It is useful for scanning the whole environment to check for any vulnerabilities. We can then start deploying or closing these vulnerabilities by applying the Windows or other product patches. In the end, we have an environment with no vulnerabilities, and we increase our security posture and security levels.
Senior Consultant at a tech services company with 11-50 employees
Discovers quickly, very stable, and periodically updated, and but needs more integration
Pros and Cons
- "It is very stable, and it is updated periodically by adding new vulnerabilities."
- "It can have more integration."
What is our primary use case?
What is most valuable?
It is very stable, and it is updated periodically by adding new vulnerabilities. It can discover much quickly as compared to other vendors.
Its management console and portal make it easy to use and effective.
What needs improvement?
It can have more integration.
For how long have I used the solution?
I have been using this solution for three months.
Buyer's Guide
Tenable Vulnerability Management
June 2025

Learn what your peers think about Tenable Vulnerability Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,632 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
It is scalable.
How was the initial setup?
I haven't installed it on a customer's site. I just installed it in my lab in order to get familiar with the product, and that's it. It was just for testing.
It was a straightforward installation. Because it was done in my lab environment, it didn't take that much time. It took around three to four hours.
What about the implementation team?
I did it myself.
What other advice do I have?
I would recommend this solution at this time, but after installing it for more customers, my answer might change in the future.
I would rate this solution a seven out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Team Lead, Cyber Security at Uridium Technologies
Provides seamlessness, a perfect UI, and identity management for office operations
Pros and Cons
- "The solution provides seamlessness, a perfect UI, and identity management for office operations. We are most vulnerable to users. Therefore, it is crucial to implement the right solution to ensure proper user access and resource management."
What is our primary use case?
We use the Tenable Vulnerability Management solution for internal web applications, asset management, and remediation. It helps us transfer and leverage the remediation of websites, effectively addressing vulnerabilities.
How has it helped my organization?
We need to deploy this on internal assets. It resides within the internal infrastructure and communication.
It encompasses everything at some point. From development to deployment, it receives the necessary attention.
What is most valuable?
The solution provides seamlessness, a perfect UI, and identity management for office operations. We are most vulnerable to users. Therefore, it is crucial to implement the right solution to ensure proper user access and resource management.
For how long have I used the solution?
I have been using Tenable Vulnerability Management for 4 years.
What do I think about the scalability of the solution?
200 users are using this solution.
Which solution did I use previously and why did I switch?
We have used Qualys. It is tricky and expensive.
How was the initial setup?
The initial setup is seamless and takes three days to complete. Two people are required for the deployment but one person can do as well.
What other advice do I have?
This process is seamless because checks are scheduled at different intervals, typically every ten minutes. Once a log is generated, we attend to it immediately. Also, the maintenance is straightforward.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Tenable Vulnerability Management
June 2025

Learn what your peers think about Tenable Vulnerability Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,632 professionals have used our research since 2012.
0 at a tech vendor with 5,001-10,000 employees
The stability can be improved, but the pricing is the best
Pros and Cons
- "The price of Tenable.io Vulnerability Management is reasonable as it is ten times cheaper than other options."
- "The stability has room for improvement."
What is our primary use case?
Tenable.io Vulnerability Management is used to scan our infrastructure.
What is most valuable?
The price of Tenable.io Vulnerability Management is reasonable as it is ten times cheaper than other options.
What needs improvement?
The stability has room for improvement.
For how long have I used the solution?
I have been using Tenable.io Vulnerability Management for one year.
What do I think about the stability of the solution?
The stability is moderate.
What do I think about the scalability of the solution?
The solution is scalable.
What's my experience with pricing, setup cost, and licensing?
The cost is determined by the number of endpoints, which is approximately one dollar per endpoint.
What other advice do I have?
I give Tenable.io Vulnerability Management a five out of ten.
The maintenance requires a subject matter expert.
I recommend Tenable.io Vulnerability Management.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Tenable Vulnerability Management Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Microsoft Defender for Cloud
Checkmarx One
Tenable Nessus
Tenable Security Center
Orca Security
Rapid7 InsightVM
Claroty Platform
Zafran Security
Microsoft Defender Vulnerability Management
Buyer's Guide
Download our free Tenable Vulnerability Management Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Can you recommend API for Tenable Connector into ServiceNow
- What's the difference between Tenable Nessus and Tenable.io Vulnerability Management?
- Which one to buy out of the following products: Tenable SC, Tenable.io, Tenable.ep or Tenable.ad?
- What are the differences between Tenable.sc and Tenable.io?
- How inadvisable is it to use a single vulnerability analysis tool?
- What are the benefits of continuous scanning for vulnerability management?
- When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
- What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
- What are the main KPIs that need to be implemented to have better posture in vulnerability projects?
- Which is the best vulnerability scanner tool?