We performed a comparison between Pentera and Tenable Vulnerability Management based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of Pentera is that you can do continuous vulnerability assessment, which is automated."
"The product is easy to use."
"What I like the most about Pentera is its solution-oriented approach."
"Maybe there are some remediation steps on the website, we can mask sensitive information on the website better."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"The solution is quite friendly."
"It helps us create remediation projects and assign the console’s responsibility to specific engineers."
"The initial setup is not complex."
"The ease of use in terms of scanning assets is valuable."
"It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
"The vulnerability scanning is the most important aspect of the solution for us."
"Tenable.io, in particular, is quite a powerful product. It looks at your traditional environment, which is pretty much anything that is on-premises, and it also goes a step ahead and covers your modern assets, which is anything that is currently sitting in the cloud. You get complete visibility of your entire environment and tech operation. The ability to give you visibility across the entire tech surface is one of the biggest advantages that Tenable.io has."
"It's a recommended tool for penetration testers because it's effective for that purpose."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"Maybe scalability. I know that the Pentera right now is high level in order to scan big deals over 500 IPs and not less, and not less. That can be more granular. This will be useful."
"The price could be improved."
"There is room for improvement in virtualization compatibility."
"Pentera's general dashboards could be improved and made more specific in terms of vulnerabilities that I'm discovering."
"I would like the solution to cover the whole cycle of mitigation since it's an area where the solution currently lacks."
"The stability has room for improvement."
"We'd like to see a bit more user-friendliness."
"The reporting was never great in Tenable Vulnerability Management, so, in my company, we imported all the data into Ivanti RiskSense to start using it for reporting."
"They've been able to think about everything in terms of where the world is going and the type of assets that you've got. They've everything sorted out in that aspect, but you have to pay for most of the other components that they've got to give you complete visibility across your tech surface. If it already had those capabilities in-built, without having to add them on to take advantage of them, it would be a very compelling value proposition."
"The pricing of the solution could be more reasonable."
"The initial setup is complex and has room for improvement."
"The only drawback of the solution is that it is expensive."
More Tenable Vulnerability Management Pricing and Cost Advice →
Pentera is ranked 14th in Vulnerability Management with 5 reviews while Tenable Vulnerability Management is ranked 2nd in Vulnerability Management with 39 reviews. Pentera is rated 8.2, while Tenable Vulnerability Management is rated 8.2. The top reviewer of Pentera writes "A stable solution that can be used to do continuous and automated vulnerability assessments". On the other hand, the top reviewer of Tenable Vulnerability Management writes "Discovers vulnerabilities and integrates well with other solutions". Pentera is most compared with Cymulate, Tenable Nessus, Picus Security, Horizon3.ai and Qualys VMDR, whereas Tenable Vulnerability Management is most compared with Tenable Security Center, Tenable Nessus, Qualys VMDR, Amazon Inspector and Microsoft Defender Vulnerability Management. See our Pentera vs. Tenable Vulnerability Management report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.