We performed a comparison between Acunetix and Pentera based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Acunetix has an awesome crawler. It gives a referral site map of near targets and also goes really deep to find all the inputs without issues. This was valuable because it helped me find some files or directories, like web admin panels without authentication, which were hidden."
"One of the features that I feel is groundbreaking, that I would like to see expanded on, is the IAS feature: The Interactive Application Security Testing module that gets loaded onto an application on a server, for more in-depth, granular findings. I think that is really neat. I haven't seen a lot of competitors doing that."
"Their technical support has been very active. If I have an issue, I can reach out to them and get an answer pretty quick."
"It can operate both as a standalone and it can be integrated with other applications, which makes it a very versatile solution to have."
"We are able to create a report which shows the PCI DSS scoring and share it with the application teams. Then, they can correlate and see exactly what they need to fix, and why."
"The tool's most valuable feature is scan configurations. We use it for external physical applications. The scanning time depends on the application's code."
"I haven't seen reporting of that level in any other tool."
"The usability and overall scan results are good."
"What I like the most about Pentera is its solution-oriented approach."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"The most valuable feature of Pentera is that you can do continuous vulnerability assessment, which is automated."
"Maybe there are some remediation steps on the website, we can mask sensitive information on the website better."
"The product is easy to use."
"We have had issues during upgrades where their scans worked on some apps better with previous versions. Then, we had to work with their tech support, who were great, to get it fixed for the next version."
"Acunetix needs to include agent analysis."
"In terms of what needs improvement, the way the licensing model is currently is not very convenient for us because initially, when we bought it, the licensing model was very flexible, but now it restricts us."
"Acunetix needs to improve its cost."
"There is room for improvement in website authentication because I've seen other products that can do it much better."
"When monitoring the traffic we always have issues with the bandwidth consumption and the throttling of traffic."
"The solution's pricing could be better."
"The solution limits the number of scans. It would be much better if we could have unlimited scans."
"Maybe scalability. I know that the Pentera right now is high level in order to scan big deals over 500 IPs and not less, and not less. That can be more granular. This will be useful."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"Pentera's general dashboards could be improved and made more specific in terms of vulnerabilities that I'm discovering."
"There is room for improvement in virtualization compatibility."
"The price could be improved."
Acunetix is ranked 15th in Vulnerability Management with 26 reviews while Pentera is ranked 14th in Vulnerability Management with 5 reviews. Acunetix is rated 7.6, while Pentera is rated 8.2. The top reviewer of Acunetix writes "Fantastic reporting features hindered by slow scanning ". On the other hand, the top reviewer of Pentera writes "A stable solution that can be used to do continuous and automated vulnerability assessments". Acunetix is most compared with OWASP Zap, Tenable.io Web Application Scanning, PortSwigger Burp Suite Professional, HCL AppScan and Fortify WebInspect, whereas Pentera is most compared with Cymulate, Tenable Nessus, Horizon3.ai, Picus Security and Qualys VMDR. See our Acunetix vs. Pentera report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.