Try our new research platform with insights from 80,000+ expert users

What do you like most about Tenable.io Web Application Scanning?

Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot
  • 0
  • 6
PeerSpot user

11 Answers

Last answered Feb 9, 2024
reviewer2304000 - PeerSpot reviewer
Security Consultan at a security firm with 51-200 employees
Real User
Top 10
Feb 9, 2024
Search for a product comparison
reviewer2338416 - PeerSpot reviewer
Consultant at a educational organization with 10,001+ employees
Consultant
Top 20
Feb 5, 2024
Jahanzeb Feroze Khan - PeerSpot reviewer
Assistant Manager Network Security at Institute of Business Administration, Karachi
Real User
Nov 14, 2023
DV
Software Asset Management/Software & Cloud Analytics Consultant at Crayon Group
Real User
Top 20
Aug 8, 2023
Robert Cheruiyot - PeerSpot reviewer
IT Security Consultant at Microlan Kenya Limited
Real User
Apr 12, 2023
HATICE YAMAN - PeerSpot reviewer
Cyber Security Analyst at a printing company with 11-50 employees
Real User
Nov 8, 2022
Find out what your peers are saying about Tenable, Invicti, PortSwigger and others in Application Security Tools. Updated: November 2025.
879,259 professionals have used our research since 2012.
Bill Hsiao - PeerSpot reviewer
Senior Information Security Analyst at a computer software company with 10,001+ employees
Real User
Oct 18, 2022
reviewer1248330 - PeerSpot reviewer
Security Specialist at a security firm with 51-200 employees
Real User
Feb 10, 2022
Mahmoud Elhamaymy - PeerSpot reviewer
Professional services team lead at a tech services company with 1,001-5,000 employees
Reseller
Top 20
Oct 5, 2021
reviewer1112304 - PeerSpot reviewer
IT Manager at a manufacturing company with 10,001+ employees
Real User
Jun 7, 2020
reviewer889494 - PeerSpot reviewer
Security Consultant at a tech consulting company with 51-200 employees
Consultant
Jan 30, 2020
Application Security Tools
Application Security Tools are designed to ensure the security of applications by identifying vulnerabilities and potential threats during development and operation phases. They play a crucial role in safeguarding data integrity and user privacy.These tools provide comprehensive security assessments and support for applications, focusing on identifying weaknesses in code and preventing threats. Users share insights about their effectiveness in real-world environments, emphasizing their value...
Download Application Security Tools ReportRead more

Related Q&As