The product operates on a license-based model, where you purchase a license based on the number of IP addresses you intend to scan. For example, if you purchase a license for 50 IP addresses and your network has 200 users, it will only scan for those 50 IPs. You can gain visibility into all IPs within your environment, including subnets with a full license. Also, you can geographically segment your scanning targets based on the number of IPs allocated for each location.
We help clients with their overall cybersecurity assessment. Many start with free tools like Nessus, but eventually require more comprehensive solutions. We use Nessus and Tenable.io (formerly Nessus Professional) to scan environments and then convince clients of the value of a full Tenable.
The solution scans vulnerabilities in assets like workstations, network devices, desktops, or laptops. The product indicates vulnerabilities based on severity levels. There are high, critical, medium, low, and informational levels of severity.
IT Manager at a financial services firm with 1,001-5,000 employees
MSP
Top 20
2023-10-12T17:12:52Z
Oct 12, 2023
I was the manager of the vulnerability patching team in my company, and we would use it to go through everything, discover our network, find what vulnerabilities existed, and then use that for a work plan and assignments to decide who would fix what vulnerabilities.
Learn what your peers think about Tenable Vulnerability Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
We actually needed clarity on the vulnerabilities in our infrastructure. We used the solution to scan and make a report for us on what is vulnerable in our infrastructure and what is not, what we can improve and update, and what is good as it is.
CSO at a manufacturing company with 1,001-5,000 employees
Real User
Top 5
2023-05-29T15:09:00Z
May 29, 2023
Considering regular use cases of the solution, we wanted to cover two things, external vulnerabilities and the ability to identify misconfigurations on the perimeter, like, let's say, if someone is open, something vulnerable to outside, we monitor it. The use case was monitoring the external parameter addresses with Tenable.io and seeing changes there. If something changes or if something becomes vulnerable, as it's seen from the outside, without actual credentials to scan, you know, like, we can have several layers of scans. So, Tenable.io, we used as seen outside without providing any credentials, So it gives you the true picture of how and what the attackers can use. It might be that if we use it with the credentials, we won't find additional vulnerabilities, but we don't cover that because it's not important because external attackers will not see it, actually. So, it's the first use case, and generally, Tenable.io is used for identifying vulnerabilities in the company infrastructure, servers, endpoints, and additional hardware and software, like routers, switches, and whatever has an IP address. Let's say, not for IoT, just for IT infrastructure and development infrastructure, and that was the use case of Tenable.io.
Executive Director at Platview Technologies Limited
Real User
Top 20
2022-11-10T18:44:54Z
Nov 10, 2022
Our primary use case for this solution is to satisfy the requirement for vulnerability assessments regarding internal assets, CPI assets and web applications. We deploy the solution on private cloud.
Technical Consultant at a tech consulting company with 51-200 employees
Real User
Top 5
2022-10-24T10:07:26Z
Oct 24, 2022
Our primary use case for the solution is managing organizations with assets. Our on-premises assets are in the private or public cloud so the customer doesn't need to have the server installed and deployed but can touch and go once the license has a provision. The user can use it right away.
I work for a company called Maxtec, and we are a distributor. One of the solutions that we used to distribute, not anymore, is Tenable. I've worked as the product manager for Tenable, and it is one of the products on which I've worked quite extensively. We stopped its distribution last year, and I stopped working with it at the beginning of 2022. We were using its latest version.
Senior Consultant at a tech services company with 11-50 employees
Real User
2021-06-09T13:17:00Z
Jun 9, 2021
It is useful for scanning the whole environment to check for any vulnerabilities. We can then start deploying or closing these vulnerabilities by applying the Windows or other product patches. In the end, we have an environment with no vulnerabilities, and we increase our security posture and security levels.
President and CEO, Founder Executive at SecuSolutions Co., Ltd.
Real User
2021-03-30T07:13:47Z
Mar 30, 2021
Primarily we're a partner of Tenable and what we've done is we've essentially created a middleware. We created a middleware on top of Tenable.io engine, the API, and the middleware was developed back in 2003. It has gone through about three different iterations since then. Essentially, we simplify their user interface. It's been designed so that the managed service providers, the MSPs, are able to use the Tenable system with our interface on top. In a sense, what we've done is dramatically dummied down the Tenable interface through the use of our own GUI. We connect to the Tenable API in the backend, however, they're doing the heavy lifting, so to speak, and we're just presenting the information in a much more logical, easily understood manner.
Security Architect at a computer software company with 51-200 employees
Real User
Top 20
2020-07-05T09:37:54Z
Jul 5, 2020
I am a consultant and I advise my clients from a security standpoint. My goal is to get them to maximize value from Tenable.io. I am also a user of it.
Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management (formerly Tenable.io) provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.
The solution is used for the vulnerability assessment of the network infrastructure.
The product operates on a license-based model, where you purchase a license based on the number of IP addresses you intend to scan. For example, if you purchase a license for 50 IP addresses and your network has 200 users, it will only scan for those 50 IPs. You can gain visibility into all IPs within your environment, including subnets with a full license. Also, you can geographically segment your scanning targets based on the number of IPs allocated for each location.
We help clients with their overall cybersecurity assessment. Many start with free tools like Nessus, but eventually require more comprehensive solutions. We use Nessus and Tenable.io (formerly Nessus Professional) to scan environments and then convince clients of the value of a full Tenable.
The solution scans vulnerabilities in assets like workstations, network devices, desktops, or laptops. The product indicates vulnerabilities based on severity levels. There are high, critical, medium, low, and informational levels of severity.
I was the manager of the vulnerability patching team in my company, and we would use it to go through everything, discover our network, find what vulnerabilities existed, and then use that for a work plan and assignments to decide who would fix what vulnerabilities.
We use the solution to scan our environment, ServicePRO.
We use Tenable.io Vulnerability Management for our organization's endpoint and server vulnerability management.
Tenable.io Vulnerability Management is used to scan our infrastructure.
We actually needed clarity on the vulnerabilities in our infrastructure. We used the solution to scan and make a report for us on what is vulnerable in our infrastructure and what is not, what we can improve and update, and what is good as it is.
Considering regular use cases of the solution, we wanted to cover two things, external vulnerabilities and the ability to identify misconfigurations on the perimeter, like, let's say, if someone is open, something vulnerable to outside, we monitor it. The use case was monitoring the external parameter addresses with Tenable.io and seeing changes there. If something changes or if something becomes vulnerable, as it's seen from the outside, without actual credentials to scan, you know, like, we can have several layers of scans. So, Tenable.io, we used as seen outside without providing any credentials, So it gives you the true picture of how and what the attackers can use. It might be that if we use it with the credentials, we won't find additional vulnerabilities, but we don't cover that because it's not important because external attackers will not see it, actually. So, it's the first use case, and generally, Tenable.io is used for identifying vulnerabilities in the company infrastructure, servers, endpoints, and additional hardware and software, like routers, switches, and whatever has an IP address. Let's say, not for IoT, just for IT infrastructure and development infrastructure, and that was the use case of Tenable.io.
We use the solution for our vulnerability management program. The solution is deployed in the cloud.
Vulnerability Management is used to discover assets and identify vulnerabilities across our IT landscape.
We use Tenable.io for vulnerability scanning.
Our primary use case for this solution is to satisfy the requirement for vulnerability assessments regarding internal assets, CPI assets and web applications. We deploy the solution on private cloud.
Our primary use case for the solution is managing organizations with assets. Our on-premises assets are in the private or public cloud so the customer doesn't need to have the server installed and deployed but can touch and go once the license has a provision. The user can use it right away.
We can scan manual stuff through Tenable.io. We have a great view to create desktops also in Tenable.io.
Our company has 25 technicians who use the solution to scan firewalls and produce scheduled compliance reports for various environments.
Tenable.io Vulnerability Management is used as a unified platform for vulnerability management.
I work for a company called Maxtec, and we are a distributor. One of the solutions that we used to distribute, not anymore, is Tenable. I've worked as the product manager for Tenable, and it is one of the products on which I've worked quite extensively. We stopped its distribution last year, and I stopped working with it at the beginning of 2022. We were using its latest version.
360° scanner and compliance checker inside authenticated environments.
It is useful for scanning the whole environment to check for any vulnerabilities. We can then start deploying or closing these vulnerabilities by applying the Windows or other product patches. In the end, we have an environment with no vulnerabilities, and we increase our security posture and security levels.
Primarily we're a partner of Tenable and what we've done is we've essentially created a middleware. We created a middleware on top of Tenable.io engine, the API, and the middleware was developed back in 2003. It has gone through about three different iterations since then. Essentially, we simplify their user interface. It's been designed so that the managed service providers, the MSPs, are able to use the Tenable system with our interface on top. In a sense, what we've done is dramatically dummied down the Tenable interface through the use of our own GUI. We connect to the Tenable API in the backend, however, they're doing the heavy lifting, so to speak, and we're just presenting the information in a much more logical, easily understood manner.
We primarily use the solution for vulnerability scanning.
Our primary use case for this solution is to perform in-depth vulnerability scans on the cloud.
I am a consultant and I advise my clients from a security standpoint. My goal is to get them to maximize value from Tenable.io. I am also a user of it.