We performed a comparison between IBM Guardium Vulnerability Assessment and Tenable Nessus based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"The most valuable feature of Tenable Nessus is vulnerability assessments. There are a lot of threats around the world and this solution is the first to come out with detection rules."
"Tenable Nessus is cheap and flexible."
"Scanners and reports using CIS templates ("de-facto" standard, easy to fix and to locate correction tips at documentation), tests against cloud providers, database profiles, several types of telecom devices, and others highly customizable scans."
"It's scalable."
"The product's most valuable features are vulnerability and asset management. It can define the rules and validate the configuration."
"The most valuable feature of Tenable Nessus is real-time monitoring."
"Tenable Nessus is one of the best vulnerability assessment tools, that I know."
"The most valuable aspect of this solution is that you receive the entire report, which details the breakdown, especially in terms of critical, high, low, and mediums."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"We feel the solution's technical support to be very bad."
"It would be a good idea if they have a simulation of attacks or a use case for finding a new vulnerability or dealing with a zero-day attack."
"Tenable Nessus could improve the reporting."
"I think the reporting templates could be improved with Tenable Nessus."
"It would be nice for the professional module to include some of the reports available in the expert module."
"One area with room for improvement is instead of there just being a PDF format for output, I'd like the option of an Excel spreadsheet, whereby I could better track remediation efforts and provide reporting off of that."
"We would like to have the option of using the solution for the cloud as well as on-premises with the same license at the same time. That would be very helpful."
"It wasn't very clear how the scripts are running the scans. There's information about the script but it's not straightforward. The script information for each of the plugins should be available, but it doesn't give us straightforward direct information about how it was executed. That needs to be more clear."
More IBM Guardium Vulnerability Assessment Pricing and Cost Advice →
IBM Guardium Vulnerability Assessment is ranked 38th in Vulnerability Management with 3 reviews while Tenable Nessus is ranked 3rd in Vulnerability Management with 75 reviews. IBM Guardium Vulnerability Assessment is rated 6.6, while Tenable Nessus is rated 8.4. The top reviewer of IBM Guardium Vulnerability Assessment writes "Worthwhile from the regulatory requirements and analytics perspective, but is expensive and not easy to use". On the other hand, the top reviewer of Tenable Nessus writes "Unlimited assets for one price and quick, agentless results". IBM Guardium Vulnerability Assessment is most compared with Qualys VMDR, Acunetix, Rapid7 InsightVM and Orca Security, whereas Tenable Nessus is most compared with Qualys VMDR, Rapid7 InsightVM, Tenable Security Center and Tenable Vulnerability Management.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.