Tenable Vulnerability Management and Wiz are strong competitors in the field of vulnerability management and cloud security. Wiz tends to have an advantage in cloud-focused insights, making it more suitable for enterprises leveraging extensive cloud infrastructure.
Features: Tenable provides robust vulnerability scanning and management tools with comprehensive integration capabilities, extensive cloud, and on-prem monitoring, and frictionless assessments for AWS. Wiz delivers an emphasis on contextual risk evaluation and automated threat detection, utilizing its Security Graph and agentless scanning for in-depth cloud asset insights.
Room for Improvement: Tenable could improve its licensing clarity, dashboard customization, and documentation quality. Wiz needs to enhance its reporting and risk assessment capabilities, improve API integrations, and broaden its alert profiles to better handle threats.
Ease of Deployment and Customer Service: Tenable deploys across cloud and hybrid environments but faces criticism for support response times and support bundling in pricing. Wiz offers simple deployment in cloud settings and a supportive, responsive customer service team, although it could improve deployment across diverse platforms.
Pricing and ROI: Tenable is considered expensive with potential to adopt a straightforward pay-as-you-go model for SMB accessibility. Wiz's pricing, although high, is offset by its significant value in cloud insights, favoring enterprises focused on cloud infrastructure.
Therefore, it is important to be proactive rather than reactive, which will bring a return on the investment.
Compliance is much easier as we can now get in-depth monitoring of controls from an ISO or software perspective.
We have seen ROI from Wiz and we continued to see value in Wiz.
It needs improvement in response time and addressing feature requests promptly.
We can always reach our account representative when we have a problem or need to speak with technical staff to clarify things.
It is some of the best post-sales support ever received.
They recently changed to Zendesk, which has been so much better.
They can seamlessly scale the number of endpoints from 100 to 1,000,000 in a day.
This solution is very scalable; if I add resources to new accounts, they are automatically monitored.
We have deployed Wiz in three organizations on AWS, each with approximately 70 to 80 accounts, totaling more than 120 accounts.
Scalability-wise, I rate the solution a ten out of ten.
I have faced no stability issues with Tenable.
We have not encountered any issues with Wiz since I have been here, and it remained stable with no downtime or changes required.
We've only had downtime from maintenance and updates, and they notify us in advance, so we aren't impacted.
Stability-wise, I rate the solution an eight to nine out of ten.
They should also accelerate the process of implementing new features upon request.
We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately.
Wiz is the first vendor I've worked with that has turnaround feature requests in less than a month.
We are trying to figure out how to increase the frequency of the scans, as some universities do not wait a day before they know if something is exposed.
Tenable charges around $40 per device, while Rapid7 costs $10 to $15 per device.
Early adopters got an excellent deal, but it became pricey when they became the market leader.
There is room for improvement on our pricing models, so it would be nice if Wiz could share the price beforehand rather than onboarding and then having pricing based on utilization.
We got results with Wiz immediately; we installed it and met our goal during the four-week trial.
Tenable enables vulnerability management through potential AI integration that consolidates efforts and resolves multiple vulnerabilities simultaneously.
It was easy to deploy and covered all our accounts through APIs, requiring no agents.
Leveraging this technology saves us not only precious engineering time but also money developing and investing in other overlapping solutions.
The ability to scan every layer without agents is a huge selling point because we're multi-agent.
Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management (formerly Tenable.io) provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.
Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.
Wiz's Security Graph delivers automated alerts whenever risks emerge, allowing teams to prioritize and address the most critical issues before they escalate into breaches. Furthermore, Wiz ensures rapid and agentless visibility into critical data across various repositories, enabling organizations to easily determine the location of their data assets.
Wiz provides various features in the following categories:
Agentless Scanning: The solution can scan every layer of a cloud environment without requiring agents, managing the entire process and providing comprehensive visibility.
Workflow Integration: Users can create customized workflows within Wiz to identify and assign actions based on urgency, integrating them with ticketing systems for quick and efficient remediation.
Vulnerability Management: Wiz's vulnerability management modules provide detailed analytics and visibility across cloud systems, streamlining the manual process of vulnerability discovery. The automated attack path analysis helps identify risks and trace potential points of exposure, allowing users to understand and mitigate them effectively and proactively.
CSPM (Cloud Security Posture Management): Wiz's CSPM module offers instant visibility into high-level risks to an enterprise’s cloud environment, covering all accounts without the need for agents.
Out-of-the-Box Reporting and Custom Queries: The service supports comprehensive reporting with asset context, allowing users to perform complex custom queries on the solution’s user-friendly interface.
Automation Roles and Dashboards: The solution facilitates automation by providing essential roles and dedicated dashboards that enable teams to understand security information quickly, even those with limited expertise.
Contextual Risk Evaluation: The service contextualizes the various components contributing to an issue, providing a risk evaluation framework that helps prioritize remediation efforts.
Security Graph and Visibility: Wiz's security graph offers visibility across the entire organization, even with multiple accounts, enabling users to understand their environment and assets effectively.
Wiz offers the following benefits:
Comprehensive agentless scanning
Effective identification and mitigation of vulnerabilities
Streamlined vulnerability management
Robust reporting capabilities and customizable queries
Enhanced automation and role-based access control
Prioritized risk evaluation for efficient remediation
Security posture across multiple accounts
Kamran Siddique, VP Information Security at boxed.com, remarks his company has seen a ROI while using Wiz, as it simplifies the process by integrating multiple useful tools into one solution.
According to a Senior Security Architect at Deliveroo, Wiz has given their company a fresh approach to vulnerability management, as Wiz's native integrations are extremely useful and paramount to the operational success of their platform.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.