Coming October 25: PeerSpot Awards will be announced! Learn more
2018-08-29T19:26:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 173

What is your primary use case for Tenable Nessus?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

35
PeerSpot user
35 Answers
Dr Trust Tshepo Mapoka - PeerSpot reviewer
Senior Cybersecurity Consultant at CIA Botswana
Real User
Top 5
2022-08-22T16:44:50Z
22 August 22

I primarily use Nessus for vulnerability management, including scanning, identifying, and assessing risks.

LO
Founder & CEO at a tech services company with 1-10 employees
Real User
Top 5
2022-07-29T14:24:10Z
29 July 22

Tenable Nessus can be deployed on the cloud and on-premise. I use Tenable Nessus for an internal secured scale.

Md. Shahriar Hussain - PeerSpot reviewer
Cyber Security & Compliance Lead Engineer at Banglalink
Real User
Top 5Leaderboard
2022-07-29T08:07:23Z
29 July 22

I use this solution for OS auditing, database auditing, virtualization, and following how closely it follows our CI or TISA benchmarks. We also use it for malware and ransomware risk and for carrying out assessments. We purchased this product from a local partner that has a premium partnership with Tenable. I'm a cybersecurity and compliance lead engineer.

Wessam Altoumi - PeerSpot reviewer
Chief Commercial Officer at Yamamah Information Technology & Communication Systems LLC
Real User
Top 5
2022-07-14T06:48:15Z
14 July 22

Two of our customers use it for vulnerability assessment and penetration testing, and they are getting very good results.

JK
CBO at a security firm with 11-50 employees
Reseller
Top 5
2022-06-16T15:24:35Z
16 June 22

Our customers are using this solution. They scan their network, and they get a report about vulnerability assessment tools and solutions. It's deployed on-prem.

BE
Security Analyst at PJM Interconnection
Real User
Top 20
2022-05-19T17:46:25Z
19 May 22

Tenable Nessus can be deployed on-premise and in the cloud. Tenable Nessus is a vulnerability scanner to find vulnerabilities. The solution finds the vulnerabilities in our environment and then we send those vulnerabilities that are found out to the SMEs to be fixed.

Learn what your peers think about Tenable Nessus. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
634,325 professionals have used our research since 2012.
MH
Information Security Engineer at a tech services company with 11-50 employees
Real User
2022-03-21T18:59:56Z
21 March 22

We are a solution provider and Tenable Nessus is one of the products that we implement for our clients. The primary task that Tenable is focused on is vulnerability management.

Ali Al-Mahrooqi - PeerSpot reviewer
Manager at a financial services firm with 201-500 employees
Real User
2022-02-03T11:47:03Z
03 February 22

We're using Tenable Nessus to manage vulnerabilities.

Dhananjay-Naldurgkar - PeerSpot reviewer
Senior Consultant - Cyber Security Services at Coforge
Real User
Top 20
2021-12-21T09:16:00Z
21 December 21

We primarily use the solution for our customer vApp, the dynamic application testing using NetWeb application and security and the infra scanning. It allows us to do a weekly scan for our customers.

LO
Founder & CEO at a tech services company with 1-10 employees
Real User
Top 5
2021-12-08T22:52:56Z
08 December 21

I'm currently using the Nessus essentials for testing, it's installed on my Notebook. My company has only been in operation for one month so as soon as I close with my first client, I will buy the professional version. I used the solution in my previous job.

MK
Manager Information Security at a financial services firm with 51-200 employees
Real User
Top 5
2021-11-15T20:55:00Z
15 November 21

We are using it to find out the vulnerabilities in our critical servers and to patch them. We are using the latest version.

VK
Information Technology Security Specialist at a tech services company with 201-500 employees
Real User
Top 5
2021-10-06T11:18:42Z
06 October 21

I'm using Tenable Nessus for my personal projects and vulnerability assessment, but I can't discuss what I do at work with you.

Attila Mate Kovacs - PeerSpot reviewer
Senior Cyber Security Expert at a security firm with 11-50 employees
Real User
Top 5Leaderboard
2021-09-09T15:45:48Z
09 September 21

We use this solution for information gathering and as an assessment tool.

JV
Cyber Security Engineer at a manufacturing company with 5,001-10,000 employees
Real User
Top 5
2021-08-03T16:22:52Z
03 August 21

I'm using Tenable for a project I'm working on. The primary use case is for web application scanning and we're also able to conduct infrastructure scanning and network scanning. I'm not using all the features.

Muhammad NavaidZafar Ansari - PeerSpot reviewer
Assistant Manager of Information Security at a pharma/biotech company with 1,001-5,000 employees
Real User
Top 20
2021-06-19T08:51:47Z
19 June 21

As new upgrades to the software come out periodically, I am currently using the latest version.

NagarajSheshachalam - PeerSpot reviewer
Lead Cyber Security engineer at a tech services company with 201-500 employees
Real User
Top 5
2021-05-19T12:15:00Z
19 May 21

We usually use the solution for infrastructure level and web application scanning, although mostly for the former. This is what we are doing at present. We were using the web application portion of Tenable Nessus for several months before switching to Veracode.

Kai Boon Giam - PeerSpot reviewer
Director at Data Connect Technologies Pte Ltd
Real User
Top 5Leaderboard
2021-04-06T11:59:58Z
06 April 21

We use Tenable Nessus when we are preparing our audit where we need to do an initial scan of our customers' platform to see if they have any critical issues.

AB
Chief Hacking Officer at a security firm with 1-10 employees
Real User
Top 20
2021-02-19T09:45:24Z
19 February 21

Our use cases are pretty straightforward. We primarily use it for conducting vulnerability scans.

DG
CSSP Manager at a tech services company with 51-200 employees
MSP
Top 5
2021-01-13T19:38:19Z
13 January 21

I primarily use the solution for vulnerability scanning within our organization.

FF
IT Security Operations Analyst at a manufacturing company with 10,001+ employees
Real User
2020-12-13T06:30:07Z
13 December 20

I have been using Tenable Nessus for my personal use. It works well. I am using this solution for testing.

MH
Owner at a tech services company with 1-10 employees
Real User
Top 5
2020-12-07T21:15:00Z
07 December 20

We use it for vulnerability management. We have the latest version because we're using it in the cloud right now. I have a public cloud and a private cloud version.

Daniel Durante - PeerSpot reviewer
Senior Manager at a security firm with 201-500 employees
Real User
2020-10-28T20:22:37Z
28 October 20

We use Tenable Nessus to provide service to our bank. I use it to provide our main service related to our big management. Other than providing information security to our clients, it is our information security provider, service provider — we manage it. Using Nessus, we are able to scan and locate any potential vulnerabilities that our clients may have and point them out to them. I am not sure how many users we have using this solution, but we have more than 100,000 assets distributed between roughly 40 clients.

VP
Vulnerability Management Analyst at a financial services firm with 10,001+ employees
Real User
Top 20
2020-10-04T06:40:14Z
04 October 20

We primarily use the solution for vulnerability management. We also use it during our IP scans.

MadhavanSrinivasan - PeerSpot reviewer
CEO at Screenit Labs Pvt Ltd
Real User
Top 10
2020-09-21T06:33:15Z
21 September 20

We are a company that provides cloud migration services. We help companies to migrate to the public cloud. When our customers want to migrate applications, they're worried about the security aspect in the cloud. So we are trying to see how the application security that is on-premises can be migrated to the cloud. We don't have any particular solution, we are working with a few options. The customer selects what best suits their needs. If we have a program, we work with that. It's not specific to what we are working with.

Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a financial services firm with 5,001-10,000 employees
Real User
Top 5Leaderboard
2020-08-06T15:26:00Z
06 August 20

Over 15.000 active assets|inside 10 companies belonging to the group, the biennium recurrent project mapped the real situation, in parallel with photography of IT/Security maturity through three main domains: processes, people, and technology. 5 TOEs: Infrastructure, Databases (SQL and Oracle in deep), AWS Cloud, Connectivity (Routers, Switches, and Firewalls against/based CIS) and Web Application instances (partial tests).

NM
CISO at a financial services firm with 201-500 employees
Real User
2019-11-27T05:42:00Z
27 November 19

We use it for servers, domain controllers, application servers, Oracle servers, SQL servers, as well as network devices, like routers. For PCs that are used for services such as credit cards and ATMs, we usually do a vulnerability assessment, including Windows Servers, Linux servers, SQL servers, and database servers. We scan everything except basic PCs because it would require a lot of time to check all those reports. Our system administrators use another solution to check regular PCs for Windows and MS updates. We're checking things every month. We created a schedule and it checks automatically. From time to time, we'll use it to check things if something unusual has happened. For example, if a stranger was on a computer, we'll check if is there a vulnerability there. We also use it to prepare reports when the agency asks for them.

JH
Network Security Engineer at a construction company with 1,001-5,000 employees
MSP
2019-11-18T07:22:00Z
18 November 19

We mainly use it for scanning for vulnerability on our hosts, like network devices and servers; to find the vulnerabilities and do remediation. We monitor Windows and Linux workstations.

Keith S. Crumpton - PeerSpot reviewer
President and Sr CISO Consultant at CISO Consulting Inc.
Consultant
2019-11-14T06:34:00Z
14 November 19

I use it for performing vulnerability scans for both my environment and for clients. I provide fractional CISO consulting services. As such, I will perform a vulnerability scan on an environment before I say "yes." Everybody has to have a vulnerability scan. You should do them periodically which, to me, is monthly. It's just good practice to perform that scan monthly and whenever there's a major change, to make sure that you don't have any open environment. I monitor web servers, database servers, app servers, desktops; everything you'd find on a network, besides switches and routers. I don't have that, but I monitor any Windows- and Linux-based nodes.

JK
Security Architect at C. H. Robinson Worldwide, Inc.
Real User
2019-11-13T05:29:00Z
13 November 19

We use it for internal and external vulnerability scans.

JK
Senior Systems Administrator at Government Scientific Source
Real User
2019-11-07T10:35:00Z
07 November 19

It is used for vulnerability management. We used Nessus to scan our machines to see how they were vulnerable, for patches or security. The CVE numbers is what we looked at, the security vulnerability, and tried to figure out what we were vulnerable to. We monitored Windows Servers, Windows workstations, Linux servers, firewalls, switches, VMware equipment, and Cisco UCS hardware through the application.

SD
Senior Infrastructure Project Manager at a energy/utilities company with 501-1,000 employees
Real User
2019-09-08T09:50:00Z
08 September 19

Our primary use case of this solution is scanning of our external websites.

Miguel Angel Hernández Armas - PeerSpot reviewer
Implementation Engineer at GFx Soluciones
Real User
2019-01-16T20:28:00Z
16 January 19

Nessus was used to scan vulnerabilities and compliances in our clients' networks and with this, carry out the remediation process through constant cycles in time until threats to the network are considerably reduced. The environments are small business networks (less than 50 employees), and so far there have been no major impediments in the scans performed.

KalaiarasuSanthirasekeran - PeerSpot reviewer
Security Professional at a tech services company with 10,001+ employees
Real User
2019-01-10T08:22:00Z
10 January 19

Primarily, I use this for assessment and administration testing.

Thomas Kung - PeerSpot reviewer
Senior Consultant at Foris
MSP
2018-10-28T09:34:00Z
28 October 18

My primary use case of this solution is for scanning internal networks.

AK
IT Manager at Medmen
User
2018-08-29T19:26:00Z
29 August 18

I use Tenable Nessus to evaluate the security posture of multiples acquisitions before integrating them to our network.

Related Questions
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Dec 15, 2021
Which is better and why?
See 1 answer
Janet Staver - PeerSpot reviewer
Tech Blogger
15 December 21
The thing I like most about Tenable Nessus is its ease of use. I also like that it has highly customizable scans. Compared to other tools I have used in the past, Nessus has more plugins/add-ons, tests, and templates. In addition to being easy to set up, it provides you with the ability to safely migrate applications to the cloud. Tenable Nessus scales well with good VPR scores too, and so far I haven’t experienced any challenges. Another feature I really like about it is the plug-in text information, which I find to be quite useful. Overall, from what I can tell, the solution is also very stable and fast. One downside is that I feel the technical support has been quite disappointing. Qualys VM is excellent. It successfully provides continuous monitoring, it is simple to install, easy to maintain, good for scaling, and has very helpful technical support. Qualys VM also includes asset tagging and asset grouping, which I really like. Their dashboard is also flexible, allowing you to customize it any way you need to. While Qualys VM is a great solution and is reasonably steady, it also has a lot of room for improvement. Although their dashboard is customizable, it would be better if it had different tabs that allowed you to see trending vulnerabilities so that the trend analysis is easier. It does not have any features for scanning SCADA, Industrial Control Systems, and IoT. And the solution itself is pretty generic and could benefit from the addition of more assets. Conclusion: Tenable Nessus was the right choice for me because it fulfilled my business requirements, but also because I felt Qualys VM still has a long way to go.
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Nov 24, 2021
Which do you use and why?
See 2 answers
Dovid Gelber - PeerSpot reviewer
Tech blogger
07 November 21
Tenable Nessus is a vulnerability assessment solution that is both easy to deploy and easy to manage. The design of the program is such that if a company should desire to handle the installation themselves, they would be able to do so. The updates that the program requires to keep up-to-date take up a large portion of the setup time. Tenable Nessus can be deployed in under an hour. The speed of an organization’s internet can impact how quickly the deployment will go. Furthermore, once it has been set up, only a small management team is necessary for maintenance. Tenable Nessus is an incredibly important program that provides businesses and organizations with robust protection. This ease of deployment and management gives it an edge over the competition. Tenable.io Vulnerability Management is basically comparable to Tenable Nessus in regards to setup and management. It is relatively straightforward to set up. A single person could deploy it in a non-business setting in a matter of hours. The setup can be handled without requiring a business to rely on the help of outside consultants. As with Tenable Nessus, a small team of two or three people is all that is necessary to manage the solution. Organizations can save a great deal of time and resources by choosing to utilize this solution. Tenable Nessus is a solution with good scalability. This can be accomplished with relative ease. However, the load that it can handle makes it a poor fit for larger organizations. At a certain point, the farther up you scale it, the more the solution quality diminishes. Tenable.io Vulnerability Management is able to offer a much higher level of scalability. It is typically used without trouble by organizations with many thousands of users. As with Tenable Nessus, the process is relatively simple. Conclusion: The actual difference in time and ease as far as deploying Tenable Nessus versus Tenable.io Vulnerability Management is negligible and cannot truly set one apart from the other. Ease of management is another area where these two solutions are very similar. A major difference between them is their scalability. While both can be scaled relatively easily, Tenable.io Vulnerability Management is able to handle a higher level of scalability, with the diminishment of quality being a far lesser concern than is the case with Tenable Nessus.
Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a financial services firm with 5,001-10,000 employees
24 November 21
Both, but I prefer Nessus Pro (costs and you can define out-of-band your better presentation/xLAP platform). Tenable.io has its facilities and extra plugins/views/analytics, but nothing that can't be externally performed by another ETL/presentation tool (for a fraction of cost, sometimes using free toolings like Pentaho, OpenRefine, OBIEE and others).
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 07, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 5 Vulnerability Management Tools to ...
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Aug 02, 2022
Dear professionals, Welcome back to PeerSpot's Community Spotlight! Below you can find the latest hot topics posted by your fellow PeerSpot Community members. Read articles, answer questions, and contribute to discussions that are relevant to you and your expertise. Or ask your peers for insight on topics that interest you! Trending Here are some topics that your peers are discussi...
See 1 comment
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
02 August 22
@Chris Childerhose, @PraveenKambhampati, @Deena Nouril, @Shibu Babuchandran and @reviewer1925439, Thank you for contributing your articles and sharing your professional knowledge with 618K PeerSpot community members around the globe as well as with a much bigger readers audience!
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
May 02, 2022
Hi peers, We're happy to share our new bi-weekly Community Spotlight with you. Here you'll find recent contributions by PeerSpot community members: questions, articles and trending discussions. Trending See what your peers are discussing at the moment! What to choose: an endpoint antivirus, an EDR solution, or both? What is your recommended IT Service Management (ITSM) tool in 2022? W...
Related Solutions
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 07, 2022
Top 5 Vulnerability Management Tools in 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Aug 02, 2022
Community Spotlight #19
Dear professionals, Welcome back to PeerSpot's Community Spotlight! Below you can find the lates...
Download Free Report
Download our free Tenable Nessus Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
DOWNLOAD NOW
634,325 professionals have used our research since 2012.