

Tenable Nessus and SentinelOne Singularity Identity both compete in the cybersecurity market. Tenable Nessus appears to have an advantage due to its affordability and extensive support features, making it a favored choice for those prioritizing cost-effectiveness and integration capabilities.
Features: Tenable Nessus is recognized for its robust vulnerability management, covering scanning and comprehensive reporting, with seamless platform integrations. Its vulnerability prioritization is also noteworthy. In contrast, SentinelOne Singularity Identity offers excellent threat detection, a unified dashboard, and the ability to correlate threats across platforms, enhancing overall security.
Room for Improvement: Tenable Nessus could benefit from better reporting capabilities, an improved user interface, and advanced tool integration for scalability. Its transition to cloud and agent-based scanning handling needs refinement. SentinelOne Singularity Identity requires improvements in endpoint management, response times, and costs. Enhancing real-time support and user interfaces could lead to better user satisfaction.
Ease of Deployment and Customer Service: Tenable Nessus offers versatile deployment options, including on-premises and hybrid cloud, though some users report customer service delays. SentinelOne Singularity Identity operates mainly in public cloud settings, offering reliable support but could benefit from quicker response times and reduced complexity.
Pricing and ROI: Tenable Nessus presents a cost-effective solution with competitive pricing and positive ROI for SMEs, supported by flexible licensing options. SentinelOne Singularity Identity, while providing comprehensive features, is relatively expensive due to advanced capabilities, but offers a significant ROI, addressing security needs for larger enterprises.
They have been responsive to our needs as integrators and those of the client.
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
The stability of Tenable Nessus is extraordinary, not just the best, but extraordinary.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
An AI feature that helps them discover options without requiring them to deep dive into all features or guides them through advisory functions would be beneficial.
Tenable could improve by integrating Gemini or ChatGPT for deeper analysis in risk assessment.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
When we compare it to other solutions, it is more difficult for us to negotiate the price for Tenable Nessus than to negotiate the price with Rapid7.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
The main benefits I get from Tenable Nessus are complete asset inventory and comprehensive attack surface management, allowing us to prioritize vulnerabilities based on risk, focusing on true risk and threat path analysis.
For me, the key value is the ease of use and integration with SIEMs because it has built-in integrations with IBM QRadar and others.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
| Product | Mindshare (%) |
|---|---|
| Tenable Nessus | 4.9% |
| SentinelOne Singularity Identity | 0.9% |
| Other | 94.2% |


| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
Tenable Nessus enhances cybersecurity by detecting vulnerabilities with comprehensive scanning, user-friendly dashboards, and automated reporting, providing value in asset management, configuration audits, and compliance.
Providing real-time monitoring and ease of use, Nessus stands out with its integration capabilities, predictive prioritization, extensive plugin system, and cost-effectiveness. It supports vulnerability assessments for networks, applications, and devices, offering detailed reports for continuous security improvement. Nessus' capabilities extend across on-premise and cloud deployments, aiding compliance and remediation processes while aligning with security standards. While robust, it could benefit from enhanced cloud capabilities, improved scanning accuracy, and more flexible licensing options.
What are the standout features of Tenable Nessus?Tenable Nessus is implemented widely across industries for internal and external vulnerability assessments and management, aiding organizations in scanning servers, workstations, and network devices. Benefiting sectors prioritize security within their unique environments, leveraging Nessus for its thorough reports and compliance assurance.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.