Since 2004, Mandiant has been a partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.
N/A
Tenable Vulnerability Management
Score 9.3 out of 10
N/A
Vulnerability management specialist Tenable offers their cloud application and container security platform Tenable Web App Scanning (formerly Tenable.io), a vulnerability management tool that emphasizes visibility of web applications, automatic scanning, and a unified view of cloud infrastructure and possible inconsistencies indicating a vulnerability.
N/A
Pricing
Mandiant Advantage Attack Surface Management
Tenable Vulnerability Management
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Mandiant Advantage Attack Surface Management
Tenable Vulnerability Management
Free Trial
Yes
No
Free/Freemium Version
Yes
No
Premium Consulting/Integration Services
Yes
No
Entry-level Setup Fee
Required
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
Mandiant Advantage Attack Surface Management
Tenable Vulnerability Management
Features
Mandiant Advantage Attack Surface Management
Tenable Vulnerability Management
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Mandiant Advantage Attack Surface Management
7.7
1 Ratings
5% below category average
Tenable Vulnerability Management
8.4
2 Ratings
4% above category average
Network Analytics
8.21 Ratings
10.02 Ratings
Threat Recognition
7.31 Ratings
10.02 Ratings
Vulnerability Classification
7.31 Ratings
10.02 Ratings
Automated Alerts and Reporting
8.21 Ratings
4.02 Ratings
Threat Analysis
8.21 Ratings
10.02 Ratings
Threat Intelligence Reporting
6.41 Ratings
5.02 Ratings
Automated Threat Identification
8.21 Ratings
10.02 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Many companies that have an presence can benefit from using Mandiant ASM to identify and manage their internet facing assets, like web servers, email servers and DNS servers. This helps reduce the risk of cyberattacks targeting these assets.However smaller organizations with exposure might not always need the extensive attack surface monitoring provided by Mandiant ASM. For example a small company with one website may not require much monitoring, as a larger corporation.
I've been using this product since it began as an open source product, I really like it and for the money, I think it's probably the best choice for most companies who need a product like this. Over the years I've seen the interface change quite a bit and sometimes I think it's a bit unclear how to do certain things and the different packages can be confusing, these are the only reasons I'm giving it a 9 instead of a 10.
Mandiant ASM combines sources of information such, as assets through the internet cloud resources and suppliers from third parties. This comprehensive approach provides organizations with an understanding of their external attack surface.
With scanning Mandiant ASM identifies threats and vulnerabilities present on the external attack surface and promptly notifies users. Whenever a new threat or vulnerability is detected an alert is generated to empower enterprises to take action in mitigating the risks.
Mandiant ASM assesses risks based on their likelihood of exploitation impact on organizations and severity. This prioritization enables organizations to focus their efforts, on addressing the risks effectively.
To enhance user experience it would be beneficial to make the interface more user friendly and easier to navigate. This can be achieved by simplifying the layout offering help when needed and utilizing terminology that's easily understandable.
Additionally incorporating reporting features that are customizable will empower users to generate reports tailored to their individual requirements.
In order to enhance the solutions efficiency optimizing the code and implementing data structures would prove valuable.
Expensive - You do pay a slight premium for the best product in the space.
Asset management is difficult to work with if you have a lot of asset turnover, the license can be ''held'' for 3-6 months after the asset is gone from your environment.
Support is usually really great at walking you through any steps you need to take when you get stuck on something. There are a few false positives and errors that have come up over the years that required their help to get through. Unfortunately, the steps required to diagnose some problems are more tedious than I think should be necessary. (IE: SQL instances can throw errors that clog up your logs because one plugin affects it in a certain way. The process to diagnose this is to watch timestamps of plugins in a log while monitoring the SQL logs at the same time and using your best guess as to what is causing it.)
I decided to go with Mandiant Advantage Attack Surface Management because it offers a range of features performs excellently and is easy to use. What I really appreciate about Mandiant is their commitment, to innovation and their proven track record, in ensuring security.
Tenable.io has a comparable set of features, with excellent support and a competitive price. After less than desirable experiences with another company, we moved to Tenable and haven't looked back since.
Automation plays a role in saving time by streamlining operations related to attack surface management. These include automated asset discovery, vulnerability scanning and continuous monitoring of threat intelligence. As a result security teams can allocate their efforts towards projects such as security planning and incident response.
ASM provides a view of the external attack surface, for businesses encompassing internet facing assets, cloud resources and third party vendors. This enhances the understanding of assets enabling organizations to identify and prioritize risks effectively and make decisions on security investments
One notable advantage is cost savings. By eliminating the need to purchase and maintain security tools ASM becomes a solution for enterprises. It can replace products, like asset discovery tools, vulnerability management tools and threat intelligence feeds with its capabilities.
Since this is a requirement for our PCI compliance and the cost is relatively low, the ROI isn't really something we need to think too much about, Tenable's pricing is fair and affordable.