We use Nessus Scanner for internal and external penetration testing activities. The tool in internal penetration testing activities is very useful, but requires regular updating of the patches which requires certain memory and RAM space in the installed server.
Ex Senior Security Analyst and Onsite consultant at a tech services company with 1,001-5,000 employees
Very effective for internal penetration testing
Pros and Cons
- "Nessus scanner is very effective for internal penetration testing."
- "I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
What is our primary use case?
How has it helped my organization?
In order to finish a project, a pentester in our company has, on average, five days including documentation. Without this tool just the testing would take five days. By using Nessus, we are able to finish testing with assured results, in half the time.
What is most valuable?
Nessus scanner is very effective for internal penetration testing.
What needs improvement?
I feel that in certain areas this product has false positives which the company should work on.
They should also try to include business logic vulnerabilities in the scanner testing.
Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls.
Buyer's Guide
Container Security
December 2025
Find out what your peers are saying about Tenable, Palo Alto Networks, Aqua Security and others in Container Security. Updated: December 2025.
879,853 professionals have used our research since 2012.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
The product we use in our office under different environments is highly stable.
What do I think about the scalability of the solution?
This product is designed for easy scalability and can scale up without major challenges.
How are customer service and support?
We experienced very quick customer support. They had a complete list of our previous issues along with our history which made it faster for us to solve the issues.
How was the initial setup?
It's a straightforward implementation. Once you receive the key, you need to enter the PIN number and, through the internet, it automatically detects the version and internet. It downloads packages seamlessly. One point to note here is that once the license is over, you can only access the completed files but you cannot initiate new scans.
What's my experience with pricing, setup cost, and licensing?
It's best to be an institutional buyer and directly contact the sales team, as they can provide over-the-top discounts for bulk orders.
Which other solutions did I evaluate?
Qualys box, but it is bulky and difficult to carry everywhere. The benefit with Nessus is that it is in software format.
What other advice do I have?
Try the Home edition of the product to understand the scanner settings. Note that packages are pushed for Home edition after seven days, whereas in the Professional version the packages are released on the same day of vulnerability declaration.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
Buyer's Guide
Download our free Container Security Report and find out what your peers are saying about Tenable, Palo Alto Networks, Aqua Security, and more!
Updated: December 2025
Product Categories
Container SecurityPopular Comparisons
Prisma Cloud by Palo Alto Networks
Qualys VMDR
CrowdStrike Falcon Cloud Security
Aqua Cloud Security Platform
Sysdig Secure
SUSE NeuVector
Red Hat Advanced Cluster Security for Kubernetes
Azure Kubernetes Service (AKS)
CoreOS Clair
SUSE Rancher
Buyer's Guide
Download our free Container Security Report and find out what your peers are saying about Tenable, Palo Alto Networks, Aqua Security, and more!
Quick Links
Learn More: Questions:
- When evaluating Container Security, what aspect do you think is the most important to look for?
- What tools do you rely on for building a DevSecOps pipeline?
- Container vs VM: What are the main differences?
- What do you look for in a container security solution?
- What container security solution are you using?
- Which Container Image Security tool is the best in the current market?
- Why is Container Security software important for companies?
- Why is Container Security important for companies?
- What are some tips for ensuring that containers are secure?
- What container security solution are you using? Do you recommend it?













