

Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The solution provides a good ROI, especially for regular customers, offering discounts for three-year licenses.
I don't think the tool in itself is very capable of doing that, but we have XSOAR and other tool integrations done on the platform, so this can be accomplished.
If I make it a high priority, they have resolved one query within 20 minutes.
If local Indian support cannot resolve an issue, global tech support aligns promptly within the agreed SLA.
Fast response times and knowledgeable staff who understand the intricacies of the system.
It needs improvement in response time and addressing feature requests promptly.
The technical support of Tenable Vulnerability Management is available 24/7, and whenever we require support, we can get it within five minutes.
We had used Tenable's expert support services in order to make sure that we run Tenable Vulnerability Management on a continuous basis and are able to utilize their services.
For stability, scalability, mean time to response, and potential incident investigation improvements, I would give it a nine or probably even a ten.
Onboarding endpoints and assets on Cortex Cloud by Palo Alto Networks is very easy.
The platform is able to auto-shut certain resources that are not in use through the agentless scan feature.
They can seamlessly scale the number of endpoints from 100 to 1,000,000 in a day.
Tenable Vulnerability Management is highly scalable.
With the growing needs of our company, Tenable Vulnerability Management is able to safely adapt.
My impression of Cloud Runtime Security in stopping attacks in real-time is that I have never had an issue where it has let something through, causing an outage or concerns to the customer.
However, now in Cortex Cloud, I have not seen any lag or buffer.
My evaluation of how stable and reliable Cortex Cloud by Palo Alto Networks is very positive.
I have faced no stability issues with Tenable.
The stability is commendable, and I would rate Tenable ten out of ten.
The stability of Tenable Vulnerability Management is highly reliable.
Regarding the generative AI security tool, I know for sure it's Agentic.
The solution is quite premium in cost compared to alternatives such as Wiz.
There is not a clear MSP model compared to other vendors such as CrowdStrike.
They should also accelerate the process of implementing new features upon request.
I would suggest HP WebInspect as a better option than Tenable.io.
Tenable Vulnerability Management is not very effective for real-time risk prioritization for our organization's security strategy.
The solution is costly, with high-end capabilities suitable for enterprises.
Today, it is smart and easy to calculate the licenses.
Tenable charges around $40 per device, while Rapid7 costs $10 to $15 per device.
I would not say very expensive for Tenable Vulnerability Management; it is not prohibitive, but at the same time, there are some other tools in the marketplace which are offering the same kind of services that Tenable offers, the same kind of features that Tenable has offered at a lesser cost.
AI/ML aids in anticipating remediation for misconfigurations and vulnerabilities, and automatic remediation can be easily configured.
Cortex Cloud by Palo Alto Networks has reduced the time spent on incident investigations, and if I had to estimate, I would say it has cut our investigation time in half.
This simplifies the management of shared responsibility among different people and entities, allowing you to use one single tool instead of having dozens of different tools to orchestrate and integrate.
Tenable enables vulnerability management through potential AI integration that consolidates efforts and resolves multiple vulnerabilities simultaneously.
The main benefit of integration with Tenable Vulnerability Management is that there will be no lack of missing vulnerabilities when it comes to the patching environment.
The best features of Tenable Vulnerability Management are flexibility, breadth and scope, and the fact that their current vulnerabilities come out, and they have tests for them within a day or two.
| Product | Mindshare (%) |
|---|---|
| Tenable Vulnerability Management | 3.1% |
| Cortex Cloud by Palo Alto Networks | 0.9% |
| Other | 96.0% |

| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 3 |
| Large Enterprise | 21 |
Cortex Cloud by Palo Alto Networks enhances cloud security with features like AI/ML threat detection and automated remediation, ensuring real-time protection and efficient management across cloud environments.
Cortex Cloud by Palo Alto Networks offers comprehensive cloud security posture management and runtime protection. It reduces manual tasks and accelerates incident investigation through advanced threat detection and AI-driven anomaly detection. With integration to the MITRE ATT&CK framework, it boosts threat response while reducing incident resolution time. Although users find the UI complex and pricing high, its capabilities in securing AWS, Azure, and other environments, as well as its potential integration with CyberArk, emphasize its enterprise-ready design for cloud transformation across diverse industry sectors.
What are the key features of Cortex Cloud by Palo Alto Networks?Cortex Cloud by Palo Alto Networks is deployed across industries like telecom, BFSI, and manufacturing for robust cloud security. It's leveraged for detecting misconfigurations and vulnerabilities, aiding cloud transformation and compliance with standards such as GDPR and NIST. The integration across cloud infrastructures, including AWS and Azure, supports policy creation and threat management strategies for diverse enterprises.
Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management (formerly Tenable.io) provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.