237 Tenable One Reviews
Overall Review Sentiment for Tenable One
Log in to view review sentiment.

Tenable.io is the most efficient tool in scanning and managing vulnerability in the system and provides the most easily understandable/readable vulnerabilities. It is a good product with integration to cloud platform. Review collected by and hosted on G2.com.
Some filters and tabs are hidden sometimes it's hard to trap few tabs on time. Review collected by and hosted on G2.com.

Ermetic gives us great insight into our Cloud Security and Cloud Infrastructure Risks. With the ability to manage access permissions, ensure cloud compliance, and provide recommendations for the principle of least privilege, Ermetic has quickly become a daily tool for us to use in monitoring our Cloud environment. The support team has been great in resolving problems quickly. Their quick response to each question has been tremendous as well. Review collected by and hosted on G2.com.
One downside we've noticed involves some findings/issues not being resolved when remediating the problem manually in the Cloud environment. Working with the Support team has been a great help in getting these issues resolved quickly. Review collected by and hosted on G2.com.

This is, without question, the best way to accurately and quickly keep an eye on the ever-changing landscape of how your devices are vulnerable to attack. I have used many other products and tenable as a company is open to input and always looking at ways to add value to the product. The reporting and dashboards help you know a priority order to remediate and help you look at trends. Review collected by and hosted on G2.com.
With all products like this, there is a learning curve. There are features like the ability to pull more detailed remediation that I could give to the the people making the changes exact details of what needs to be done to remove this issue would be great. The ability to know that an issue like log4j was found on this machine within this software or directory easier would be great. THe ability to get a list of here is all the software installed in your ecosystem and the number or exact assets it is installed on. Review collected by and hosted on G2.com.

It gives assets discovery hence visibility. The CIS benchmark templates help harden the operating systems, databases, network components like routers, switches, firewalls, etc.
The built-in dashboard templates are beneficial to administrators and various stakeholders to prioritize the mitigation of identified vulnerabilities. The centralized dashboard helps govern overall organization risk management. Review collected by and hosted on G2.com.
Lack of visibility of calculation of the number of vulnerabilities fixed along with the time stamp for each asset is not visible. Review collected by and hosted on G2.com.

Update of Threat Database of Zero Day vulnerabilities is excellent and notification about threats with remediation details is good. Tenable.io is good product with integration with multiple cloud platforms Review collected by and hosted on G2.com.
Downside of the tool if we use On-premise one challenges with getting cloud integrations done . Tenable.IO cloud one is better tool for vulnerability management. Review collected by and hosted on G2.com.

Very detailed software.
The deployment was easy.
If I get a vulnerability it will show me which devices were affected and how many devices.
The remediation steps are great, it gives you collected information about the vulnerability and the remediation steps.
Very detailed information about the asset like, IP, vulnerability count by severity, asset criticality rating, asset exsposure score, scan information.
Can Run custom scans for the assets.
Can run scan is my devices complied for CIS benchmarks etc. very handy tool to improve your enterprise security posture.
Super easy to use because instructions are included on the platform. Much easier than Microsoft Defender.
The threat intelligence what the software has is exceptional.
They got very good trainings and webinars. On Tennable University you can get free and quality tranings, if you want to get certificate you get as well (not for free).
Very rarely getting false positive vulnerabilities.
Often Tenable software's are on the top in independent tests so you can trust their tools are great. Review collected by and hosted on G2.com.
You can make literally endless amount and variations of the dashboard but I quite miss more graphs that shows in the timeline the vulnerability count for the asset, for the asset.
Some of the changes made it harder to use it, but I sent feedback, so we will see.
Some reason almost every day for the website is super slow, or down for a few minutes for me. Could be quite annoying.
Some of the dasboard data is not updating requrarly, but i was told on the support it is a known issue so I hope very soon it will remediated.
Scan speeds/resource utilization at times
Have to switch between interfaces to access certain functionality
Quite expensive. Review collected by and hosted on G2.com.

the dashboard is very explainable and easy to understand and take action out of it. Review collected by and hosted on G2.com.
the deep dive into the new features would give a better visibility Review collected by and hosted on G2.com.
Ermetic is genuinely concerned with the success of not just our product usage, but that of our organization. They're engaged at the highest levels of their company, actively soliciting feedback and implementing those changes into their product. They listen intently to needs, concerns, and desires to output features and functions that provide the best value to their customers. They proactively review and monitor our account, providing guidance and best practices. Review collected by and hosted on G2.com.
There are no downsides that I have to note about doing business with Ermetic. Review collected by and hosted on G2.com.

Tenable.sc is a highly regarded vulnerability management platform that is widely used by organizations around the world. It provides a range of features and tools to help organizations identify and prioritize vulnerabilities in their IT systems and networks, and take steps to mitigate or eliminate those vulnerabilities.
One of the most likable aspects of Tenable.sc is its comprehensive feature set. The platform includes a range of tools and capabilities that make it easy for organizations to get a complete view of their vulnerabilities and take the necessary steps to address them. These features include asset discovery, vulnerability scanning, and vulnerability analysis, as well as tools for managing and mitigating vulnerabilities, such as custom workflows and reports.
Another likable aspect of Tenable.sc is its ease of use. The platform has a user-friendly interface and is easy to navigate, making it accessible to users of all skill levels. This can be especially helpful for organizations that may not have a dedicated team of IT security professionals.
The upsides of using Tenable.sc include improved IT security posture and reduced risk of data breaches and other security incidents. By identifying and addressing vulnerabilities in their systems and networks, organizations can protect against cyber threats and reduce the likelihood of security incidents occurring. Tenable.sc's comprehensive feature set and ease of use make it a valuable tool for organizations looking to improve their IT security posture. Review collected by and hosted on G2.com.
It is difficult to determine the least helpful aspects of Tenable.sc without knowing the specific needs and experiences of the user. However, some potential downsides to using Tenable.sc may include the cost of the platform and the potential for false positives in the vulnerability scans.
The cost of Tenable.sc may be a drawback for some organizations, significantly smaller businesses or those with limited budgets. The platform offers different pricing plans and features, so it is essential for organizations to carefully evaluate their needs and budget before committing to a project.
False positives in vulnerability scans can also be an issue with Tenable.sc or any other vulnerability management platform. A false positive is a report of a vulnerability that does not exist, which several factors, such as outdated vulnerability definitions or incorrect network configurations can cause. False positives can waste time and resources and create a false sense of security if they are not adequately addressed. Review collected by and hosted on G2.com.
Easy to use, effective in finding vulnerabilities, and up to date regarding Threat hunting and finding misconfigurations. Takes a lot of pressure and time off of Threat Management. Review collected by and hosted on G2.com.
I cannot fault anything at this time; even their support is excellent. I have been using the product for 2 years and have never come across a problem that wasn't resolved within hours. Review collected by and hosted on G2.com.