

Tenable Nessus and XM Cyber are key players in cybersecurity, offering distinct features. Tenable Nessus leads with its user-friendly deployment and cost-effective vulnerability management, while XM Cyber shines in advanced threat simulations and comprehensive customer support.
Features: Tenable Nessus provides a comprehensive vulnerability assessment platform, efficient scanning and reporting capabilities, and it focuses on vulnerability management. XM Cyber offers advanced attack simulation, insights into potential attack paths, and prioritizes proactive threat simulations.
Room for Improvement: Tenable Nessus could enhance its threat simulation features, improve network visualization capabilities, and further integrate threat detection. XM Cyber could streamline its deployment process, expand support for diverse network environments, and offer more competitive pricing options.
Ease of Deployment and Customer Service: Tenable Nessus is recognized for easy deployment with minimal complexity and appealing accessibility for businesses seeking efficiency. It offers efficient service for a faster setup. XM Cyber, although complex in deployment, provides robust support that enhances user satisfaction with responsive customer service.
Pricing and ROI: Tenable Nessus is known for cost-effectiveness, showing clear ROI through its efficient vulnerability management. XM Cyber might require a higher initial investment but offers significant ROI by providing advanced capabilities in threat detection and prevention through sophisticated threat analysis.
There was a specific issue that our other security tooling did not pick up, but XM Cyber did.
It's reduced the timescale to remediate vulnerabilities that are identified as representing a high risk.
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
The customer support is fantastic; it's probably some of the best we've received across all our security vendors.
Customer support for XM Cyber is good, responsive, and it follows up on issues.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
Its scalability is great; it's easy to deploy and fully scalable.
We have not experienced any issues with scalability or reached its limits.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
The stability of Tenable Nessus is extraordinary.
We have quite a complex and large IT estate, and we've certainly experienced no limitations or problems arising from the ability of XM Cyber's product to scale across that estate.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
The product's pricing has roughly tripled within the last couple of years, making us reconsider renewing the license for the scanner.
We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments.
They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks.
The part that can be improved is the mobile exposure and the IBM i specific equipment.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
My experience with the pricing, setup cost, and licensing of Tenable Nessus is that the installation is somewhat easier, but preparing the product, such as the SKU and license options, is quite tricky.
We have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the complication, the number of PCs and servers that we have.
I mostly use the configuration audit feature for the audit configuration as a scan policy, and I will use it for credential audit, which helps me scan credentials access such as local administrator or root access, performing a deeper and more accurate check of local configuration settings and file systems, making it a highly recommended feature.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
Our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
By far, the best feature of XM Cyber is being able to map out the way vulnerabilities can be exploited based on what they call the choke points in the network where the path that a bad actor would take comes closest to assets within our environment that are most vulnerable but also most valuable.
XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.
| Product | Market Share (%) |
|---|---|
| Tenable Nessus | 5.1% |
| XM Cyber | 1.0% |
| Other | 93.9% |


| Company Size | Count |
|---|---|
| Small Business | 39 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
Tenable Nessus provides an efficient vulnerability management system with swift deployment and comprehensive scanning capabilities, making it an ideal choice for organizations seeking to enhance their security posture through effective threat detection and mitigation strategies.
Renowned for its top-tier vulnerability detection, Tenable Nessus offers a robust platform that integrates effortlessly across systems, enhancing threat management through automation, real-time monitoring, and customizable scanning options. Its broad asset coverage, including network devices and applications, coupled with ease of deployment, positions it as a go-to option for risk assessment and compliance. Organizations value its extensive reporting features and database, although they suggest enhancements in reporting formats and false positive detection. A more intuitive interface, improved cloud support, and competitive pricing models are sought after to cater to evolving enterprise needs.
What are the key features of Tenable Nessus?In industries such as finance, healthcare, and tech, Tenable Nessus is implemented for scanning internal and external networks, identifying risks, and ensuring data protection compliance. Organizations conduct regular scans to detect security vulnerabilities in servers and databases, leveraging its capabilities to strengthen their security frameworks while managing cloud infrastructures and enterprise networks efficiently.
XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our attack path management platform continuously uncovers hidden attack paths to your critical assets across cloud and on-prem environments, so you can cut them off at key junctures and eradicate risk with a fraction of the effort. This overcomes the big disconnect that security teams experience when they’re presented with endless alerts, yet can’t see which exposures impact risk the most, how they come together to be exploited by an attacker, or how to efficiently eliminate them. This approach is a complete game-changer, which is why some of the world’s largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.