SaaSReviewsVERIFIED ONLY
Tenable logo

Tenable

3.8 (118 reviews)
SecurityCybersecurityVulnerability ManagementCloud SecurityExposure ManagementSaaS
About Tenable

Tenable is a leading cybersecurity platform specializing in exposure management, cloud security, and vulnerability management. It empowers organizations to identify, assess, and remediate cyber risks across their entire digital footprint. By providing comprehensive visibility into assets, vulnerabilities, and threats, Tenable enables security teams to prioritize and address the most critical risks effectively. Its robust tools support continuous monitoring of cloud environments, IT infrastructure, and operational technology, helping businesses maintain compliance and strengthen their security posture. Tenable's solutions integrate advanced analytics and automation to streamline vulnerability detection and response, reducing the attack surface and preventing potential breaches. Trusted by enterprises worldwide, Tenable helps organizations know, expose, and close cyber risks to safeguard their digital assets in an increasingly complex threat landscape.

Customer Reviews
118 customer reviews
3.8/5
Sort by:
Filter:

Customer Reviews (10)

United States flagJayden B.

August 10, 2025
4/5 stars
Solid and improving over time

Started using this about five years ago, and it’s definitely improved in terms of user interface and scanning accuracy. Still reliable and gets the job done without too much hassle.

United Kingdom flagRonald G.

August 7, 2025
3/5 stars
Good scans but clunky reports

The vulnerability scanning feature works pretty well and catches most issues, which is definitely handy. However, the reporting dashboard can be a bit clunky and isn’t very intuitive to navigate, making it harder to quickly find the info I need.

Australia flagJayden M.

August 6, 2025
4/5 stars
Finally manageable vulnerability tracking

Our team was drowning in trying to track down vulnerabilities across hundreds of endpoints, and it felt impossible to get a clear picture. Tenable's dashboard finally gave us the visibility we needed to prioritize fixes without drowning in alerts. It’s not perfect—sometimes scans miss a few devices—but overall it made a huge difference for us.

United Kingdom flagJames R.

August 4, 2025
4/5 stars
Finally manageable vulnerability alerts

We were drowning in vulnerability alerts that felt impossible to keep up with until Tenable helped us prioritize and focus on the real risks. It made managing our security way more manageable and saved us a ton of time hunting down issues.

Canada flagKnox M.

July 26, 2025
4/5 stars
Smooth and straightforward setup

Getting everything set up with Tenable was smoother than I expected. The onboarding materials were clear, and I had the main dashboard up and running within a couple of hours. There was a slight learning curve figuring out some advanced features, but overall it was straightforward to get going.

Australia flagAnna C.

July 21, 2025
3/5 stars
Reliable but with quirks

Started using Tenable about five years ago, and I've seen it go through a lot of changes. The interface has definitely improved, but sometimes it still feels a bit clunky when running scans on larger networks. I appreciate the depth of vulnerability data it provides, though the pricing has crept up over time, which can be tough for smaller teams. Overall, it's reliable but not without its occasional frustrations.

Germany flagRudolf S.

July 20, 2025
4/5 stars
Great for team vulnerability scans

Our team of six switched to Tenable last year, and it definitely helped streamline how we handle vulnerability scans. Getting everyone on board took a bit because of the learning curve, but once we all got the hang of it, collaboration improved a lot.

United States flagEvelyn C.

July 16, 2025
4/5 stars
Good value for the cost

Tenable costs a bit more than some alternatives, but the detailed insights and ease of use make it worth the spend. It’s saved us enough time and headaches to justify the price.

United Kingdom flagLysander W.

July 15, 2025
4/5 stars
Reliable and Improving Over Time

Started using Tenable about five years ago, and it's definitely come a long way since then. The platform has become much more intuitive and the scan accuracy has improved noticeably, which saves a lot of time when managing vulnerabilities. The dashboards are cleaner now, making it easier to track issues without digging through endless reports. Overall, it’s a solid tool that’s grown with our needs, though sometimes the updates bring a learning curve.

United States flagBilly M.

July 14, 2025
4/5 stars
Effective scanning, clunky reports

The vulnerability scanning feature is exactly what we needed to keep track of security risks across our network. I really appreciate how thorough and fast the scans run, which saves us a ton of time. That said, the reporting interface could be a bit more intuitive—sometimes it takes a while to find the exact info I’m looking for. Overall, it’s a solid tool that helps us stay ahead on security.

Showing 10 of 118 reviews
Page 1 of 12
Share Your Experience
Help others by writing a review
Sign in to Review

Share your honest experience with Tenable

Product Details

Category

Security

Tags

CybersecurityVulnerability ManagementCloud SecurityExposure ManagementSaaS
Similar Products
Other products in the Security category
CyberArk logo

CyberArk

CyberArk is a leading cybersecurity company specializing in privileged access management (PAM) solutions designed to protect organizations from cyber threats targeting critical assets. Their platform secures, monitors, and manages privileged accounts, credentials, and secrets across on-premises, cloud, and hybrid environments. CyberArk's comprehensive approach helps organizations enforce least privilege policies, detect suspicious activities, and respond to potential breaches in real-time. By focusing on identity security and zero trust principles, CyberArk enables businesses to reduce their attack surface, prevent insider threats, and maintain compliance with regulatory requirements. Their solutions support a wide range of industries, including finance, healthcare, and government, helping enterprises safeguard sensitive data and critical infrastructure. With advanced automation, analytics, and integration capabilities, CyberArk empowers security teams to efficiently manage risks associated with privileged access and protect their digital environments from evolving cyberattacks.

4.6(119)
Rapid7 logo

Rapid7

Rapid7 is a leading cybersecurity company that provides a unified platform designed to secure organizations from endpoint to cloud. Their comprehensive solutions empower security operations teams to proactively manage and reduce cyber risk through advanced vulnerability management, exposure assessment, and managed detection and response (MDR) services. Rapid7's platform integrates threat intelligence, automation, and analytics to help organizations identify, prioritize, and remediate security vulnerabilities before they can be exploited. By offering a seamless approach to exposure management and incident response, Rapid7 enables businesses to confidently prevent breaches, streamline SecOps workflows, and maintain continuous visibility across their entire attack surface. Their technology supports cloud environments, endpoints, and networks, making it a versatile choice for organizations aiming to strengthen their cybersecurity posture in an evolving threat landscape. Rapid7 also provides expert-led services and actionable insights to accelerate threat detection and response times, helping organizations stay ahead of cyber adversaries.

4.5(175)
Okta logo

Okta

Okta is a comprehensive identity and access management platform designed to secure and streamline user authentication for employees, customers, and AI systems. It offers Workforce and Customer Identity Clouds that enable organizations to manage secure access, authentication, and automation across various applications and devices. By centralizing identity management, Okta helps businesses enhance security, improve user experience, and accelerate digital transformation initiatives. The platform supports single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and API access management, ensuring robust protection against unauthorized access while simplifying IT operations. Okta’s solutions are scalable and adaptable, catering to enterprises of all sizes and industries, and integrating seamlessly with existing IT infrastructure and cloud services. With a focus on putting identity at the core of business security and growth, Okta empowers organizations to confidently manage digital identities in an increasingly complex and connected world.

3.6(170)
Keeper Security logo

Keeper Security

Keeper Security is a comprehensive password management and privileged access management (PAM) solution designed to protect individuals and organizations from cyber threats. It offers secure password storage, autofill capabilities, and encrypted vaults to safeguard sensitive information such as passwords, digital identities, and confidential files. Keeper's platform supports multi-factor authentication, biometric login, and zero-knowledge encryption, ensuring that only authorized users can access their data. It is built to serve both personal users and enterprises, providing scalable security solutions that include secure password sharing, breach monitoring, and compliance reporting. Keeper integrates seamlessly across multiple devices and platforms, including mobile apps, desktop applications, and browser extensions, enabling users to maintain strong security practices effortlessly. Additionally, Keeper’s PAM features help organizations control and monitor privileged accounts, reducing the risk of insider threats and unauthorized access. With a focus on usability and robust security, Keeper Security empowers users to manage their digital credentials safely while enhancing overall cybersecurity posture.

4.4(182)
Auth0 logo

Auth0

Auth0 is a comprehensive identity management platform that enables businesses to securely integrate authentication and authorization across web, mobile, and legacy applications. It simplifies the process of managing user identities by providing a flexible, scalable solution that supports various authentication methods including social logins, multi-factor authentication, and single sign-on. Auth0 helps organizations enhance security while delivering seamless user experiences, allowing developers to focus on core business functionalities rather than building complex identity systems from scratch. Its platform supports a wide range of protocols and standards such as OAuth, OpenID Connect, and SAML, making it adaptable to diverse technology stacks and compliance requirements. With robust APIs, customizable workflows, and extensive developer tools, Auth0 accelerates the deployment of secure access controls, reduces risks associated with identity breaches, and improves operational efficiency. Trusted by enterprises worldwide, Auth0 empowers companies to protect their applications and data while providing secure access for everyone — but not just anyone.

3.9(180)
EMSA Group Security Services Provider logo

EMSA Group Security Services Provider

EMSA Group Security Services Provider is Melbourne's premier security company offering comprehensive security solutions tailored to meet diverse client needs. Specializing in professional security personnel deployment, EMSA Group ensures the safety and protection of commercial, residential, and event environments. Their services include on-site security guards, mobile patrols, alarm response, and risk assessment consultations, all designed to mitigate threats and maintain secure premises. With a commitment to excellence, EMSA Group employs highly trained security professionals equipped with the latest technology and industry best practices. Their client-centric approach emphasizes reliability, responsiveness, and customized security strategies, making them a trusted partner for businesses and individuals seeking robust security services in Melbourne and surrounding areas.

No reviews yet