# Cisco Vulnerability Management (formerly Kenna.VM) vs Tenable Nessus Comparison

| | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Star Rating** | 4.3 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 217 | 301 | 
| **Largest Market Segment** | Enterprise (76.5% of reviews) | Mid-Market (39.4% of reviews) | 
| **Entry Level Price** | No pricing available | $3,390.00 1 License With One-Time Purchase | 

---
## Top Pros & Cons

### Cisco Vulnerability Management (formerly Kenna.VM)

**Not enough data**

### Tenable Nessus

Pros:
- Vulnerability Identification (21 reviews)
- Vulnerability Detection (19 reviews)

Cons:
- Slow Scanning (8 reviews)
- Expensive (6 reviews)

---
## Ratings Comparison
| Rating | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
  | **Meets Requirements** | 8.6 (158 reviews) | 9.0 (248 reviews) | 
  | **Ease of Use** | 8.5 (161 reviews) | 8.9 (250 reviews) | 
  | **Ease of Setup** | 8.4 (73 reviews) | 8.8 (172 reviews) | 
  | **Ease of Admin** | 8.4 (75 reviews) | 8.9 (161 reviews) | 
  | **Quality of Support** | 8.7 (137 reviews) | 8.4 (229 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.9 (74 reviews) | 8.7 (149 reviews) | 
  | **Product Direction (% positive)** | 8.7 (150 reviews) | 8.9 (238 reviews) | 

---
## Pricing

### Cisco Vulnerability Management (formerly Kenna.VM)

#### Entry-Level Pricing

No pricing available

#### Free Trial

Yes

### Tenable Nessus

#### Entry-Level Pricing

Plan: Pro - 1 Year

Price: $3,390.00 1 License With One-Time Purchase

Description: 1-year license of the industry-leading vulnerability assessment solution.

Key Features:
- Automate your vulnerability scanning process

[Browse all 4 editions](https://www.g2.com/products/tenable-nessus/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Dynamic Application Security Testing (DAST)

| Product | Score | Reviews |
|---|---|---|
| **Cisco Vulnerability Management (formerly Kenna.VM)** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **API / Integrations** | Not enough data | Not enough data | 
| **Extensibility** | Not enough data | Not enough data | 

#### Analysis

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Reporting and Analytics** | Not enough data | Not enough data | 
| **Issue Tracking** | Not enough data | Not enough data | 
| **Static Code Analysis** | Not enough data | Not enough data | 
| **Vulnerability Scan** | Not enough data | Not enough data | 
| **Code Analysis** | Not enough data | Not enough data | 

#### Testing

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Manual Testing** | Not enough data | Not enough data | 
| **Test Automation** | Not enough data | Not enough data | 
| **Compliance Testing** | Not enough data | Not enough data | 
| **Black-Box Scanning** | Not enough data | Not enough data | 
| **Detection Rate** | Not enough data | Not enough data | 
| **False Positives** | Not enough data | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Cisco Vulnerability Management (formerly Kenna.VM)** | N/A | N/A |
| **Tenable Nessus** | 8.2/10 | 158 |

#### Performance

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Issue Tracking** | Not enough data | Feature Not Available | 
| **Detection Rate** | Not enough data | 8.9 (139 reviews) ✓ Verified | 
| **False Positives** | Not enough data | 6.7 (136 reviews) ✓ Verified | 
| **Automated Scans** | Not enough data | 9.0 (135 reviews) ✓ Verified | 

#### Network

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Compliance Testing** | Not enough data | 8.8 (134 reviews) ✓ Verified | 
| **Perimeter Scanning** | Not enough data | 8.8 (127 reviews) ✓ Verified | 
| **Configuration Monitoring** | Not enough data | 8.4 (110 reviews) ✓ Verified | 

#### Application

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Manual Application Testing** | Not enough data | Feature Not Available | 
| **Static Code Analysis** | Not enough data | 7.3 (83 reviews) | 
| **Black Box Testing** | Not enough data | 7.8 (102 reviews) | 

#### Agentic AI - Vulnerability Scanner

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | 8.1 (9 reviews) | 
| **Proactive Assistance** | Not enough data | 7.9 (8 reviews) | 

### Risk-Based Vulnerability Management

| Product | Score | Reviews |
|---|---|---|
| **Cisco Vulnerability Management (formerly Kenna.VM)** | 8.2/10 | 143 |
| **Tenable Nessus** | N/A | N/A |

#### Risk Analysis

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Risk Scoring** | 9.0 (128 reviews) | Not enough data | 
| **Reporting** | 8.5 (127 reviews) | Not enough data | 
| **Risk-Prioritization** | 9.1 (124 reviews) | Not enough data | 

#### Vulnerability Assesment

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Vulnerability Scanning** | 8.4 (118 reviews) | Not enough data | 
| **Vulnerability Intelligence** | 8.7 (126 reviews) | Not enough data | 
| **Contextual Data** | 8.3 (126 reviews) | Not enough data | 
| **Dashboards** | 8.5 (126 reviews) | Not enough data | 

#### Automation

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Automated Remediation** | 7.3 (92 reviews) | Not enough data | 
| **Workflow Automation** | 7.5 (91 reviews) | Not enough data | 
| **Security Testing** | 7.7 (94 reviews) | Not enough data | 
| **Test Automation** | 7.6 (87 reviews) | Not enough data | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Cisco Vulnerability Management (formerly Kenna.VM)** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### API Management 

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **API Discovery** | Not enough data | Not enough data | 
| **API Monitoring** | Not enough data | Not enough data | 
| **Reporting** | Not enough data | Not enough data | 
| **Change Management** | Not enough data | Not enough data | 

#### Security Testing

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Compliance Monitoring** | Not enough data | Not enough data | 
| **API Verification** | Not enough data | Not enough data | 
| **API Testing** | Not enough data | Not enough data | 

#### Security Management

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Security and Policy Enforcement** | Not enough data | Not enough data | 
| **Anomoly Detection** | Not enough data | Not enough data | 
| **Bot Detection** | Not enough data | Not enough data | 

### Attack Surface Management

| Product | Score | Reviews |
|---|---|---|
| **Cisco Vulnerability Management (formerly Kenna.VM)** | N/A | N/A |
| **Tenable Nessus** | 8.3/10 | 6 |

#### Asset Management

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Asset Discovery** | Not enough data | 6.9 (6 reviews) | 
| **Shadow IT Detection** | Not enough data | 7.5 (6 reviews) | 
| **Change Management** | Not enough data | 4.7 (6 reviews) | 

#### Monitoring

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Gap Analysis** | Not enough data | 8.3 (6 reviews) | 
| **Vulnerability Intelligence** | Not enough data | 10.0 (6 reviews) | 
| **Compliance Monitoring** | Not enough data | 8.6 (6 reviews) | 
| **Continuous Monitoring** | Not enough data | 9.2 (6 reviews) | 

#### Risk Management

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Risk-Prioritization** | Not enough data | 9.2 (6 reviews) | 
| **Reconnaissance** | Not enough data | 9.2 (6 reviews) | 
| **At-Risk Analysis** | Not enough data | 8.6 (6 reviews) | 
| **Threat Intelligence** | Not enough data | 9.4 (6 reviews) | 

#### Generative AI

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Cisco Vulnerability Management (formerly Kenna.VM)** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Cloud Visibility

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | 

#### Security

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Data Security** | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | 

#### Identity

| Feature | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **SSO** | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | 

---
## Categories

**Unique to Cisco Vulnerability Management (formerly Kenna.VM) (1):** [Risk-Based Vulnerability Management Software](https://www.g2.com/categories/risk-based-vulnerability-management)

**Unique to Tenable Nessus (4):** [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [Dynamic Application Security Testing (DAST) Software](https://www.g2.com/categories/dynamic-application-security-testing-dast), [API Security Tools](https://www.g2.com/categories/api-security)


---
## Reviewer Demographics

### By Company Size

| Segment | Cisco Vulnerability Management (formerly Kenna.VM) | Tenable Nessus | 
|---|---|---|
| **Small-Business** | 6.5% | 26.1% | 
| **Mid-Market** | 17.0% | 39.4% | 
| **Enterprise** | 76.5% | 34.5% | 

### By Industry

#### Cisco Vulnerability Management (formerly Kenna.VM)

- **Information Technology and Services:** 22.0%
- **Financial Services:** 12.0%
- **Retail:** 8.0%
- **Computer &amp; Network Security:** 7.5%
- **Computer Software:** 6.5%
- **Banking:** 6.5%
- **Insurance:** 4.0%
- **Computer Hardware:** 2.0%
- **Telecommunications:** 2.0%
- **Logistics and Supply Chain:** 2.0%
- **Other:** 27.5%

#### Tenable Nessus

- **Information Technology and Services:** 25.7%
- **Computer &amp; Network Security:** 16.5%
- **Financial Services:** 7.4%
- **Computer Software:** 6.0%
- **Banking:** 4.6%
- **Government Administration:** 3.9%
- **Higher Education:** 3.2%
- **Hospital &amp; Health Care:** 2.5%
- **Education Management:** 2.1%
- **Telecommunications:** 2.1%
- **Other:** 26.1%

---
## Alternatives

### Alternatives to Cisco Vulnerability Management (formerly Kenna.VM)

- [Tenable Vulnerability Management](https://www.g2.com/products/tenable-vulnerability-management/reviews) — 4.5/5 stars (122 reviews)
- [InsightVM (Nexpose)](https://www.g2.com/products/insightvm-nexpose/reviews) — 4.4/5 stars (78 reviews)
- [Nucleus](https://www.g2.com/products/nucleus-security-inc-nucleus/reviews) — 4.5/5 stars (32 reviews)
- [Brinqa](https://www.g2.com/products/brinqa/reviews) — 3.6/5 stars (15 reviews)
- [Qualys VMDR](https://www.g2.com/products/qualys-vmdr/reviews) — 4.4/5 stars (167 reviews)
- [CloudBees](https://www.g2.com/products/cloudbees/reviews) — 4.4/5 stars (622 reviews)
- [Arctic Wolf](https://www.g2.com/products/arctic-wolf/reviews) — 4.7/5 stars (279 reviews)
- [ServiceNow Security Operations](https://www.g2.com/products/servicenow-security-operations/reviews) — 4.4/5 stars (68 reviews)
- [Recorded Future](https://www.g2.com/products/recorded-future/reviews) — 4.6/5 stars (229 reviews)
- [Tenable Security Center](https://www.g2.com/products/tenable-security-center/reviews) — 4.6/5 stars (83 reviews)

### Alternatives to Tenable Nessus

- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [Invicti (formerly Netsparker)](https://www.g2.com/products/invicti-formerly-netsparker/reviews) — 4.6/5 stars (69 reviews)
- [Detectify](https://www.g2.com/products/detectify/reviews) — 4.5/5 stars (51 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (790 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [Acunetix by Invicti](https://www.g2.com/products/acunetix-by-invicti/reviews) — 4.1/5 stars (105 reviews)
- [Pentest-Tools.com](https://www.g2.com/products/pentest-tools-com/reviews) — 4.8/5 stars (100 reviews)
- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [Orca Security](https://www.g2.com/products/orca-security/reviews) — 4.6/5 stars (257 reviews)
- [APPCHECK](https://www.g2.com/products/appcheck/reviews) — 4.6/5 stars (67 reviews)

---
## Top Discussions

### Cisco Vulnerability Management (formerly Kenna.VM)

- Title: [What does Kenna Security do?](https://www.g2.com/discussions/what-does-kenna-security-do) — 1 comment
  > **Top comment:** "Kenna security is a tool that has the capability to scan your assets, delve into the installed/running applications, including in-house and 3rd party..."
- Title: [How does score Algorithm works and how accurate is it ? Can it push fixes remotely ? it will make it easier for admins](https://www.g2.com/discussions/how-does-score-algorithm-works-and-how-accurate-is-it-can-it-push-fixes-remotely-it-will-make-it-easier-for-admins) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "The Kenna Security Algorithm leverages over 20+ sources of Threat Intelligence to measure the volume and velocity of exploits in the wild and adjusts Risk..."
- Title: [What certifications does Kenna offer to its users and are there any User Groups we can join?](https://www.g2.com/discussions/what-certifications-does-kenna-offer-to-its-users-and-are-there-any-user-groups-we-can-join) — 1 comment, 1 upvote
  > **Top comment:** "Claudia - On behalf of the Kenna Security team, we are excited about becoming a part of the CISCO family in a few short weeks! Lets touch base about your use..."
- Title: [What is the best way to onboard new user/hire to leverage the Kenna tool to its fullest ?](https://www.g2.com/discussions/33930-what-is-the-best-way-to-onboard-new-user-hire-to-leverage-the-kenna-tool-to-its-fullest) — 1 comment, 1 upvote
  > **Top comment:** "Andy - thanks for reaching out with this question.  Customers have the option to engage with the Kenna CX team and related resources.  We have developed an..."
- Title: [Training - is there training that I can take to be more efficient with this tool?](https://www.g2.com/discussions/32207-training-is-there-training-that-i-can-take-to-be-more-efficient-with-this-tool) — 1 comment, 1 upvote
  > **Top comment:** "Joe - Excellent question. Customers have the option to engage with their assigned CX team, and for those customers who have elected to have a lower touch..."

### Tenable Nessus

- Title: [Is there a free version of Nessus?](https://www.g2.com/discussions/is-there-a-free-version-of-nessus) — 2 comments
  > **Top comment:** "30 /15 days trail is available "
- Title: [What does Nessus Professional scan for?](https://www.g2.com/discussions/about-nessus-2b3f6c8f-4cde-460a-bd61-f2527f0cdb45) — 2 comments, 1 upvote
  > **Top comment:** "It scans the system for  different vulnerabilities depending on what policy you want to scan the system with (like Internal PCI, Policy Compliance, SCAP,..."
- Title: [What types of devices can Nessus Professional scan?](https://www.g2.com/discussions/device-types-78d9c056-eb92-4435-aad4-32afa6a1a445) — 2 comments, 1 upvote
  > **Top comment:** "Windows PCs/servers , Linux systems/servers, Mobiles, IPMI devices like iLO, iDRAC, network switches, storage arrays, etc."
- Title: [How many IP Addresses can I scan?](https://www.g2.com/discussions/ip-addresses-b6ef755d-8e1e-4949-818a-ec228e8ac779) — 2 comments, 1 upvote
  > **Top comment:** "It depends on your license."
- Title: [What do I need to run Nessus professional?](https://www.g2.com/discussions/environment-c71784d4-2685-42a7-870f-56620a4bcb97) — 2 comments, 1 upvote
  > **Top comment:** "you don&#39;t need any special requirements you can run on any windows or Linux machine without any hazel."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/cisco-vulnerability-management-formerly-kenna-vm-vs-tenable-nessus)

