HackerOne vs. Tenable Security Center

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
HackerOne
Score 7.6 out of 10
N/A
HackerOne is a hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited, from the company of the same name in San Francisco. The service is used for vulnerability location, pen testing, bug bounty, and vulnerability triage services.N/A
Tenable Security Center
Score 8.3 out of 10
N/A
Tenable Security Center (formerly Tenable.sc) from Tenable Network Security in Baltimore, presents a vulnerabiliy management option used to identify and prioritize vulnerabilities based on risk to businesses. It is managed on premises.N/A
Pricing
HackerOneTenable Security Center
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
HackerOneTenable Security Center
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsFor more information please email www.hackerone.com/contact or find us on the AWS Marketplace: https://aws.amazon.com/marketplace/seller-profile?id=10857e7c-011b-476d-b938-b587deba31cf—
More Pricing Information
Community Pulse
HackerOneTenable Security Center
Features
HackerOneTenable Security Center
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
HackerOne
-
Ratings
Tenable Security Center
9.6
1 Ratings
19% above category average
Network Analytics00 Ratings10.01 Ratings
Threat Recognition00 Ratings10.01 Ratings
Vulnerability Classification00 Ratings9.01 Ratings
Automated Alerts and Reporting00 Ratings10.01 Ratings
Threat Analysis00 Ratings10.01 Ratings
Threat Intelligence Reporting00 Ratings10.01 Ratings
Automated Threat Identification00 Ratings8.01 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
HackerOne
-
Ratings
Tenable Security Center
9.6
1 Ratings
15% above category average
IT Asset Realization00 Ratings10.01 Ratings
Authentication00 Ratings8.01 Ratings
Configuration Monitoring00 Ratings10.01 Ratings
Web Scanning00 Ratings10.01 Ratings
Vulnerability Intelligence00 Ratings10.01 Ratings
Best Alternatives
HackerOneTenable Security Center
Small Businesses

No answers on this topic

Action1
Action1
Score 9.5 out of 10
Medium-sized Companies

No answers on this topic

Action1
Action1
Score 9.5 out of 10
Enterprises

No answers on this topic

CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
HackerOneTenable Security Center
Likelihood to Recommend
7.0
(2 ratings)
8.0
(7 ratings)
Usability
-
(0 ratings)
9.0
(1 ratings)
Support Rating
-
(0 ratings)
9.4
(3 ratings)
User Testimonials
HackerOneTenable Security Center
Likelihood to Recommend
HackerOne
It is one of the good platforms for security researchers to submit bugs and other vulnerabilities, it however, has some challenges, in terms of un-verified and duplicate submissions.
Read full review
Tenable
[Tenable.sc (formerly SecurityCenter)] does very well for internal scanning for vulnerabilities, however it needs to be combined with Tenable.io in order to do cloud scanning.
Read full review
Pros
HackerOne
  • Filter for spammy bug reports
  • Nice central interface
  • Payment/reward system is nice
Read full review
Tenable
  • Vulnerability management from one place
  • Maximum endpoint visibility
  • Easy to set up and plan the structure
  • Support desk quickly responses
  • Well-prepared documentation
  • Broad scanning type
  • Supports various compliance standards
  • User groups allows coordination between teams
Read full review
Cons
HackerOne
  • A lot of duplicate bugs get reported, although it does offer automatic suggestion of previously reported bugs that may be duplicates, it is far from perfect.
  • Anyone can report bugs, a lot of them are not verified before submission. This sometimes leads to a lot of time spent in verifying if the bug is really actionable.
  • Each submission has to be treated with equal potential, a lot of time, some time gets invested in vulnerabilities that aren't as important as some others.
Read full review
Tenable
  • Centralized vulnerability management with sensors.
  • Network health assessment and Incident response.
  • For alerting or notification, it should also support the SMS gateway.
Read full review
Usability
HackerOne
No answers on this topic
Tenable
based on product capabilities and usage
Read full review
Support Rating
HackerOne
No answers on this topic
Tenable
On all of the occasions that I have had to reach out to Tenable for assistance, they have been extremely helpful and knowledgeable. Solutions and support are provided quickly, and they work on the issue until it is resolved.
Read full review
Alternatives Considered
HackerOne
These were very close and we liked HackerOne better. For a time we did have both and we felt the need to consolidate the information into one platform and end of life our internal offering. Overall we've been fairly happy with HackerOne.
Read full review
Tenable
We decided to go with Tenable due to its robust reporting capabilities and competitive pricing vs its competitors. While all tools are very similar in regards to scanning capabilities we prefer Tenable SC's user interface. We also like the option to have both on-prem and cloud with theirs. Tenable io product as well.
Read full review
Return on Investment
HackerOne
  • Bugs that can't be tracked internally are submitted by external researchers, which is an important factor for security vulnerabilities.
  • Even if the bugs reported are duplicates, there still is provision to award reputation points, that keep the researchers engaged.
  • It also requires a lot of verification and validation, as a lot of the submissions are unverified to begin with.
Read full review
Tenable
  • Create internal/operational efficiencies
  • Improve compliance & risk management
  • Cost management
  • Solid vulnerability scanner
  • Ease, of use, and capabilities when it comes to analyzing vulnerabilities is what makes this product stand out
Read full review
ScreenShots