Ivanti Endpoint Manager increases user and IT productivity by helping IT administrators gather detailed device data, automate software and OS deployments, and quickly fix user issues.
N/A
Tenable Nessus
Score 8.8 out of 10
N/A
Tenable headquartered in Columbia offers Nessus, a vulnerability scanning and security assessment solution used to analyze an entity's security posture, vulnerability testing, and provide configuration assessments.
$2,790
Pricing
Ivanti Endpoint Manager
Tenable Nessus
Editions & Modules
No answers on this topic
1 Year
$2,790.00
1 Year + Advanced Support
$3,190.00
2 Years
$5,440.00
2 Years + Advanced Support
$6,240.00
3 Years
$7,951.00
3 Years + Advanced Support
$9,151.00
Offerings
Pricing Offerings
Ivanti Endpoint Manager
Tenable Nessus
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
Ivanti Endpoint Manager
Tenable Nessus
Features
Ivanti Endpoint Manager
Tenable Nessus
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Ivanti Endpoint Manager
-
Ratings
Tenable Nessus
6.2
4 Ratings
26% below category average
Network Analytics
00 Ratings
1.02 Ratings
Threat Recognition
00 Ratings
7.04 Ratings
Vulnerability Classification
00 Ratings
9.53 Ratings
Automated Alerts and Reporting
00 Ratings
10.03 Ratings
Threat Analysis
00 Ratings
5.53 Ratings
Threat Intelligence Reporting
00 Ratings
5.03 Ratings
Automated Threat Identification
00 Ratings
5.53 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
There is no direct replacement for the on-prem Ivanti [Unified Endpoint Manager (formerly LANDESK Management Suite)] solution. Ivanti has a companion product called Neurons, but that is in additional cost, and requires configuration with your on-prem [Unified Endpoint Manager] instance to perform basic functions. If cloud-based is a requirement for your organization, this is likely a dealbreaker. You can implement [Unified Endpoint Manager] in a cloud instance such as AWS, but the support for this appears limited. If on-prem is not an issue for you, this is a great tool for device management. It has robust features, impressive inventory, massive customization options, and excellent vendor support. If Patch Management is a problem in your company right now, this is the first product I would evaluate.
It is an excellent tool for scanning servers, workstations, and network devices to identify missing patches and misconfiguration; we regularly use it to confirm patch effectiveness after the update; it also helps us for preparing audits such as iso 27001, and regulatory requirements, it also helps us to identify open ports and services that violate security.
Patch(Security) is done really well. You can use roll out projects or built-in automation as well as the use of groups and scopes to design pilot and other use cases.
It takes a solid inventory of what you have of your endpoints and can do an agentless scan as well if you need to collect data that way as well.
Provisioning is rather simple and even allows you to use other products' software for the image or the built-in if you wish to do so.
Software distribution works well and has a lot flexibility built into the module.
Nessus is best at performing vulnerability scans, in fact, it gives findings and moreover accurate findings of the assessments. It does not do penetration testing or exploit the vulnerabilities because it is concerned about scanning the systems/applications.
In fact, Nessus has multiple profiles/policies to perform different types of scans such as, scans oriented for PCI-DSS, malware scans, web application scans, bad shell shock detection scan to name a few.
Nessus has the ability to classify the vulnerabilities into risk-based categories from critical to even informational which I think is one of the things that separates Nessus from other vulnerability scanners.
Setup - Boy it is a pain to configure everything correctly. Be aware that you'll probably be giving an AD service account some God rights to get everything working....and security just loves that....
Cost - Boy you have to pay for everything. I suppose it lets you buy into just what you want but having repeated items go through procurement is a pain if your procurement branch is a pain.
The tool has lots of options for setting up before scanning any device, this methodology could be simplified further with default configuration for various devices predefined, anyhow we can use this technique by making use of policies.
For advanced users we cannot disable the plugins inside the plugin groups, we can enable the whole set of plugins at a time, for few hundreds its ok, but thousands of plugins are of waste of resource and time.
We are happy with the product but the support and development process is far superior to any other company we have worked with. Having a good support structure is very important in today's marketplace of products that do so many things and have so many robust options and capabilities. We are very satisfied with our contract, pricing, support and product execution.
Nessus is best and easy to use application for Vulnerabilities finding and reporting, it has multiple platforms and wide scope covering almost all devices for security improvement so far, thus we are very likely to continue its services.
Items are logically laid out and most are easy to find. The more advanced stuff can be trickier, but it is still not hard to find. There are a lot of options though, so remembering where some settings are, especially if you do not alter them often, can take a minute, but you will get to them fairly qiickly.
Tenable Nessus is a great product and provides a lot of value, but it is difficult to set up and use and the amount of data it generates can be overwhelming. It does help us prioritize based on the severity of the detection, however there are sometimes mitigating factors that we have implemented that Nessus does not account for, which causes lots of noise in the reports.
TRM\TAM support has been generally very good. Getting reported bug fixes, design changes, UX problems resolved has been a pain. It is often difficult to get problems escalated beyond the TRM\TAM level. Support is fantastic when you can get it, getting it can often require more work than it should, and that is probably our biggest issue.
I haven't needed to contact support yet. But issues are easily solved with a quick internet search which means support and by extension, the larger community are involved and knowledgeable.
It's been many years since I did a full evaluation of other products but at the time we purchased it, the main competitors were Microsoft's SMS and Alteris. SMS just looked horribly ugly and complicated (which fit in very well with Microsoft's other server tools) and Alteris looked okay but had a piecemeal approach where even a basic deployment meant purchasing a half dozen or more components. LANDesk had one bundle for all the tools we were looking for and had a great interface for presenting the data.
Sometimes when we identify a vulnerability with Nessus that has an exploit, we made a proof of concept with Metasploit in order to show to the IT managers the importance of the software/hardware hardening.
Nessus certainly has a positive impact while me while performing my job, either as security research, or performing vulnerability assessments for clients. It gives a lot of information about the system/application after performing scans. The number of false positives is also less compared to other vulnerability scanners.
The professional edition is very useful as policy templates available in this edition are very handy and useful even to perform compliance scan like PCI DSS scan.
Also, the ability to export the scan results into reports in formats like HTML, PDF is very useful which could be for performing system/application reviews.