BMC TrueSight Vulnerability Management vs Tenable Security Center comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BMC TrueSight Vulnerability Management and Tenable Security Center based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: March 2024).
767,319 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Takes reports from other vulnerabilities."

More BMC TrueSight Vulnerability Management Pros →

"Their overall cost of service is pretty good.""Tenable Security Center scans networks and gives reports.""The initial setup process is simple.""The product is our second solution, and we are happy that it meets our requirements.""The solution is completely stable and operation is user-friendly.""The solution is one of the most, if not the most, stable product available.""One of the most valuable features is their distributed scan model for allotting engines to work together as a pool and handle multiple scans at once, across multiple environments. Automatic scanning distribution is a distinguishing feature of their toolset.""It basically reviews our threat landscape vulnerability."

More Tenable Security Center Pros →

Cons
"No third-party applications or integrations with additional software solutions."

More BMC TrueSight Vulnerability Management Cons →

"A good plugin editor would be a good additional option for the Security Center.""Its reporting can be improved. It is not easy to generate a scan report the way we want. The data is okay, but we can't easily change the template to make it look the way we want.""Security can always be improved.""The solution needs to improve the vulnerability assessment because we have experienced some challenges with accuracy.""We are facing some challenges related to our channel.""Support could be faster.""The biggest issue I have with the solution is when I'm using the scanning it picks up the original DNS of that device. That means, before we image it and actually change the DNS to something within our company structure, it'll just be random numbers and letters and Tenable will stick to that DNS for a long time.""Tenable has some problems with agents going offline during scanning and lag between agents and the security center."

More Tenable Security Center Cons →

Pricing and Cost Advice
Information Not Available
  • "It is slightly more expensive than other solutions in the same sphere."
  • "We're able to save because we don't have to employ more staff members to help wit ht he scheduling of the scans, running the reports or sending them out to the systems owners. That alone is a big ROI for us."
  • "The licensing costs for this solution are approximately $100,000 US, and I think that covers everything."
  • "The pricing is more than Nexpose."
  • "Costing is pretty reasonable compared to the competition."
  • "We're a Fortune 500 company... our licensing costs [are] in the seven figures."
  • "We pay around 60,000 on a yearly basis."
  • "The price can start at €10,000 ($13,000 USD) for between 500 and 1,000 assets, and the price can climb into the millions as more assets are added."
  • More Tenable Security Center Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    767,319 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:The most important features are the dashboard and reporting. The dashboard provides statistics with graphs and bar charts for our management.
    Top Answer:The solution’s pricing is reasonable but depends on the country's foreign reserves. You have to buy it at the price of USD. Hence, it depends on your country's currency rate.
    Top Answer:Additional costs are associated with using the solution, as additional scanners are required for different endpoints connected to the Tenable Security Center. If Tenable Security Center could extract… more »
    Ranking
    48th
    Views
    175
    Comparisons
    131
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    1st
    Views
    14,855
    Comparisons
    11,239
    Reviews
    26
    Average Words per Review
    411
    Rating
    8.3
    Comparisons
    Also Known As
    TrueSight Vulnerability Management, SecOps Response Service, BladeLogic Threat Director
    Tenable.sc, Tenable Unified Security, Tenable SecurityCenter
    Learn More
    Overview

    Helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

    • Powerful dashboards highlight vulnerability data, performance trends, and SLA compliance for quick prioritization of remediation tasks
    • Streamlined workflows combine scan verification and remediation tasks, leveraging BladeLogic Server Automation and Microsoft SCCM systems management
    • Blindspot awareness enables you to identify areas of your infrastructure which are not being monitored, leaving you exposed
    • Rapid import lets you quickly consume vulnerability scanning reports with native integration to Qualys, Tenable, and Rapid 7
    • Data export enables deep analysis and custom reports to help meet audit requirements and fuel process improvements

    Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.

    Managed on-premises and powered by Nessus technology, the Tenable Security Center (formerly Tenable.sc) suite of products provides the industry’s most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.

    Sample Customers
    Online Business Systems
    IBM, Sempra Energy, Microsoft, Apple, Adidas, Union Pacific
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm21%
    Government12%
    Wholesaler/Distributor12%
    Computer Software Company12%
    REVIEWERS
    Financial Services Firm31%
    Comms Service Provider15%
    Manufacturing Company15%
    Computer Software Company12%
    VISITORS READING REVIEWS
    Educational Organization16%
    Government12%
    Computer Software Company12%
    Financial Services Firm10%
    Company Size
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise14%
    Large Enterprise56%
    REVIEWERS
    Small Business35%
    Midsize Enterprise18%
    Large Enterprise47%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise26%
    Large Enterprise55%
    Buyer's Guide
    Vulnerability Management
    March 2024
    Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: March 2024.
    767,319 professionals have used our research since 2012.

    BMC TrueSight Vulnerability Management is ranked 48th in Vulnerability Management while Tenable Security Center is ranked 1st in Vulnerability Management with 48 reviews. BMC TrueSight Vulnerability Management is rated 7.0, while Tenable Security Center is rated 8.2. The top reviewer of BMC TrueSight Vulnerability Management writes "Good features for infrastructure application; lacking in integrations with other software ". On the other hand, the top reviewer of Tenable Security Center writes "Reliable, useful reports, but initial report configuration could improve". BMC TrueSight Vulnerability Management is most compared with Qualys VMDR and Tenable Nessus, whereas Tenable Security Center is most compared with Tenable Vulnerability Management, Qualys VMDR, Tenable Nessus, Rapid7 InsightVM and Horizon3.ai.

    See our list of best Vulnerability Management vendors.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.