Introducing G2.ai, the future of software buying.Try now

Compare Cisco Vulnerability Management (formerly Kenna.VM) and Tenable Nessus

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Cisco Vulnerability Management (formerly Kenna.VM)
Cisco Vulnerability Management (formerly Kenna.VM)
Star Rating
(217)4.3 out of 5
Market Segments
Enterprise (76.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Cisco Vulnerability Management (formerly Kenna.VM)
Tenable Nessus
Tenable Nessus
Star Rating
(297)4.5 out of 5
Market Segments
Mid-Market (39.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$3,390.00 1 License With One-Time Purchase
Free Trial is available
Browse all 4 pricing plans

Cisco Vulnerability Management (formerly Kenna.VM) vs Tenable Nessus

When assessing the two solutions, reviewers found Tenable Nessus easier to use, set up, and administer. However, reviewers preferred doing business with Cisco Vulnerability Management (formerly Kenna.VM) overall.

  • Reviewers felt that Tenable Nessus meets the needs of their business better than Cisco Vulnerability Management (formerly Kenna.VM).
  • When comparing quality of ongoing product support, reviewers felt that Cisco Vulnerability Management (formerly Kenna.VM) is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Tenable Nessus over Cisco Vulnerability Management (formerly Kenna.VM).
Pricing
Entry-Level Pricing
Cisco Vulnerability Management (formerly Kenna.VM)
No pricing available
Tenable Nessus
Pro - 1 Year
$3,390.00
1 License With One-Time Purchase
Browse all 4 pricing plans
Free Trial
Cisco Vulnerability Management (formerly Kenna.VM)
Free Trial is available
Tenable Nessus
Free Trial is available
Ratings
Meets Requirements
8.6
158
9.0
244
Ease of Use
8.5
161
8.9
246
Ease of Setup
8.4
73
8.8
168
Ease of Admin
8.4
75
8.9
159
Quality of Support
8.7
137
8.4
226
Has the product been a good partner in doing business?
8.9
74
8.7
147
Product Direction (% positive)
8.7
150
9.0
235
Features by Category
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Testing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.2
153
Performance
Not enough data
Feature Not Available
Not enough data
8.9
138
|
Verified
Not enough data
6.7
136
|
Verified
Not enough data
9.0
133
|
Verified
Network
Not enough data
8.8
134
|
Verified
Not enough data
8.8
127
|
Verified
Not enough data
8.4
111
|
Verified
Application
Not enough data
Feature Not Available
Not enough data
7.3
84
Not enough data
7.8
103
Agentic AI - Vulnerability Scanner
Not enough data
8.0
9
Not enough data
8.0
9
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
8.2
143
Not enough data
Risk Analysis
9.0
128
Not enough data
8.5
127
Not enough data
9.1
124
Not enough data
Vulnerability Assesment
8.4
118
Not enough data
8.7
126
Not enough data
8.3
126
Not enough data
8.5
126
Not enough data
Automation
7.3
92
Not enough data
7.5
91
Not enough data
7.7
94
Not enough data
7.6
87
Not enough data
Not enough data
Not enough data
API Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Testing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
8.3
6
Asset Management
Not enough data
6.9
6
Not enough data
7.5
6
Not enough data
4.7
6
Monitoring
Not enough data
8.3
6
Not enough data
10.0
6
Not enough data
8.6
6
Not enough data
9.2
6
Risk Management
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
8.6
6
Not enough data
9.4
6
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Cisco Vulnerability Management (formerly Kenna.VM)
Cisco Vulnerability Management (formerly Kenna.VM)
Tenable Nessus
Tenable Nessus
Cisco Vulnerability Management (formerly Kenna.VM) and Tenable Nessus share no categories
Unique Categories
Cisco Vulnerability Management (formerly Kenna.VM)
Cisco Vulnerability Management (formerly Kenna.VM) is categorized as Risk-Based Vulnerability Management
Reviews
Reviewers' Company Size
Cisco Vulnerability Management (formerly Kenna.VM)
Cisco Vulnerability Management (formerly Kenna.VM)
Small-Business(50 or fewer emp.)
6.5%
Mid-Market(51-1000 emp.)
17.0%
Enterprise(> 1000 emp.)
76.5%
Tenable Nessus
Tenable Nessus
Small-Business(50 or fewer emp.)
26.5%
Mid-Market(51-1000 emp.)
39.4%
Enterprise(> 1000 emp.)
34.1%
Reviewers' Industry
Cisco Vulnerability Management (formerly Kenna.VM)
Cisco Vulnerability Management (formerly Kenna.VM)
Information Technology and Services
22.0%
Financial Services
12.0%
Retail
8.0%
Computer & Network Security
7.5%
Computer Software
6.5%
Other
44.0%
Tenable Nessus
Tenable Nessus
Information Technology and Services
25.7%
Computer & Network Security
16.8%
Financial Services
7.9%
Computer Software
6.4%
Banking
4.6%
Other
38.6%
Alternatives
Cisco Vulnerability Management (formerly Kenna.VM)
Cisco Vulnerability Management (formerly Kenna.VM) Alternatives
Tenable Vulnerability Management
Tenable Vulnerability Management
Add Tenable Vulnerability Management
InsightVM (Nexpose)
InsightVM (Nexpose)
Add InsightVM (Nexpose)
Nucleus
Nucleus
Add Nucleus
Brinqa
Brinqa
Add Brinqa
Tenable Nessus
Tenable Nessus Alternatives
Intruder
Intruder
Add Intruder
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Detectify
Detectify
Add Detectify
Wiz
Wiz
Add Wiz
Discussions
Cisco Vulnerability Management (formerly Kenna.VM)
Cisco Vulnerability Management (formerly Kenna.VM) Discussions
Is there a way to sort by most recently changed asset scores?
1 Comment
Stacy M.
SM
"Hi Matt. You are correct. You cannot sort directly on the last time that an asset score changed, but remember that Kenna is designed to pull you out of the...Read more
Training - is there training that I can take to be more efficient with this tool?
1 Comment
Stacy M.
SM
Joe - Excellent question. Customers have the option to engage with their assigned CX team, and for those customers who have elected to have a lower touch...Read more
What is the best way to onboard new user/hire to leverage the Kenna tool to its fullest ?
1 Comment
Stacy M.
SM
Andy - thanks for reaching out with this question. Customers have the option to engage with the Kenna CX team and related resources. We have developed an...Read more
Tenable Nessus
Tenable Nessus Discussions
I'm a consultant; can I use Nessus Professional to conduct my client's vulnerability scanning?
2 Comments
ANKIT S.
AS
Yes, you can.Read more
Is Nessus professional the right product for me?
2 Comments
Official Response from Tenable Nessus
Nessus Professional has always been designed for the security professional. The typical Nessus user is a consultant or contractor who is very experienced...Read more
Can I use Nessus professional data in other applications?
2 Comments
Official Response from Tenable Nessus
Yes. Many third party applications can incorporate a Nessus file. This allows consultants to share the data with their clients’ other applications for the...Read more