No more typing reviews! Try our Samantha, our new voice AI agent.

IBM Guardium Vulnerability Assessment vs Tenable Security Center comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Guardium Vulnerability ...
Ranking in Vulnerability Management
51st
Average Rating
6.0
Reviews Sentiment
8.1
Number of Reviews
4
Ranking in other categories
No ranking in other categories
Tenable Security Center
Ranking in Vulnerability Management
6th
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
56
Ranking in other categories
Cloud Security Posture Management (CSPM) (14th), Risk-Based Vulnerability Management (3rd)
 

Mindshare comparison

As of March 2026, in the Vulnerability Management category, the mindshare of IBM Guardium Vulnerability Assessment is 0.7%, up from 0.4% compared to the previous year. The mindshare of Tenable Security Center is 3.1%, down from 6.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Tenable Security Center3.1%
IBM Guardium Vulnerability Assessment0.7%
Other96.2%
Vulnerability Management
 

Featured Reviews

SL
Guardium Administrator at Interactive Group
Improvements sought in database optimization while benefiting from robust security monitoring
We use the analytical functionality of Guardium, but the analytical functionality is not so powerful or flexible because it does not include the application user ID. It only includes the database user ID. To identify risky users, it does not support end users, so IBM must incorporate this feature into the built-in analytical engine of the Guardium. There is only one problem I experienced while using Guardium: the internal database of the collector is MySQL, which is not so powerful or flexible. When you make a query in a MySQL database, it takes too much time to respond. IBM should replace this MySQL database with a more powerful internal database for the logging mechanism so that Guardium can collect logging data flexibly and ensure optimization. My overall experience with Guardium is good. The only problem is that IBM must replace the internal DB, MySQL, with a more powerful enterprise-level database because enterprises use it at an enterprise level, and MySQL does not support optimally.
reviewer1534134 - PeerSpot reviewer
Head of Information Security at a consultancy with 1,001-5,000 employees
Centralized analytics have strengthened patch visibility and support efficient regulatory reporting
From my experience, I assess the product's analytics capabilities as successful. It helped us significantly with patching and managing the risk of the patching process across all our environments, including network devices with Windows and Unix systems. The product covered several environments and gave us exactly what we needed in our environment. Tenable Security Center's centralized platform helped with risk assessment and management across our IT environments. It covered the patching process, and we previously faced many issues regarding how to patch different environments, how to monitor the patching process, and whether it was successful or not. We obtained good reports showing when patches were closed and the details of each patch, including who executed it and everything related to the patching process until it was closed. This gave us good details about the process which helped us significantly in our reporting and even in audits, whether internal or external. We learned how to close audit issues safely and successfully. We used the dashboards for real-time threat insights and extracted several dashboards from Tenable Security Center. We use these dashboards in our cybersecurity dashboard and committees that we have. These dashboards are part of our committees, especially the cybersecurity committee and other committees that we attend.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The Vulnerability Assessment feature is quite stable and helps identify numerous vulnerabilities in databases."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"It helped with some of the regulatory requirements, and it also helped with some of the security analytics and analysis, making it worthwhile from that perspective."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"The best feature is that you can see the activity in your data environment and have the ability to get the vulnerability assessments done quickly with scores that can be compared."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"Tenable Security Center scans networks and gives reports."
"One of the most valuable features is their distributed scan model for allotting engines to work together as a pool and handle multiple scans at once, across multiple environments. Automatic scanning distribution is a distinguishing feature of their toolset."
"In terms of vulnerability mitigation, SecurityCenter has worked quite well and is a perfect replacement for GFI LanGuard."
"The most valuable feature of this solution is the vulnerability assessment."
"We use Tenable to scan all of our environments and plugins for vulnerabilities, and Tenable helps us discover network vulnerabilities to threats and piracy."
"I think that this is a good solution for evaluating vulnerability in the network."
"The solution is one of the most, if not the most, stable product available."
"The predictive prioritization features are pretty good. They do a lot of research and we trust the research that they do internally. They have knowledge of what's going on with many companies, where we only get a view into what's going on here. So the ability to get best practices out of them as part of this solution, is valuable to us."
 

Cons

"There is only one problem I experienced while using Guardium: the internal database of the collector is MySQL, which is not so powerful or flexible."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"The only problem is that some of the reports come up with blanks and missing data."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"I wouldn't use it. That would be my advice to others looking into implementing IBM Guardium Vulnerability Assessment."
"The GUI could be improved to have all concerns and priorities use the same GUI, allowing them to see all tickets, assign vulnerabilities, and assign variation failures to each member of their team."
"We experienced some difficulties with the solution’s support."
"Tenable's technical support has declined in quality over time. While they used to be excellent, achieving ratings of eight or nine, they now rate around six or seven due to longer response times and less thorough assistance."
"Its reporting can be improved. It is not easy to generate a scan report the way we want."
"The reports and plugins for reports and scans could benefit from enhancements."
"Tenable SC could be improved with additional connectivity to external company postures and the capability of managing and sustaining agents in the systems directly without additional platforms in the middle."
"Though reasonable, the main competitor of Tenable SC, Rapid7, offers a more aggressive and better priced product."
"The solution should provide better web application features and support."
 

Pricing and Cost Advice

"One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing."
"I use a local license to perform penetration testing and I'm pretty happy with everything when it comes to pricing and licensing."
"Costing is pretty reasonable compared to the competition."
"My company needs to make yearly payments towards the licensing costs. The pricing of the solution falls in the mid-range level, so it is not too expensive"
"I would rate the pricing a nine out of ten, where ten is expensive. It is the most expensive tool my company is using."
"Compared to other companies or other products it could maybe be a little bit less, but the price is okay. I would say it's not very expensive."
"Tenable.sc is more expensive than its competitors."
"We're able to save because we don't have to employ more staff members to help wit ht he scheduling of the scans, running the reports or sending them out to the systems owners. That alone is a big ROI for us."
"The pricing is more than Nexpose."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
30%
Government
6%
Healthcare Company
6%
Construction Company
6%
Financial Services Firm
11%
Manufacturing Company
10%
Government
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business22
Midsize Enterprise10
Large Enterprise27
 

Questions from the Community

What needs improvement with IBM Guardium Vulnerability Assessment?
We use the analytical functionality of Guardium, but the analytical functionality is not so powerful or flexible because it does not include the application user ID. It only includes the database u...
What is your primary use case for IBM Guardium Vulnerability Assessment?
We are still using IBM Guardium Vulnerability Assessment. We only use IBM Guardium Data Protection and monitoring, data protection and monitoring, classical Guardium. We only use classical Guardium...
What advice do you have for others considering IBM Guardium Vulnerability Assessment?
We do not use IBM Guardium Vulnerability Assessment for data encryption or any other tool for analytics, or identity and governance. We do not use any other solution except for protection and monit...
What do you like most about Tenable SC?
The tool's dashboard and reporting capabilities match our company's needs since we are able to modify the basic view to create a new dashboard, and it works out very well for our needs.
What is your experience regarding pricing and costs for Tenable SC?
The price of Tenable Security Center is not so high; it's relatively a cheaper solution.
What needs improvement with Tenable SC?
We did conduct a long implementation which relates to what I think can be improved about Tenable Security Center. In some cases, we needed to refer back to Tenable itself, and in other cases, we ne...
 

Also Known As

No data available
Tenable.sc, Tenable Unified Security, Tenable SecurityCenter
 

Overview

 

Sample Customers

Information Not Available
IBM, Sempra Energy, Microsoft, Apple, Adidas, Union Pacific
Find out what your peers are saying about IBM Guardium Vulnerability Assessment vs. Tenable Security Center and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.