237 Tenable One Reviews
Overall Review Sentiment for Tenable One
Log in to view review sentiment.

Scheduleling the scans is very helpful in that you can then have those results sent to your email. Report fatigue and email fatigue are real things but with the simplified email at a quick glance you can tell if you need to dive deeper or just review at the standard time. Review collected by and hosted on G2.com.
They could be better about some of the mitigation information, I understand that it must be a huge task but would be really helpful to have. Review collected by and hosted on G2.com.
I have been using this tool for a Long time and they were developing new features like vulnerability intelligence which helps us make a successful vulnerability management program. Integration with ServiceNow helps us in getting the results better. Review collected by and hosted on G2.com.
The support team should give a proper response. This needs to be improved. Review collected by and hosted on G2.com.

the robust cuantity of options the high speed when it comes to find vulnerabilities Review collected by and hosted on G2.com.
the price and also sometimes as little companies I can feel a bit overprices. learning curve is a bit high also Review collected by and hosted on G2.com.

Tenable identity exposure formerly tenable.ad The Tenable.ad help us to find & mitigate the Vulnerabilities in AD before the attackers can exploit the Vulnerabilities. We can monitor in real time and we can run various tasks like threat hunting, detection, and incident response, etc. Review collected by and hosted on G2.com.
Basically it's a new product launch in the market and i found there is no lag in it. But still it could be cost efficient. Review collected by and hosted on G2.com.
The identity and permissions features (CIEM) are amazing. Very detailled and covering GCP, AWS and Azure, it's a very complete solution. Review collected by and hosted on G2.com.
The Threat detection part is maybe the least powerful feature of this CNAPP. Review collected by and hosted on G2.com.
Very easy to use, solve our problems with relatively low cost Review collected by and hosted on G2.com.
If there are more features in the product that could help us automate security tasks, that would be even better. Review collected by and hosted on G2.com.
Comprehensive Vulnerability Management:
Asset Discovery and Inventory: Automatically discovers assets in the network, ensuring a complete inventory.
Vulnerability Scanning: Leverages Nessus for thorough and accurate scanning of network assets for vulnerabilities.
Configuration Auditing: Ensures systems are configured according to security best practices and regulatory requirements. Review collected by and hosted on G2.com.
Provide lot of false positive observations Review collected by and hosted on G2.com.
What I like best is the organization in creating templates for scanning vulnerabilities and the way the reports are generated for the threats found, I used it daily to perform vulnerability assessments. Review collected by and hosted on G2.com.
I can't find anything that I dislike about the platform right now. Review collected by and hosted on G2.com.
The VPR feature is undoubtedly my favorite as it provides our team with the necessary tools to swiftly determine the significance of a vulnerability and how to prioritize it. The ability to manage both compliance and vulnerability risk, allowing us to maintain clean dashboards and categorize information meaningfully, has been invaluable. The dashboards have enabled us to create a wide variety of visualizations tailored to different stakeholders. The implementation was quick, and the support, especially from our local team, has been top-tier Review collected by and hosted on G2.com.
There are some very minor limitations in the dashboard features that do not always allow me to convey the exact information or trend that I want to. Review collected by and hosted on G2.com.
Tenable Security Center has been a great tool to use in our enterprise. We are on the tool daily to search and support our vulnerability management program. We have also had a great communication with a monthly cadence for support. It has been easy to use as we have learned the tool. There are a lot of things we use, including dashboards, assest lists, and queries. Review collected by and hosted on G2.com.
Sometimes we will that we could see more in the queries or when we are looking for something specific. An example is when we are pulling data and there is not a place to pull the OS with the other data. Sometimes certain add ons would be helpful to have it all in one place. Review collected by and hosted on G2.com.