Tenable.sc (formerly SecurityCenter) Reviews

23 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 9.5 out of 100

Do you work for this company? Manage this listing

Overall Rating

Reviewer's Company Size

Last Updated

By Topic




Job Type


Reviews (1-6 of 6)

Ahmet Fatih IRKLI | TrustRadius Reviewer
March 12, 2020

Maximum EndPoint Visibility with Tenable.sc

Score 10 out of 10
Vetted Review
Verified User
Review Source
I use Tenable.sc as the main vulnerability scanner on the system. All the user computers and network-connected computers are connected to the system. We implemented distributed architecture by using Tenable.sc and Nessus together. Tenable.sc works as the central command unit while Nessus controls and collects scanning results from Nessus agents. Distributed system allows you to see and manage all vulnerabilities from one place while it discovers new assets on the network. Therefore, Tenable.sc gives us maximum endpoint visibility and manages them easily. In addition to that, its user group privileges feature is perfect for big organizations with various teams like ours. We can assign the vulnerabilities to the related team to fix problems. Setting up and configuring the architecture is easy and the support team is very helpful on this.
  • Vulnerability management from one place
  • Maximum endpoint visibility
  • Easy to set up and plan the structure
  • Support desk quickly responses
  • Well-prepared documentation
  • Broad scanning type
  • Supports various compliance standards
  • User groups allows coordination between teams
  • Tagging and naming all the endpoints takes time
When you have an important infrastructure with a network that consists of lots of devices, the vulnerabilities of each one of them become harder. Therefore, Tenable offers a real solution on managing vulnerabilities and maximizing endpoint visibility on the network. Its compliance check scanning is also significant when you are an organization that is externally audited. It is easy to install on all your devices with a small script. Later, Tenable.sc takes care of the agents to keep them updated, control their status, command them to scan, collect the results.
Read Ahmet Fatih IRKLI's full review
Joevanne Velez | TrustRadius Reviewer
November 06, 2019

Tenable.sc is the best vulnerability management solution in the market

Score 10 out of 10
Vetted Review
Verified User
Review Source
Tenable is our current vulnerability management solution. It is currently used by the IT department, but it is scanning our entire environment. With Tenable we resolved our visibility issues where we did not have a good idea of all devices in our environment. We are also getting a good picture of all vulnerabilities and required patches on all server, network devices, and laptops.
  • Reporting.
  • Dashboards.
  • It gives you control of your environment.
  • Tenable could make it easier to report on missing reg key.
  • Tenable can also make it easier to report on os level patches vs application patches.
Tenable is well suited in environments where upper-level management is heavily involved and interested in vulnerability management. As it has exceptionally easy to read and understand reports and dashboards for execs to digest and read.
Read Joevanne Velez's full review
Anonymous | TrustRadius Reviewer
November 19, 2019

Tenable.sc in higher education

Score 10 out of 10
Vetted Review
Verified User
Review Source
Tenable.SC is used by my division of the university to assist in maintaining PCI DSS, NIST SP 800:171, FERPA and HIPAA compliance. By collecting and correlating our log data and connecting the data found in scans and network traffic, we are able to have a better view of the security of our data and systems.
  • Correlating log data to security scans.
  • Active and passive scanning.
  • Data reporting.
  • Easier API access to data.
  • GUI to develop normalization rules (as opposed to scripting in the shell).
It is a matter of scale more than anything. Our Tenable.SC implementation works because of the size of our environment. Rolling all of its tools into once license and package makes it easy to connect and work with our data.
Read this authenticated review
Anonymous | TrustRadius Reviewer
March 27, 2019

Best vulnerability manager ever

Score 10 out of 10
Vetted Review
Verified User
Review Source
Tenable SecurityCenter is used by our security team to detect and manage vulnerabilities. This is one of the best vulnerability management solutions. It has comprehensive coverage and visibility and real-time alerts and notifications. It offers the possibility to prioritize the vulnerabilities and consolidate and analyze all vulnerability data across the organization.
  • Great real-time alerts and notification
  • You can custom and personalize your reports and dashboards
  • Continuously discover and track all events from all critical resources
  • Identify and manage vulnerability
  • Scan very well all critical resources
  • Improve ticketing module
  • more integration with other products
  • Improve the functionality regarding events from cloud services
  • Improve the documentation
Tenable SecurityCenter provides all the technical features you need with limited complexity and easy deployment. The solution creates internal/operational efficiencies and improves compliance & risk management. The product offers the ability to see and track all vulnerabilities across the enterprise in a single view. Also the support from Tenable works great. The dashboards are simple, popular, and useful. The ability for detecting threats and vulnerabilities in the system is excellent. We make scans on all of our critical servers and users' computers. We have great dashboards and present reports to our management. The solution detects false positives better than others.
Read this authenticated review
Anonymous | TrustRadius Reviewer
August 27, 2018

Powerful scanner with a plethora of options!

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use Tenable Security Center as an auditing tool for known hosts on a network or for a "catch all" for when we are doing black box testing. The tool is fantastic for either scenario and I highly recommend it. The clients that utilize Tenable Security Center usually use it across the whole department and or organization, depending on how large the organization is, that is. It is almost always used to address compliance within large organizations.
  • Network sweeps
  • Network/host auditing (NIST, DoD, etc)
  • Vulnerability Scans
  • Bulky - does not scale easily
  • Lack of detailed error logs for scan issues
  • Lack of stripped client (piggybacking off the bulky) - could use a mini/portable client like nmap
SecurityCenter is definitely the juggernaut of the industry. You don't see many shops that are not using Nessus and or SecurityCenter. As a pen tester, I do not judge shops that use Nessus as a catch all, as there are a lot of things you can get hyper focused on and a tool like this helps you see things you may have missed.
Read this authenticated review
Anonymous | TrustRadius Reviewer
December 21, 2017

Tenable is very able.

Score 9 out of 10
Vetted Review
Verified User
Review Source
Tenable products are being used all across the organization for vulnerability management. This is the heart of our vulnerability and exception management process and we rely on Tenable products for providing accurate data of the vulnerabilities currently present in our environment right from Windows/Linux servers to PCs to network devices to mobile devices.
  • Great plugin feed and is refreshed every day giving you the power to be ahead of those one-day attacks
  • Extremely simple to use UI with good filtering capabilities
  • Reporting is one thing in which Tenable has surpassed other vendors
  • Wide array of templates for reports and dashboards
  • No room for customization via API
  • Interaction with database is very limited
  • Agent Scan importing into SecurityCenter is not even close to stable
All in all if you want a full featured robust vulnerability management tool this is the right one for you. However, if you are someone looking to improve your current security posture from a VM perspective sadly this will not be the answer and you would wanna look beyond traditional vulnerability scanners such as this. For smaller organizations, this would serve well for endpoints, servers and mobile devices and giving you tailored reporting capabilities for the C-Suite executives.
Read this authenticated review

Tenable.sc (formerly SecurityCenter) Scorecard Summary

About Tenable.sc (formerly SecurityCenter)

Tenable.sc (formerly SecurityCenter) from Tenable Network Security in Baltimore, presents a vulnerabiliy management option.

Tenable.sc (formerly SecurityCenter) Technical Details

Operating Systems: Unspecified
Mobile Application:No