Tenable.io Web Application Scanning Primary Use Case
JP
Jonathan-Pereira
Cyber Security Architect at a comms service provider with 10,001+ employees
I have at least three use cases. One is for ITDR solutions for threat detection. Another is the vulnerability scanning process that I designed and implemented across five companies based on Gartner implementation papers, and one is for OT.
View full review »GR
Girish RAWAT
Project manager at Primus Software Corporation
I use Tenable.io Web Application Scanning to scan our code base once a month to enhance our security operations.
View full review »
It's nice to work with because it gives good results for web application scanning according to OWASP Top 10 and NISC. It's also a very simple tool to use.
View full review »Buyer's Guide
Application Security Tools
June 2025

Find out what your peers are saying about Tenable, Invicti, PortSwigger and others in Application Security Tools. Updated: June 2025.
861,390 professionals have used our research since 2012.
The fundamental objective of this product is to enhance the overall security, be it through verification within the organization or at the user's end.
View full review »We use the solution to get the daily scans and to know the vulnerabilities of the environment.
View full review »The solution is primarily used for vulnerability scanning.
We are using it for our internal network and scanning for access in our internal network.
For example, sometimes, there are some vulnerabilities in the system that are happening and are unexpected. We use this for finding these vulnerable cases in that system, like blocks4j, and then deal with them. If there's a patch required, we handle advice on patching the system to remove the vulnerability. I put in patch requests and handle reports.
We use the solution for testing and applications. It is for scanning web applications that we deploy for customers. We provide the solution to clients. It does help them check for vulnerabilities on web applications.
View full review »We mainly use Tenable.io Web Application Scanning to scan vulnerabilities for web application deployment.
View full review »I'm a security consultant using Tenable to help our clients perform vulnerability analysis.
View full review »We are using Tenable.io Web Application Scanning for security assurance, workability management, and patch management.
View full review »I work for a security company, and I implement Tenable for our customers. I just implement this technology. I'm not working with the users.
Our main use case is for implementing and starting scans for the whole company or a specific host. It is used for creating reports or dashboards for the vulnerabilities of the whole company. As a product for web application scanning, the results are uploaded to the cloud, and the management is on the cloud, but we can implement an on-premises scanner, or we can scan the on-premises web applications of our customers.
We primarily use Tenable.io to scan all of our assets to identify vulnerabilities and determine risk percentages for each.
View full review »We use the tool for our websites. We have a vulnerable subdomain. The tool helps to scan it for vulnerabilities.
View full review »Our primary use case for the solution is automated scanning. It doesn't require scripting knowledge or any of those suites or other tools. So it is fully automated, and we provide the credentials and URL. The tool does all scanning and will show the result per the requirement.
View full review »Tenable.io Web Application Scanning is very useful for scanning container exposure, and also for scanning all of the external IP addresses for any organization using Tenable predefined scanners.
View full review »DV
Dimitar Valov
Software Asset Management/Software & Cloud Analytics Consultant at Crayon Group
We used the solution to asses the security risk of our client's customer-facing platform.
View full review »Buyer's Guide
Application Security Tools
June 2025

Find out what your peers are saying about Tenable, Invicti, PortSwigger and others in Application Security Tools. Updated: June 2025.
861,390 professionals have used our research since 2012.