a nine out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Assistant Director for Computing and Network infrastructure at SRCE
Helps to conduct monthly scans and open tickets for developers to address identified vulnerabilities
Pros and Cons
- "We have around 500 virtual machines. Therefore, we conduct monthly scans and open tickets for our developers to address identified vulnerabilities. These scans cover the servers, other network equipment, and appliances in our infrastructure."
- "One significant drawback we encounter is the tool's tendency to flag patched packages incorrectly. For instance, if a package is patched by Debian maintainers but not updated to a major or minor version, Nessus may still flag it as vulnerable based on its database. This discrepancy leads to false alarms and requires our developers, system admins, and DevOps teams to address them."
What is our primary use case?
We have around 500 virtual machines. Therefore, we conduct monthly scans and open tickets for our developers to address identified vulnerabilities. These scans cover the servers, other network equipment, and appliances in our infrastructure.
What needs improvement?
One significant drawback we encounter is the tool's tendency to flag patched packages incorrectly. For instance, if a package is patched by Debian maintainers but not updated to a major or minor version, Nessus may still flag it as vulnerable based on its database. This discrepancy leads to false alarms and requires our developers, system admins, and DevOps teams to address them.
It would be beneficial if it could handle minor additions to versions similar to how Debian manages its patches. This feature would allow it to differentiate between patched and non-patched versions.
For how long have I used the solution?
I have been using the product for ten years.
What do I think about the stability of the solution?
Tenable Nessus is very stable. We encountered some issues with scanning certain network equipment but resolved them by adjusting the parameters. Our main focus is scanning our servers; we haven't experienced any significant problems with that process.
What do I think about the scalability of the solution?
My company has three users.
How are customer service and support?
We haven't contacted Tenable Nessus for assistance or questions because we haven't encountered any serious issues, and we are generally satisfied with the product.
Which solution did I use previously and why did I switch?
We chose Tenable Nessus because we primarily rely on open-source products as a publicly funded institution. About ten years ago, we conducted research to determine the best option, and at that time, it stood out as the preferred choice.
How was the initial setup?
Tenable Nessus' deployment is straightforward.
What's my experience with pricing, setup cost, and licensing?
The product is free.
What other advice do I have?
I rate the overall product a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Tenable Nessus Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Vulnerability ManagementPopular Comparisons
Microsoft Defender for Cloud
SentinelOne Singularity Cloud Security
Qualys VMDR
Tanium
Tenable Security Center
JFrog Xray
Tenable Vulnerability Management
Orca Security
Claroty Platform
Acunetix
Zafran Security
Microsoft Defender Vulnerability Management
Trend Vision One - Cloud Security
Lacework FortiCNAPP
Buyer's Guide
Download our free Tenable Nessus Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Qualys VM vs Tenable Nessus: Comparison
- How would you choose between Rapid7 InsightVM and Tenable Nessus?
- What's the difference between Tenable Nessus and Tenable.io Vulnerability Management?
- How does Tenable Nessus compare with Qualys VM?
- What are the main differences between Qualys VMDR and Tenable Nessus?
- How inadvisable is it to use a single vulnerability analysis tool?
- What are the benefits of continuous scanning for vulnerability management?
- When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
- What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
- What are the main KPIs that need to be implemented to have better posture in vulnerability projects?