We performed a comparison between IBM Guardium Vulnerability Assessment and Tenable Security Center based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"This solution has a much lower rate of false positives compared to competing products."
"I like Tenable.sc's analytics and reporting. You can also configure your on-prem network monitors to talk to your Tenable.sc control panel."
"Tenable SC is good for reporting and alerting. The filtering feature is also very valuable. Its integration with multiple vendors is quite good. It can be integrated with SIEM solutions and PAM solutions such as Thycotic, which is very helpful."
"Compliance and vulnerability scans are most valuable. Compliance scan helps in validating how our teams are complying, and vulnerability scan helps in future-proofing. Its vulnerability detection is accurate."
"The product is our second solution, and we are happy that it meets our requirements."
"Has a great advanced scanning feature."
"It is a very good and user-friendly product."
"One of the most valuable features is their distributed scan model for allotting engines to work together as a pool and handle multiple scans at once, across multiple environments. Automatic scanning distribution is a distinguishing feature of their toolset."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"The biggest issue I have with the solution is when I'm using the scanning it picks up the original DNS of that device. That means, before we image it and actually change the DNS to something within our company structure, it'll just be random numbers and letters and Tenable will stick to that DNS for a long time."
"A good plugin editor would be a good additional option for the Security Center."
"We would like to see the inclusion of external IPs and simplified reporting that's easier to deal with"
"The solution should provide better web application features and support."
"The product should provide risk-based vulnerability management."
"The tool's initial configuration is not so easy."
"I think the vendor training provided for Tenable.sc could be a lower price. It's quite expensive for the training."
"Tenable.sc's user interface could be improved."
More IBM Guardium Vulnerability Assessment Pricing and Cost Advice →
IBM Guardium Vulnerability Assessment is ranked 40th in Vulnerability Management with 3 reviews while Tenable Security Center is ranked 1st in Vulnerability Management with 48 reviews. IBM Guardium Vulnerability Assessment is rated 6.6, while Tenable Security Center is rated 8.2. The top reviewer of IBM Guardium Vulnerability Assessment writes "Worthwhile from the regulatory requirements and analytics perspective, but is expensive and not easy to use". On the other hand, the top reviewer of Tenable Security Center writes "A security solution for vulnerability assessment with automated scans". IBM Guardium Vulnerability Assessment is most compared with Tenable Nessus, Qualys VMDR, Acunetix, Rapid7 InsightVM and Orca Security, whereas Tenable Security Center is most compared with Tenable Vulnerability Management, Qualys VMDR, Tenable Nessus, Rapid7 InsightVM and Horizon3.ai.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.