We performed a comparison between Microsoft Defender Vulnerability Management and Tenable Vulnerability Management based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The product's stability is very high...The scalability of the product is amazing."
"The solution is up-to-date and helps prevent zero-day attacks."
"One valuable feature is the Microsoft Security Scorecard."
"The solution helps identify threats and vulnerabilities."
"The product’s most valuable features are compliance, recommendations, and inventories."
"The vulnerability scanning is the most important aspect of the solution for us."
"The most valuable feature for me is container scanning because I am interested in CICD security."
"The initial setup is not complex."
"The solution is quite friendly."
"There is no burden of updating or upgrading this solution."
"It is quite straightforward to set up."
"The initial setup is pretty straightforward."
"The dashboard is pretty intuitive, and it lets you do a drill-down analysis of each vulnerability. That is something that brings a lot of value to the organization."
"The setup phase of the product is not that easy and needs a person to have a certain level of expertise."
"The general support could be improved."
"Integration can be improved."
"The technical support takes too much time to resolve tickets."
"It is challenging to extract and customize reports from the system."
"I'd like to see them improve their support."
"They've been able to think about everything in terms of where the world is going and the type of assets that you've got. They've everything sorted out in that aspect, but you have to pay for most of the other components that they've got to give you complete visibility across your tech surface. If it already had those capabilities in-built, without having to add them on to take advantage of them, it would be a very compelling value proposition."
"Users get confused between VPR and CVSS ratings."
"There needs to be better dashboard navigation."
"I would like the solution to cover the whole cycle of mitigation since it's an area where the solution currently lacks."
"Tenable.io Vulnerability Management could be improved with an increased number of dashboards and MSSP integration."
"Tenable could improve visibility into assets, including automated asset tagging. You should be able to automatically tag assets based on location, function, ownership, etc. That would help us because we spend a lot of time identifying and tagging assets by hand."
"The reporting was never great in Tenable Vulnerability Management, so, in my company, we imported all the data into Ivanti RiskSense to start using it for reporting."
More Microsoft Defender Vulnerability Management Pricing and Cost Advice →
More Tenable Vulnerability Management Pricing and Cost Advice →
Microsoft Defender Vulnerability Management is ranked 22nd in Vulnerability Management with 5 reviews while Tenable Vulnerability Management is ranked 2nd in Vulnerability Management with 38 reviews. Microsoft Defender Vulnerability Management is rated 8.2, while Tenable Vulnerability Management is rated 8.2. The top reviewer of Microsoft Defender Vulnerability Management writes "The vulnerability assessment is very accurate because it runs directly into the vulnerability database". On the other hand, the top reviewer of Tenable Vulnerability Management writes "Discovers vulnerabilities and integrates well with other solutions". Microsoft Defender Vulnerability Management is most compared with Qualys VMDR, Tenable Nessus, Rapid7 InsightVM, Microsoft Defender XDR and Microsoft Sentinel, whereas Tenable Vulnerability Management is most compared with Tenable Security Center, Tenable Nessus, Qualys VMDR, Amazon Inspector and Rapid7 InsightVM. See our Microsoft Defender Vulnerability Management vs. Tenable Vulnerability Management report.
See our list of best Vulnerability Management vendors and best Risk-Based Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.