Mandiant Advantage Attack Surface Management vs. Tenable Nessus

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Mandiant Advantage Attack Surface Management
Score 8.9 out of 10
Enterprise companies (1,001+ employees)
Since 2004, Mandiant has been a partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.N/A
Tenable Nessus
Score 8.7 out of 10
N/A
Tenable headquartered in Columbia offers Nessus, a vulnerability scanning and security assessment solution used to analyze an entity's security posture, vulnerability testing, and provide configuration assessments.
$2,790
Pricing
Mandiant Advantage Attack Surface ManagementTenable Nessus
Editions & Modules
No answers on this topic
1 Year
$2,790.00
1 Year + Advanced Support
$3,190.00
2 Years
$5,440.00
2 Years + Advanced Support
$6,240.00
3 Years
$7,951.00
3 Years + Advanced Support
$9,151.00
Offerings
Pricing Offerings
Mandiant Advantage Attack Surface ManagementTenable Nessus
Free Trial
YesNo
Free/Freemium Version
YesNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeRequiredNo setup fee
Additional Details
More Pricing Information
Community Pulse
Mandiant Advantage Attack Surface ManagementTenable Nessus
Features
Mandiant Advantage Attack Surface ManagementTenable Nessus
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Mandiant Advantage Attack Surface Management
7.7
1 Ratings
4% below category average
Tenable Nessus
6.2
4 Ratings
26% below category average
Network Analytics8.21 Ratings1.12 Ratings
Threat Recognition7.31 Ratings7.04 Ratings
Vulnerability Classification7.31 Ratings9.53 Ratings
Automated Alerts and Reporting8.21 Ratings10.03 Ratings
Threat Analysis8.21 Ratings5.53 Ratings
Threat Intelligence Reporting6.41 Ratings5.03 Ratings
Automated Threat Identification8.21 Ratings5.53 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Mandiant Advantage Attack Surface Management
7.6
1 Ratings
8% below category average
Tenable Nessus
7.5
4 Ratings
9% below category average
IT Asset Realization8.21 Ratings7.03 Ratings
Authentication7.31 Ratings7.53 Ratings
Configuration Monitoring8.21 Ratings8.04 Ratings
Web Scanning6.41 Ratings5.53 Ratings
Vulnerability Intelligence8.21 Ratings9.34 Ratings
Best Alternatives
Mandiant Advantage Attack Surface ManagementTenable Nessus
Small Businesses
Action1
Action1
Score 9.4 out of 10
Action1
Action1
Score 9.4 out of 10
Medium-sized Companies
Action1
Action1
Score 9.4 out of 10
Action1
Action1
Score 9.4 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Mandiant Advantage Attack Surface ManagementTenable Nessus
Likelihood to Recommend
8.2
(1 ratings)
9.0
(9 ratings)
Likelihood to Renew
-
(0 ratings)
9.1
(1 ratings)
Usability
-
(0 ratings)
8.0
(5 ratings)
Support Rating
-
(0 ratings)
7.1
(4 ratings)
User Testimonials
Mandiant Advantage Attack Surface ManagementTenable Nessus
Likelihood to Recommend
Mandiant
Many companies that have an presence can benefit from using Mandiant ASM to identify and manage their internet facing assets, like web servers, email servers and DNS servers. This helps reduce the risk of cyberattacks targeting these assets.However smaller organizations with exposure might not always need the extensive attack surface monitoring provided by Mandiant ASM. For example a small company with one website may not require much monitoring, as a larger corporation.
Read full review
Tenable
It is an excellent tool for scanning servers, workstations, and network devices to identify missing patches and misconfiguration; we regularly use it to confirm patch effectiveness after the update; it also helps us for preparing audits such as iso 27001, and regulatory requirements, it also helps us to identify open ports and services that violate security.
Read full review
Pros
Mandiant
  • Mandiant ASM combines sources of information such, as assets through the internet cloud resources and suppliers from third parties. This comprehensive approach provides organizations with an understanding of their external attack surface.
  • With scanning Mandiant ASM identifies threats and vulnerabilities present on the external attack surface and promptly notifies users. Whenever a new threat or vulnerability is detected an alert is generated to empower enterprises to take action in mitigating the risks.
  • Mandiant ASM assesses risks based on their likelihood of exploitation impact on organizations and severity. This prioritization enables organizations to focus their efforts, on addressing the risks effectively.
Read full review
Tenable
  • Nessus is best at performing vulnerability scans, in fact, it gives findings and moreover accurate findings of the assessments. It does not do penetration testing or exploit the vulnerabilities because it is concerned about scanning the systems/applications.
  • In fact, Nessus has multiple profiles/policies to perform different types of scans such as, scans oriented for PCI-DSS, malware scans, web application scans, bad shell shock detection scan to name a few.
  • Nessus has the ability to classify the vulnerabilities into risk-based categories from critical to even informational which I think is one of the things that separates Nessus from other vulnerability scanners.
Read full review
Cons
Mandiant
  • To enhance user experience it would be beneficial to make the interface more user friendly and easier to navigate. This can be achieved by simplifying the layout offering help when needed and utilizing terminology that's easily understandable.
  • Additionally incorporating reporting features that are customizable will empower users to generate reports tailored to their individual requirements.
  • In order to enhance the solutions efficiency optimizing the code and implementing data structures would prove valuable.
Read full review
Tenable
  • The tool has lots of options for setting up before scanning any device, this methodology could be simplified further with default configuration for various devices predefined, anyhow we can use this technique by making use of policies.
  • For advanced users we cannot disable the plugins inside the plugin groups, we can enable the whole set of plugins at a time, for few hundreds its ok, but thousands of plugins are of waste of resource and time.
Read full review
Likelihood to Renew
Mandiant
No answers on this topic
Tenable
Nessus is best and easy to use application for Vulnerabilities finding and reporting, it has multiple platforms and wide scope covering almost all devices for security improvement so far, thus we are very likely to continue its services.
Read full review
Usability
Mandiant
No answers on this topic
Tenable
Tenable Nessus is a great product and provides a lot of value, but it is difficult to set up and use and the amount of data it generates can be overwhelming. It does help us prioritize based on the severity of the detection, however there are sometimes mitigating factors that we have implemented that Nessus does not account for, which causes lots of noise in the reports.
Read full review
Support Rating
Mandiant
No answers on this topic
Tenable
I haven't needed to contact support yet. But issues are easily solved with a quick internet search which means support and by extension, the larger community are involved and knowledgeable.
Read full review
Alternatives Considered
Mandiant
I decided to go with Mandiant Advantage Attack Surface Management because it offers a range of features performs excellently and is easy to use. What I really appreciate about Mandiant is their commitment, to innovation and their proven track record, in ensuring security.
Read full review
Tenable
Sometimes when we identify a vulnerability with Nessus that has an exploit, we made a proof of concept with Metasploit in order to show to the IT managers the importance of the software/hardware hardening.
Read full review
Return on Investment
Mandiant
  • .
  • Automation plays a role in saving time by streamlining operations related to attack surface management. These include automated asset discovery, vulnerability scanning and continuous monitoring of threat intelligence. As a result security teams can allocate their efforts towards projects such as security planning and incident response.
  • ASM provides a view of the external attack surface, for businesses encompassing internet facing assets, cloud resources and third party vendors. This enhances the understanding of assets enabling organizations to identify and prioritize risks effectively and make decisions on security investments
  • One notable advantage is cost savings. By eliminating the need to purchase and maintain security tools ASM becomes a solution for enterprises. It can replace products, like asset discovery tools, vulnerability management tools and threat intelligence feeds with its capabilities.
Read full review
Tenable
  • Nessus certainly has a positive impact while me while performing my job, either as security research, or performing vulnerability assessments for clients. It gives a lot of information about the system/application after performing scans. The number of false positives is also less compared to other vulnerability scanners.
  • The professional edition is very useful as policy templates available in this edition are very handy and useful even to perform compliance scan like PCI DSS scan.
  • Also, the ability to export the scan results into reports in formats like HTML, PDF is very useful which could be for performing system/application reviews.
Read full review
ScreenShots