Tenable.io Web Application Scanning Primary Use Case
The fundamental objective of this product is to enhance the overall security, be it through verification within the organization or at the user's end.
View full review »PB
reviewer2338416
Consultant at a educational organization with 10,001+ employees
We use the solution to get the daily scans and to know the vulnerabilities of the environment.
View full review »We use the solution for testing and applications. It is for scanning web applications that we deploy for customers. We provide the solution to clients. It does help them check for vulnerabilities on web applications.
View full review »Buyer's Guide
Application Security Tools
March 2024
Find out what your peers are saying about Tenable, Invicti, PortSwigger and others in Application Security Tools. Updated: March 2024.
765,386 professionals have used our research since 2012.
The solution is primarily used for vulnerability scanning.
We are using it for our internal network and scanning for access in our internal network.
For example, sometimes, there are some vulnerabilities in the system that are happening and are unexpected. We use this for finding these vulnerable cases in that system, like blocks4j, and then deal with them. If there's a patch required, we handle advice on patching the system to remove the vulnerability. I put in patch requests and handle reports.
Our primary use case for the solution is automated scanning. It doesn't require scripting knowledge or any of those suites or other tools. So it is fully automated, and we provide the credentials and URL. The tool does all scanning and will show the result per the requirement.
View full review »DV
Dimitar Valov
Software Asset Management/Software & Cloud Analytics Consultant at Crayon Group
We used the solution to asses the security risk of our client's customer-facing platform.
View full review »We use the tool for our websites. We have a vulnerable subdomain. The tool helps to scan it for vulnerabilities.
View full review »I'm a security consultant using Tenable to help our clients perform vulnerability analysis.
View full review »MC
reviewer2304000
Security Consultan at a security firm with 51-200 employees
We mainly use Tenable.io Web Application Scanning to scan vulnerabilities for web application deployment.
View full review »BS
reviewer1990596
Director of Cyber Security at a outsourcing company with 501-1,000 employees
We are using Tenable.io Web Application Scanning for security assurance, workability management, and patch management.
View full review »NC
reviewer1112304
IT Manager at a manufacturing company with 10,001+ employees
We primarily use Tenable.io to scan all of our assets to identify vulnerabilities and determine risk percentages for each.
View full review »MC
reviewer1248330
Security Specialist at a security firm with 51-200 employees
I work for a security company, and I implement Tenable for our customers. I just implement this technology. I'm not working with the users.
Our main use case is for implementing and starting scans for the whole company or a specific host. It is used for creating reports or dashboards for the vulnerabilities of the whole company. As a product for web application scanning, the results are uploaded to the cloud, and the management is on the cloud, but we can implement an on-premises scanner, or we can scan the on-premises web applications of our customers.
ME
reviewer1674711
Senior Cyber Security Specialist at a tech services company with 1,001-5,000 employees
Tenable.io Web Application Scanning is very useful for scanning container exposure, and also for scanning all of the external IP addresses for any organization using Tenable predefined scanners.
View full review »Buyer's Guide
Application Security Tools
March 2024
Find out what your peers are saying about Tenable, Invicti, PortSwigger and others in Application Security Tools. Updated: March 2024.
765,386 professionals have used our research since 2012.