I am using Tenable SC to detect vulnerabilities, and we are in the process of testing the solution.
Solution and Demand Manager at SFR
Reliable, useful reports, but initial report configuration could improve
Pros and Cons
- "The most valuable features of Tenable SC are the reports and the dashboards."
- "Tenable SC could improve by making the creation of the initial reports easier that correspond to our network."
What is our primary use case?
What is most valuable?
The most valuable features of Tenable SC are the reports and the dashboards.
What needs improvement?
Tenable SC could improve by making the creation of the initial reports easier that correspond to our network.
For how long have I used the solution?
I have been using Tenable SC for three months.
Buyer's Guide
Tenable Security Center
April 2025

Learn what your peers think about Tenable Security Center. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,604 professionals have used our research since 2012.
What do I think about the stability of the solution?
The stability of the solution is good. We have not had any problem.
What do I think about the scalability of the solution?
We use the solution approximately 20 hours per week. We have three people that use the solution to do tests.
How are customer service and support?
I have not used the support from Tenable SC.
Which solution did I use previously and why did I switch?
I have used Nessus Professional previously. I prefer Tenable SC because it provides more information.
How was the initial setup?
The setup of Tenable SC is easy.
What about the implementation team?
We have a consultant in France that has helped us with the solution.
What's my experience with pricing, setup cost, and licensing?
The price of Tenable SC is expensive, we pay approximately €70,000 for the license annually. We have to pay for each IP test. The cost of other solutions is far less, such as Nessus Professional, which is €3,000 annually.
What other advice do I have?
This is a good solution for what I use it for. I would recommend it to others.
I rate Tenable SC a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Head Of IT Risk and Security at AWB
The product is our second solution, and we are happy that it meets our requirements
Pros and Cons
- "The product is our second solution, and we are happy that it meets our requirements."
- "We would like to see the inclusion of external IPs and simplified reporting that's easier to deal with"
What is most valuable?
The reporting vulnerability is very helpful when you link it with the people who close it with the admin and support team, giving them the criticality to find how to close each item. And it's up to date with all the vulnerabilities on the market thanks to prompt updates from the cloud.
What needs improvement?
In the next release, we would like to see the inclusion of external IPs and simplified reporting that's easier to deal with.
For how long have I used the solution?
We have been using this solution for about two years.
What do I think about the stability of the solution?
The solution has been very stable up till now. I would give it nine or 10 out of 10 for scalability
What do I think about the scalability of the solution?
For our size, it's scalable. It covers all the bank infrastructure and all that we have.
Two or three people from the security team manage the solution, but they extract it for the IT team to take action in different areas, including infrastructure and domain support. So 10 or more people assess the reports to fix the issues.
How are customer service and support?
We are happy with the support from the Tenable side. But sometimes the vendor's people move between areas too often, causing occasional shortages on technical issues inside the country. When you raise tickets, the vendor sometimes takes some time to respond, but they are always helpful.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously we used Rapid7, but we switched after comparing it with the solution because it had some additional features that we needed.
How was the initial setup?
Overall, the initial setup was smooth and easy. Later we had to integrate it with other solutions in the system, but it didn't take long.
What about the implementation team?
We had a consultant for two weeks at the beginning but in the end, we completed it, doing most of the work ourselves and gaining valuable experience. And, of course, we had to set up our systems inside the bank and the structure of the scope of the vulnerability, so that made it about a month.
Four people were involved in the deployment, two from the vendor and two from our team.
What's my experience with pricing, setup cost, and licensing?
We're happy with the licensing cost and find it affordable.
We paid for three years, mostly for the finances and sourcing, but all features are inclusive.
I would rate our licensing cost as eight on a scale of one to ten.
What other advice do I have?
I would give the product an overall rating of nine out of 10.
The product is a very good solution. I would advise potential users to look at other solutions. The product is our second solution, and we are happy that it meets our requirements.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Tenable Security Center
April 2025

Learn what your peers think about Tenable Security Center. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,604 professionals have used our research since 2012.
Cyber Security Charter Engineer at Banglalink Digital Communications
Automated security scans boost efficiency while saving costs
Pros and Cons
- "The most valuable feature is the automatic and periodic management of security scans, along with the ability to consolidate all information into a single dashboard."
- "The dashboard templates are limited."
What is our primary use case?
The primary use cases are vulnerability management and dashboard creation. I utilize it to exhibit the current security posture to higher management, prioritize which paths to fix first, and identify vulnerabilities. Additionally, I escalate issues to management based on their criticality and business rating.
How has it helped my organization?
Tenable Security Center has significantly contributed to cost savings by identifying numerous bugs and security issues. It assists in safeguarding customer data, which is crucial to avoid fines imposed by local governing authorities.
What is most valuable?
The most valuable feature is the automatic and periodic management of security scans, along with the ability to consolidate all information into a single dashboard. This feature enables me to quickly identify which areas require attention, updating patches, and fixing bugs to stay protected against the latest security attacks.
What needs improvement?
The dashboard templates are limited. More templates that align with our daily needs would be beneficial. Current dashboards are available for Linux, separate unit systems, and other systems, but there aren't dashboards for app-related issues or application patches, such as Apache Tomcat applications or Java applications. This would be helpful.
For how long have I used the solution?
I have been using Tenable Security Center for more than five years.
What do I think about the stability of the solution?
The solution is very stable. Still, it's not perfect. I would rate its stability as nine out of ten.
What do I think about the scalability of the solution?
The solution is very scalable. It integrates easily with the environment, allowing for IP range management and concurrent scanning capabilities. I rate its scalability as nine out of ten.
How are customer service and support?
Customer service is good. That said, there are sometimes delays in response from international support. The support teams can take time to analyze logs. I rate it as eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Qualys in a different organization, which I found difficult to use and not user-friendly. I chose Tenable Security Center for its user-friendly interface and feature set.
How was the initial setup?
The initial setup was considerably tough due to deploying on Linux, yet it was manageable. I would rate its difficulty as seven out of ten.
What about the implementation team?
We engaged partners from Singapore who remotely assisted with the deployment, supported by local partners for configuration and integration with SIEM systems.
What was our ROI?
The ROI is substantial because it prevents data breaches that could lead to significant fines. By continuously updating patches as per Tenable Security Center's reports, we have avoided customer data leaks.
What's my experience with pricing, setup cost, and licensing?
Tenable Security Center is considered pricey compared to other solutions, yet relatively cheaper than some like Qualys. However, when compared to Rapid7, it is more expensive. I rate the pricing six out of ten.
Which other solutions did I evaluate?
I evaluated Qualys and Rapid7 before choosing Tenable Security Center.
What other advice do I have?
Proper configuration and automation are key to success with Tenable Security Center. Automating vulnerability scans and notifications can significantly reduce manual repetitive tasks, leading to better efficiency and time management.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Oct 21, 2024
Flag as inappropriateAssistant Manager Network Security at Institute of Business Administration, Karachi
Provides great advanced scanning and clear visibility across our network
Pros and Cons
- "Has a great advanced scanning feature."
- "The web application is not very functional."
What is our primary use case?
We use Tenable.sc to conduct vulnerability scanning for our networks, and applications, and for the data protection we need in our environment. We are customers of Tenable and I'm the assistant manager of network security.
How has it helped my organization?
It provides us with clear visibility across our environment.
What is most valuable?
The best feature is the advanced scanning for the network.
What needs improvement?
I think the web application should be improved because it's not very functional.
For how long have I used the solution?
We've been using this solution for almost three years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
We haven't had the need to test scalability.
How are customer service and support?
The technical support is not very good. We didn't get a good response when we contacted them. We had to go through all their documentation and get the information we needed from external sources.
How would you rate customer service and support?
Negative
How was the initial setup?
The initial setup is not difficult, it's just a matter of downloading which takes around 25 minutes and then uploading the plugins which takes several hours. I'm the only one in the company that uses this product.
What's my experience with pricing, setup cost, and licensing?
The licensing costs are not expensive. I think we pay around $9,000 USD for an annual subscription. There are no additional expenses.
What other advice do I have?
My recommendation is to stick with the data scanning tool and not worry about downloading the other features.
I rate this solution nine out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Security Specialist at a consultancy with 1,001-5,000 employees
Automatic scanning distribution and the ability to write custom audit files are distinguishing features
Pros and Cons
- "One of the most valuable features is their distributed scan model for allotting engines to work together as a pool and handle multiple scans at once, across multiple environments. Automatic scanning distribution is a distinguishing feature of their toolset."
- "It's good at creating information, it's good creating dashboards, it's good at creating reports, but if you want to take that reporting metadata and put it into another tool, that is a little bit lacking."
What is our primary use case?
Vulnerability assessment and compliance auditing are our primary use cases. That includes baseline configuration scanning. We use it to protect everything in the enterprise environment: servers, workstations, pretty much all operating systems, networking gear. We are doing cloud and we are doing some IOT. We are not using their web application scanning tool.
How has it helped my organization?
The ability to view the plug-ins, the way that the plug-in library works, is really good. It's not an individual list of 80 million different CVEs. We can actually just say, "Hey, here's a plug-in," and it really helps us to boil things down. Instead of having a million CVEs, here's the specific plug-ins that are actually tying the CVE families together. That helps our platform owners, if there is an issue, to see what it is and understand better how to fix it.
Also, the fact that they display the very specific plug-in output in their details area helps our platform owners know, if there's an issue, specifically what was checked and what versions it was on at the time of the test. That's just huge. It increases the trust in the information from the tool. It cuts down on accusations of false-positives and it helps people do their job better.
It helps us to understand our cyber-exposure. At the end of the day, if you don't know what you have, then you cannot defend against it. Understanding what services, what technologies, and all those components will also give us an idea about how to predict what kinds of attacks are the things that we need to guard against in the future.
It also helps us focus resources on the vulnerabilities that are most likely to be exploited. Looking at what actually has an exploit available along with consideration of other things such as network proximity times and information about the threat - either VPR or CVSS - pulling all that together does allow us to identify pretty quickly what are the high-priority targets that we should work on.
What is most valuable?
One of the most valuable features is their distributed scan model for allotting engines to work together as a pool and handle multiple scans at once, across multiple environments. Automatic scanning distribution is a distinguishing feature of their toolset.
Also, the ability to trend data back as far back as we have disk space for, is helpful.
Finally, the ability to write custom audit files is a really helpful and useful feature. That's something that not a lot of assessment companies have gotten right. There's room for improvement, but literally being able to take the text file, open it up, and adjust the changes, write your own regex and write your own checks, is huge.
What needs improvement?
It's good at creating information, it's good creating dashboards, it's good at creating reports, but if you want to take that reporting metadata and put it into another tool, that is a little bit lacking. It does great for things for the API. For instance, if we say, "What vulnerabilities do we have?" or "How many things have we scanned?" those things are great. But if we want to know more trending stuff over time, it can create a chart, but that's in a format which is really difficult to get into another program. Integration into other reporting platforms, or providing more specific scanning program metadata, would be an opportunity.
It does have a fully-bolstered API which is available online that you can look at, but it is more aimed at getting more vulnerability information out instead of reporting information out.
For how long have I used the solution?
We've been using it for about two years.
What do I think about the stability of the solution?
We've had more problems with the underlying stuff that is running the operating system, as opposed to actually running Tenable. Tenable SecurityCenter has been pretty stable. We've only had one or two smaller technical issues. There have been other issues, but they've not been Tenable's fault.
What do I think about the scalability of the solution?
It does have an upper limit. You can go on their website and see what their upper IP limit is.
We have seen that more and more teams want to get access to the data and get access to their vulnerability information, and it really has helped us grow our program.
How are customer service and technical support?
Their tier-one, initial tech support is pretty bad. Their premium support is excellent. Whether premium support comes at an extra fee depends on how your negotiations go.
Which solution did I use previously and why did I switch?
We migrated from Nexpose. We switched because Nexpose is not a scalable product for an enterprise. Also, in most instances, SecurityCenter is less false-positive prone and the detection seems to be better in most instances.
How was the initial setup?
The initial setup was very straightforward. In fact, for some of our teams, we've actually done - "capture the flag" is a bad word for it - but effectively that type of an activity, and they pretty much go from naked box to Tenable scanning instances within a couple of hours. It's very easy to set up.
I can safely say that it can be deployed with one person. And it doesn't require a lot of maintenance. It depends on how much you use it for, but it's mostly just set-it-and-forget-it. Then there is just the mechanical stuff of patching the box and applying system updates, but it actually does a pretty good job most of the time.
What was our ROI?
We've seen return on investment through visibility, scan stability, ensuring that we're able to assess our environment. Also, ensuring that we are able to have good confidence in the data, and that we're able to do out-of-the-box reporting and various other dashboards that really help us drive our program and help sell our case.
Which other solutions did I evaluate?
We evaluated Qualys. It depends on whether you want to do on-prem or in the cloud. Qualys really is a black box. You literally put this thing on your network, you can't touch it, and if you want to do something like troubleshoot, it is just not very friendly from an "if things go wrong" perspective.
What other advice do I have?
Make sure that your sizing is done correctly, in terms of the hardware size. When you do buy Tenable, a lot of times you'll use Professional Services to help you implement the tool. Whatever advice Tenable has, listen to it very specifically and also talk to them specifically about what your goals are. Instead of talking tactics, talk about goals. What's going to happen is that they may say "Hey, we're going to do things slightly differently than how you used to do it," but in a lot of instances, they're going to be right.
In terms of features that we're looking forward to, VPR is one that we're going to start using more. And they also recently had a SAML integration for single sign-on. That was a new feature in 5.9.
Overall, Tenable is easily a nine out of ten. It's not a ten because there is no perfect tool out there, and Tenable SecurityCenter does have its limitations.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Manager, IT Security at a financial services firm with 5,001-10,000 employees
With the Assurance Report Cards, we can have a quick review of security concerns in a simple glance.
Pros and Cons
- "The most valuable feature of the product is the Assurance Report Card, which gives us an overview of the security poster in just a simple glance."
- "Initial setup was pretty straightforward."
- "It basically reviews our threat landscape vulnerability."
- "In terms of configuration, there is some level of flexibility that we are not able to achieve."
- "At times we have had the typical bugs."
What is our primary use case?
Basically it reviews our threat landscape vulnerability. So, we just want to be sure that we check compliance in terms of our configuration and compliance to our policies. But, the key is to make sure that we are not exposed to vulnerabilities that can be exploited. So, it's more of just securing our threat landscape.
How has it helped my organization?
It easily detects issues, and alarms the site.
What is most valuable?
One valuable feature is the Assurance Report Card. with the Assurance Report Card, we are able to give our overview about security posters in just a glance. And with a report to cut this we can quickly, our executives can quickly consume that without going into the difficulties of the vulnerability issue.
What needs improvement?
In terms of the configuration of the reports, there's some level of flexibility that we are not able to achieve. In terms of configuring the reports to achieve certain percentages and all of that. So, that's really the main thing I've noticed. But, apart from that, I think it's one of the best vulnerability management tools I've used, in terms of giving us the full visibility into the environment.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
There were no crashes, or anything of that sort. The solution is stable. At times, we have had the typical bugs, but it's not something I would say is a big deal. It is maybe once in a quarter--insignificant.
What do I think about the scalability of the solution?
I did not have any issues with scalability. This is because once you scope the main control, the Security Center box, you do proper saving on the main box in terms of storage. Initially, when we did the first installation, we did not properly size our storage. So, we quickly entered issues. But, since it was Linux box, we were able to reconfigure and make development for additional storage. Once we did that, there has not been anything that tested the scalability. So, when the growth becomes a little high, we just add a box and provide a scanner. Then, you define the territory within which you can scan, because each scanner can be assigned to a given territory in terms of sub-nets, and so on.
How are customer service and technical support?
The tech support was fairly good enough. I would not rate them as top-notch, but it was fairly good enough. I would give it a rating between 70-80%.
Which solution did I use previously and why did I switch?
I considered Rapid7 Nexpose and Metasploit in the past.
How was the initial setup?
It was pretty straightforward.
What's my experience with pricing, setup cost, and licensing?
It is slightly more expensive than other solutions in the same sphere.
What other advice do I have?
If you are considering a product like this, you must take into account and properly plan, scope, and scan. You need to know how to properly place your scanners and how to schedule automatic scans. You need to properly schedule your scans, so for example you don't need to scan your data center during that day when your business is most active, you can schedule your scans to run in the middle of the night, when your systems are least active.
If you wake up on LAN, then you can even scan clients during the night. You schedule wake up on LAN, your boxes are woken up on LAN, then the scanning is run, and then the boxes are shut down once the scan is over. So that's proper scoping and planning with this solution.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
General Manager - Enterprise & Cyber Security Planning at Robi Axiata Limited
A user-friendly and scalable solution that provides excellent vulnerability management features
Pros and Cons
- "The Auto-Remediate feature is good."
- "The product should provide risk-based vulnerability management."
What is most valuable?
The product is useful for vulnerability management. The Auto-Remediate feature is good. The tool enables centralized vulnerability management.
What needs improvement?
The product should provide risk-based vulnerability management. It is a popular feature. Large environments can have a lot of vulnerabilities. We need to prioritize them for remediation. So, risk-based vulnerability management is useful for large enterprises.
For how long have I used the solution?
I have been using the solution for almost ten years.
What do I think about the stability of the solution?
We don't face many challenges with the product’s stability. We have two or three issues in a year.
What do I think about the scalability of the solution?
The tool is easy to scale. Almost 1,800 users are using the tool in our organization.
How are customer service and support?
The technical support is good. When we raise the issues to Tenable’s support persons, they respond well.
How was the initial setup?
The initial setup was easy. One engineer is required to deploy the solution in two hours. We do not face challenges in maintaining the product.
What's my experience with pricing, setup cost, and licensing?
The tool provides competitive pricing. We pay a yearly license fee. There are no additional costs associated with the tool.
Which other solutions did I evaluate?
We explored other products, but Tenable was more user-friendly. Tenable has better accuracy, too.
What other advice do I have?
We are satisfied with the solution. Overall, I rate the product a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Architect at Injazat Data Systems
A tool to detect and manage vulnerabilities needing a straightforward setup phase
Pros and Cons
- "Feature-wise, Tenable Security Center is a very fast tool with many dashboards and reports, and it covers all our systems."
- "The solution's user interface has some issues."
What is our primary use case?
My company uses Tenable Security Center to detect and manage our environment's vulnerabilities.
What is most valuable?
Feature-wise, Tenable Security Center is a very fast tool with many dashboards and reports, and it covers all our systems.
What needs improvement?
The solution's user interface has some issues. Sometimes, when it comes to a table's interface, shortening a column which in general should be enabled for every column, is not possible. The aforementioned details can be considered for improvement.
For how long have I used the solution?
I have been using Tenable Security Center for a year. I am using the solution's latest version.
What do I think about the stability of the solution?
The stability of Tenable Security Center can be described as a straightforward one.
Stability-wise, I rate the solution a ten out of ten.
What do I think about the scalability of the solution?
It is a very scalable solution. Scalability-wise, I rate the solution a ten out of ten.
In my company, we have 20 users of the solution.
The solution is extensively used in our company.
I don't plan to increase the solution's usage since it is used by the security department only.
How are customer service and support?
The technical support is good and provides a quick response whenever contacted by us.
Which solution did I use previously and why did I switch?
Previously, I have used Tripwire IP360.
My company started using Tenable Security Center because of its reporting capabilities, including the number of reports and dashboards.
How was the initial setup?
The initial setup was straightforward.
The deployment took place in a week.
During the deployment process, we first define your network zones, then we define your organization, define the scan policies, and then finally, we schedule the scanning.
What about the implementation team?
The installation phase can be done in-house, but we chose to seek the help of a consultant.
What's my experience with pricing, setup cost, and licensing?
My company needs to make yearly payments towards the licensing costs. The pricing of the solution falls in the mid-range level, so it is not too expensive.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Tenable Security Center Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Product Categories
Risk-Based Vulnerability Management Vulnerability Management Cloud Security Posture Management (CSPM)Popular Comparisons
Cloudflare
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
Darktrace
SentinelOne Singularity Cloud Security
Qualys VMDR
Tenable Nessus
Zscaler Zero Trust Exchange Platform
AWS Security Hub
Tenable Vulnerability Management
CrowdStrike Falcon Cloud Security
Rapid7 InsightVM
Orca Security
Buyer's Guide
Download our free Tenable Security Center Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Can you recommend API for Tenable Connector into ServiceNow
- Vulnerability Management and Risk Management Integration
- Which one to buy out of the following products: Tenable SC, Tenable.io, Tenable.ep or Tenable.ad?
- What are the differences between Tenable.sc and Tenable.io?
- When evaluating Cloud Security Remediation, what aspect do you think is the most important to look for?
- Why is Risk-Based Vulnerability Management important for companies?