Find out what your peers are saying about OneTrust, SecurityScorecard, BitSight and others in IT Vendor Risk Management.
The biggest benefit is visibility, allowing organizations to understand their risks, vulnerabilities, and potential threats.
If we cannot adjust how to operate the solution, then it becomes very difficult, so hearing and initial tuning are very important.
Through the use of Tenable Security Center, my clients achieve more efficient patching and gain visibility and understanding of security operations, leading to improved resilience and infrastructure insight.
They need better organization to support their customer volume.
Longer response times and less thorough assistance.
The product is suitable for medium to large businesses, typically with a revenue range from $200 million to a couple of billion dollars.
I can scale it extensively with the use of agents, allowing scanning in restrictive environments and loosely connected devices.
Scalability is a bit limited with Tenable Security Center.
The stability of the solution is outstanding.
There is a need for more active rather than passive third-party risk management features to truly mitigate risks.
It's important for Tenable to catch up on testing capabilities that are present in solutions like Qualys.
Translating reports into European languages is especially relevant in Central Eastern Europe, where clients often require reports in local languages.
The reports and plugins for reports and scans could benefit from enhancements.
There are more expensive and cheaper options available.
Tenable Security Center is quite expensive, particularly for the CEE region, causing us to lose cases due to its pricing.
The price of Tenable Security Center is not so high; it's relatively a cheaper solution.
The product is somewhat pricey, reflecting its valuable features and status as a high-quality solution in the vulnerability management market.
It combines threat intel data with vulnerability information to increase risk ratings and provides insights into third-party supply chain risks.
The most valuable features of Tenable Security Center for my clients are Vulnerability Priority Rating (VPR) and Asset Criticality Scoring.
The most effective feature of Tenable Security Center for detecting vulnerabilities is its capability for critical mapping.
Tenable Security Center is a relatively very good solution, and I don't think it needs improvement; it's a perfect solution.
SecurityScorecard provides comprehensive cybersecurity insights with features such as notifications for score changes and configurable reporting, supporting team collaboration. It emphasizes multi-factor authentication and continuous monitoring for improved risk assessments.
SecurityScorecard specializes in assessing third-party cybersecurity risks, enhancing security posture, and analyzing exposed data. It offers automated information gathering and vendor reports, aiding in vulnerability assessments for supply chain risk management. Users value the Attack Surface Index and recommendations for security improvements, though faster technical response times and better cost-effectiveness, especially in Brazil, are desired. Enhancements such as app scanning and more efficient vulnerability management could expand its capabilities.
What are the key features of SecurityScorecard?SecurityScorecard is utilized in industries for managing third-party cybersecurity threats by providing detailed vulnerability assessments and automated reporting. Its implementation aids supply chain risk management and enhances industry-specific security strategies, with room for improvement in technical response times and dark web intelligence inclusion.
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
Managed on-premises and powered by Nessus technology, the Tenable Security Center (formerly Tenable.sc) suite of products provides the industry’s most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.
We monitor all IT Vendor Risk Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.