We are using Tenable Nessus Professional. We are not using Security Center and other Tenable products. For penetration test suites, we are using Tenable Nessus solution for the first step of our penetration testing.
Nessus (BYOL)
Tenable, Inc.External reviews
External reviews are not included in the AWS star rating for the product.
Robust and reliable vulnerability scanner for all needs
- Frequency of use - It is easy and pleasent to use Nessus often without any hassle.
- Up-to-Date: There are regular updates keep the vulnerability database current, it is posible to update in offline environment as well.
- Comprehensive Reports: Detailed insights.
Automated scans reduce manual work and save our time.
Comprehensive Security and Up-to-Date CVE Databases
Customization and Ease of Integration that Surprise
Clean Interface and Simple Use.
Reliable & Thorough Vulnerability Scanner – With a Few Quirks
Low false positive rate – Findings are generally accurate, saving time on unnecessary triage.
Regular plugin updates – Constantly updated with new vulnerabilities and checks.
Flexible scan options – Supports credentialed, uncredentialed, web app, compliance, and custom scan policies.
Actionable remediation guidance – Reports often include step-by-step fixes and CVSS scoring.
Easy setup for standard scans – Basic scans are quick to configure and run.
Widely used and trusted – Well-established reputation in cybersecurity and vulnerability management.
Nessus supports / enables a variety of integrations, mostly via its APIs, export features, and plugins. Key categories include:
UI and reporting could be better – Custom reports and dashboard features are somewhat limited.
Steep learning curve for advanced use – Complex scans (e.g., with credentials or web app auth) require deeper technical knowledge.
Authenticated and web app scanning can be finicky – May need fine-tuning to work correctly with complex login flows.
Not ideal for full lifecycle VM – Lacks built-in asset management or long-term trend analysis unless integrated with Tenable.io or Tenable.sc.
Performance overhead on large networks – Can slow down scanning or miss things if not properly resourced.
Unpatched Vulnerabilities
Misconfigurations
Compliance Gaps
Lack of Visibility into Network Assets
Manual Security Workflows
Benifits--
Reduced exposure to attacks by fixing vulnerabilities before they’re exploited.
Faster, more confident patching thanks to prioritized and verified vulnerability data.
Audit-ready reporting for security and compliance frameworks.
Improved collaboration between security and IT with actionable reports.
Better resource allocation by focusing on real risks, not just raw vulnerability counts.
Time savings through automation and integration with other tools.
Peace of mind — knowing that your environment is continuously being checked against the latest threats.
Audio clarity issues need addressing
What is our primary use case?
What is most valuable?
The solution provides time saving and cost saving benefits.
What needs improvement?
The integration part is not good because five years ago, Tenable Nessus had more integration capability. After that, Tenable changed their policies and strategy. They pushed users toward Security Center and disabled Tenable Nessus integration features.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional. The Jira integration is good, but it does not make sense for Tenable because they want to sell Security Center, which is more expensive than Tenable Nessus.
For how long have I used the solution?
We have been using the solution for more than ten years.
What do I think about the stability of the solution?
The solution is not scalable but stable.
What do I think about the scalability of the solution?
The solution is not scalable but stable.
How are customer service and support?
I am not using Tenable support. I can usually fix all of the issues myself. I don't need support for Tenable Nessus.
What other advice do I have?
The solution is not perfect, but it is okay. I am both a customer and have a partnership with Tenable. Quick scan is good and sufficient for our needs. The solution is very easy to use. We are deploying it in our organization.
On a scale from one to ten, I rate Tenable Nessus a seven out of ten.
Automated scans and reports streamline risk security checks while interface navigation could improve
What is our primary use case?
I want to upgrade Tenable Nessus because I don't have a license, but I worked with it before. It was only for one month. We just don't have a license, but I worked for two years with this product.
I have worked with Tenable Nessus in the last month.
I used Tenable Nessus in government.
How has it helped my organization?
I see improvements in incident response times with Tenable Nessus. We have two ways to monitor: we can look online in real-time with system or page links, and when there is an issue, they write a report in email for me. When the system has an issue that somebody has found, Tenable Nessus alerts me via email.
The value that Tenable Nessus brings to my company is significant because we can see risks. It is also good to see the pages risk and system risks. It saves money.
What is most valuable?
Tenable Nessus allows me to set up automated scans and they do everything automatically. They also generate reports automatically for me.
I have used the Configuration Auditing feature of Tenable Nessus, which helps me by identifying security gaps. I found issues such as needed upgrades for the operating system and other things.
The integration capabilities of Tenable Nessus with my security ecosystem are friendly. It needs to be configured with a virtual machine and on-premise installation.
What needs improvement?
I face issues with Tenable Nessus sometimes due to upgrades. We must do system upgrades, and we have some issues with printing. We don't have the last updates.
Regarding improvements for Tenable Nessus, I think this tool has everything. The interface could be improved, particularly when moving between systems. It would be better to have buttons or tabs for navigating between different networks, as currently it requires multiple steps.
For how long have I used the solution?
I have worked with Tenable Nessus in the last month.
How are customer service and support?
I consulted with support about half a year ago. They connected through TeamViewer and helped me resolve the problem.
How was the initial setup?
Setting up Tenable Nessus is easy. It took about three hours to deploy Tenable Nessus, with approximately 30 minutes for downloading and another two hours for configuration and installation.
What other advice do I have?
I use Tenable Nessus on-premise because we have a special network, and we use it for on-premise because some systems cannot go online. I don't want external parties to know about these issues.
I scan with Tenable Nessus and get information about issues, then send it to IT people for confirmation and repair.
Tenable Nessus is a scalable solution for my environment. We had two users working with Tenable Nessus.
My rating for technical support is 10 out of 10.
I can recommend Tenable Nessus as an issue-finding tool.
I have not evaluated any other tools before working with Tenable Nessus for vulnerability management.
My overall rating for Tenable Nessus is 10 out of 10.
How Nessus helps in security audits
Tenable Nessus vulnerability manager
Generation of managerial reports.