We performed a comparison between IBM Guardium Vulnerability Assessment and Tenable Vulnerability Management based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"It is quite straightforward to set up."
"It is pretty stable. I would rate it nine or maybe ten."
"It's a recommended tool for penetration testers because it's effective for that purpose."
"The solution is easy to use and configuration is smooth with no complexities."
"The solution is very simple to use."
"The solution creates vulnerability tickets within the VM profile but should also include them under the Remediation tab so the fixes can be viewed in the ticketing queue."
"It is easy to manage. Most of the information the tool provided helped to further investigate the vulnerability and its impact."
"The best feature of the solution is the amount of visibility it provides of the vulnerabilities."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"They should include better customization of the dashboard, and integration tools."
"Tenable could improve visibility into assets, including automated asset tagging. You should be able to automatically tag assets based on location, function, ownership, etc. That would help us because we spend a lot of time identifying and tagging assets by hand."
"They've been able to think about everything in terms of where the world is going and the type of assets that you've got. They've everything sorted out in that aspect, but you have to pay for most of the other components that they've got to give you complete visibility across your tech surface. If it already had those capabilities in-built, without having to add them on to take advantage of them, it would be a very compelling value proposition."
"They need to have more dependable and faster support."
"We'd like to see a bit more user-friendliness."
"It's not a user-friendly tool since it has a complicated interface."
"I'm not satisfied with the reporting structure."
"The price could be lower."
More IBM Guardium Vulnerability Assessment Pricing and Cost Advice →
More Tenable Vulnerability Management Pricing and Cost Advice →
IBM Guardium Vulnerability Assessment is ranked 40th in Vulnerability Management with 3 reviews while Tenable Vulnerability Management is ranked 2nd in Vulnerability Management with 39 reviews. IBM Guardium Vulnerability Assessment is rated 6.6, while Tenable Vulnerability Management is rated 8.2. The top reviewer of IBM Guardium Vulnerability Assessment writes "Worthwhile from the regulatory requirements and analytics perspective, but is expensive and not easy to use". On the other hand, the top reviewer of Tenable Vulnerability Management writes "Discovers vulnerabilities and integrates well with other solutions". IBM Guardium Vulnerability Assessment is most compared with Tenable Nessus, Qualys VMDR, Acunetix, Rapid7 InsightVM and Orca Security, whereas Tenable Vulnerability Management is most compared with Tenable Security Center, Tenable Nessus, Qualys VMDR, Amazon Inspector and Microsoft Defender Vulnerability Management. See our IBM Guardium Vulnerability Assessment vs. Tenable Vulnerability Management report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.