2018-03-12T13:28:00Z

What advice do you have for others considering Tenable SC?

Julia Miller - PeerSpot reviewer
  • 0
  • 99
PeerSpot user
24

24 Answers

OniRahman - PeerSpot reviewer
Real User
Top 5
2022-10-20T13:17:53Z
Oct 20, 2022

We sell Tenable. I'm using something around version five. I have installed the demo version of it in my Docker. The product really stands out in comparison to the competition. However, the price tag is a bit on the higher. I would advise new users to scan all assets and grab the results and set up all security postures and do stats for mitigating those attacks which are critical. For the first time, I would recommend they go for the critical and high vulnerabilities first in order to mitigate effectively very early on. I'd rate the solution nine out of ten.

Search for a product comparison
SD
Real User
Top 5
2022-09-26T12:21:23Z
Sep 26, 2022

I would rate Tenable eight out of ten.

Mohamed Elnahas - PeerSpot reviewer
Real User
Top 10
2022-09-23T15:18:06Z
Sep 23, 2022

I would give the product an overall rating of nine out of 10. The product is a very good solution. I would advise potential users to look at other solutions. The product is our second solution, and we are happy that it meets our requirements.

Abhik Chatterjee - PeerSpot reviewer
Real User
Top 10
2022-08-09T08:54:06Z
Aug 9, 2022

I would recommend this solution to others. I rate Tenable SC an eight out of ten.

JoaoManso - PeerSpot reviewer
Reseller
Top 5
2022-08-08T13:48:07Z
Aug 8, 2022

Tenable SC is suitable for medium and large companies, but it's not feasible for small ones. If you're in the US, I advise buying services from Tenable to implement the system instead of trying to implement it yourself. There are always some tricks that come with knowledge of the product that will make for a faster and better installation. Similarly, if you're in EMEA or Asia, please choose a good integrator. I would give Tenable SC a rating of nine out of ten.

Rafael Ustariz - PeerSpot reviewer
Consultant
Top 10
2022-05-19T14:58:25Z
May 19, 2022

I rate Tenable SC an eight out of ten.

Learn what your peers think about Tenable Security Center. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
PA
Real User
Top 20
2022-04-25T09:35:00Z
Apr 25, 2022

I would rate the solution as a nine out of ten.

François PICHARD - PeerSpot reviewer
Real User
Top 10
2022-04-10T11:03:53Z
Apr 10, 2022

This is a good solution for what I use it for. I would recommend it to others. I rate Tenable SC a seven out of ten.

SP
Real User
2022-01-19T10:33:11Z
Jan 19, 2022

It has been good so far. I would rate it an eight out of 10.

MF
Real User
2022-01-17T06:11:00Z
Jan 17, 2022

I would rate it a seven out of ten.

ME
Real User
2021-10-05T10:32:10Z
Oct 5, 2021

Tenable SC is without a doubt a good choice. I would rate Tenable SC a nine out of ten.

AB
Reseller
2021-09-06T14:05:31Z
Sep 6, 2021

The size of our customers run the gamut, from small medium to large, in certain cases exceeding 5,000 IPs. I would definitely recommend the solution. I rate Tenable SC as an eight-plus out of ten.

BT
Real User
2021-04-28T20:32:08Z
Apr 28, 2021

It is a much better solution than other competitors. It provides almost everything that is required in terms of vulnerability management. If you are looking for overall enterprise security in terms of integrations and vulnerability management, you should go for Tenable SC or Tenable SCCV. I would rate Tenable SC a nine out of ten.

TG
Real User
2021-01-06T08:10:07Z
Jan 6, 2021

I can easily recommend Tenable SecurityCenter, and I have nothing really bad to say about it. I think it's a great tool for what it does. I enjoy the webinars, and the people that run the company seem very engaged with what's going on when you're into current events and the overall security climate, and they're continuously looking to improve. I can't speak to every option that they have, but I have no reservations recommending them. I would rate Tenable SecurityCenter an eight out of ten.

it_user1395987 - PeerSpot reviewer
Reseller
2020-09-08T09:10:01Z
Sep 8, 2020

I would definitely recommend the solution but I would tell people that it requires dedicated staff. You need to have someone looking at what's going on when you scan and you need somebody to go through all the results, otherwise it just sits there. I would rate this solution an eight out of 10.

JoaoManso - PeerSpot reviewer
Reseller
Top 5
2020-06-04T09:41:24Z
Jun 4, 2020

My advice for anybody who is implementing this product is to search for a certified partner to help with the process. It's not difficult, but it's very important to have a partner who knows the product well. The first steps in the implementation have to be the correct ones. If not, the product will not achieve the objectives that the company usually needs. It would be wrong for someone that doesn't know the product very well to begin implementing it by themselves. This is the best product that we have found for risk management. I would rate this solution a nine out of ten.

MS
Consultant
2020-04-06T08:22:00Z
Apr 6, 2020

Nessus is for a single company and tenable SC is for when you've got multiple repositories. SC is the same as Nessus, except it's got central logging. It's the same thing. For large widespread companies, you use SC, if you're a small to medium-sized company, you use Nessus. I would rate it an eight out of ten. Not a ten because of the reporting. It needs improvement.

JD
Real User
2019-11-14T06:34:00Z
Nov 14, 2019

Go in with open expectations. Companies don't realize how big their infrastructure really is before they can get a single pane of glass view, which Tenable provides. Don't be disheartened when you run that first scan. It is a process. This is not a sprint, this is a marathon. If you're not willing to invest in this for the long run, then maybe your organization just isn't ready. I don't know how to assess our vulnerability status compared to that of our peers. The defense industry is fairly secretive about what goes on. But I think we're doing the right things. Having the licensing and the investment that we put in place puts us ahead in the industry. I can only really speak for myself, but I think that we are doing the right things, and investing the right dollar. And if our competitors are doing that, good for them. If not, I wish they would. Security Center is generally run by either the information security manager or the information security officer. There are a few dozen people who have access to it and their roles would be two-fold: There are the lower-level, cybersecurity folks who are dealing with it on a day-to-day basis. And there are the more managerial types who would be getting reports and making decisions off of it. Lastly, the general IT staff would be using the reports or the remediation recommendations for making changes to their environment. For deployment and maintenance of the solution we don't need that many. We had Professional Services in and we added a team of four to the Professional Services engineer to help us get it stood up over those two weeks. In terms of ongoing support of the solution, we have one or two people who are tasked with updating the vulnerability database and verifying scans and the like. But it's not overly burdensome. They are information security officers or cybersecurity specialists. I would rate Security Center at eight out of ten. First, it's a little heavy-handed for us from a licensing perspective and second, there are some features and functionality that we'd like to see in the future which would make it more user-friendly for non-technical or more managerial types. It seems that the product is really written for technologists, especially on the reporting side.

JK
Real User
2019-06-30T10:29:00Z
Jun 30, 2019

Make sure that your sizing is done correctly, in terms of the hardware size. When you do buy Tenable, a lot of times you'll use Professional Services to help you implement the tool. Whatever advice Tenable has, listen to it very specifically and also talk to them specifically about what your goals are. Instead of talking tactics, talk about goals. What's going to happen is that they may say "Hey, we're going to do things slightly differently than how you used to do it," but in a lot of instances, they're going to be right. In terms of features that we're looking forward to, VPR is one that we're going to start using more. And they also recently had a SAML integration for single sign-on. That was a new feature in 5.9. Overall, Tenable is easily a nine out of ten. It's not a ten because there is no perfect tool out there, and Tenable SecurityCenter does have its limitations.

JS
Real User
2019-05-30T08:12:00Z
May 30, 2019

In my type of medical environment, when you get into an operational technology environment, PVS or something that's a passive scanner is more the way to go than something that actively goes out and scans and tries to interrogate endpoints, because that can cause impact. When dealing with the healthcare space or, say, the electrical grid, the consequences can be very widespread or can cause significant impact. Something like PVS is a great idea to look into. If you're scanning operational technology, definitely use connectionless-oriented discovery policies. For example, perform UDP scans instead of TCP scans. From my experience, TCP scans have definitely brought down systems. When it comes to insight, it helps but, the way we're using it now, scans only pick up what's active on the network, while the scan is occurring. For my environment, I perform most of my scans overnight, so I'm missing a lot of stuff that is used during the day in the clinical environment. That includes point-of-care devices, ultrasonography, and some other stuff. I don't scan the networks during the day, for the most part, so I do miss a lot of that stuff. PVS, the passive scanner, would pick up on a lot of that. When talking about actually detecting intrusion, I think it would be more powerful if we're able to get it deployed everywhere. Two people in our organization actively use it for a lot of scanning. Some of the other security guys use it, but for the most part, it's just my colleague and I who use it. I have my scheduled, routine scans that run automatically and there are the scans I schedule for overnight. I run discovery scans daily. I run my vulnerability audit scans every other month. I'm doing the RDP scans now. I log into it daily and I run scans in it several times a week manually, outside of the scheduled scans. I use it heavily. Right now there is just one person who manages the solution. I handle some of the PVS stuff but it's my colleague who is running the show. Overall, I would give Security Center a nine out of ten. Of all the tools I've used, when it comes to managing the vulnerabilities and risks of a whole enterprise environment, I don't think I've used a better tool than Security Center. The reason I say nine and not a ten, is because I like to have a lot of control. When I use a Nmap, I'm able to write my own scripts. Security Center has a lot of that built-in, but I feel like there's very deep and more granular control once you know how to use some of the open-source tools out there.

Daniel_Ndiba - PeerSpot reviewer
Real User
Top 20
2019-05-09T13:12:00Z
May 9, 2019

This is a good solution for evaluating vulnerability in the network. It gives wide coverage, and it is able to scan most platforms on the network. I would rate this product an eight out of ten.

BJ
Real User
2018-12-13T11:34:00Z
Dec 13, 2018

Before, just preparing the monthly scans alone would take us about two weeks to set up. Then, we would have to wait for at least another two weeks for those assessments to be done, for the scanning to be done, and then it will take us about another two weeks to generate the report before we can send them out to the system owners. That's the reason why those were our main drivers, as well, for us to push the use of the Tenable Security Center as a self-service platform to the system owners. The quick turnaround time in terms of generating reports and sending them out to the respective system owners is significant.

AN
Real User
2018-10-28T09:33:00Z
Oct 28, 2018

If you are considering a product like this, you must take into account and properly plan, scope, and scan. You need to know how to properly place your scanners and how to schedule automatic scans. You need to properly schedule your scans, so for example you don't need to scan your data center during that day when your business is most active, you can schedule your scans to run in the middle of the night, when your systems are least active. If you wake up on LAN, then you can even scan clients during the night. You schedule wake up on LAN, your boxes are woken up on LAN, then the scanning is run, and then the boxes are shut down once the scan is over. So that's proper scoping and planning with this solution.

CV
User
2018-03-12T13:28:00Z
Mar 12, 2018

Know what you're getting into, and know the difference between security compliance suites and SIEM suites. The two are very different, which is why I'm very unhappy using SecurityCenter, because it's been forced upon me as a replacement for a product that it doesn't even compete with.

Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities. Managed on-premises and powered by Nessus technology, the Tenable Security Center (formerly Tenable.sc) suite of products provides the industry’s most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.
Download Tenable Security Center ReportRead more