# Invicti (formerly Netsparker), Traceable AI vs Tenable Nessus Comparison

| | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Star Rating** | 4.6 out of 5 | 4.7 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 69 | 23 | 301 | 
| **Largest Market Segment** | Enterprise (47.7% of reviews) | Enterprise (72.7% of reviews) | Mid-Market (39.4% of reviews) | 
| **Entry Level Price** | No pricing available | No pricing available | $3,390.00 1 License With One-Time Purchase | 

---
## Top Pros & Cons

### Invicti (formerly Netsparker)

Pros:
- Ease of Use (9 reviews)
- Scanning Technology (7 reviews)

Cons:
- Poor Customer Support (3 reviews)
- Slow Performance (3 reviews)

### Traceable AI

Pros:
- Customer Support (11 reviews)
- Security (8 reviews)

Cons:
- Limited Features (3 reviews)
- False Positives (2 reviews)

### Tenable Nessus

Pros:
- Vulnerability Identification (21 reviews)
- Vulnerability Detection (19 reviews)

Cons:
- Slow Scanning (8 reviews)
- Expensive (6 reviews)

---
## Ratings Comparison
| Rating | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
  | **Meets Requirements** | 9.1 (59 reviews) | 9.3 (19 reviews) | 9.0 (248 reviews) | 
  | **Ease of Use** | 9.1 (59 reviews) | 8.3 (18 reviews) | 8.9 (250 reviews) | 
  | **Ease of Setup** | 9.0 (49 reviews) | 8.2 (15 reviews) | 8.8 (172 reviews) | 
  | **Ease of Admin** | 9.2 (46 reviews) | 8.7 (15 reviews) | 8.9 (161 reviews) | 
  | **Quality of Support** | 8.9 (59 reviews) | 10.0 (19 reviews) | 8.4 (229 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.6 (44 reviews) | 9.8 (15 reviews) | 8.7 (149 reviews) | 
  | **Product Direction (% positive)** | 10.0 (55 reviews) | 8.8 (19 reviews) | 8.9 (238 reviews) | 

---
## Pricing

### Invicti (formerly Netsparker)

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Traceable AI

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Tenable Nessus

#### Entry-Level Pricing

Plan: Pro - 1 Year

Price: $3,390.00 1 License With One-Time Purchase

Description: 1-year license of the industry-leading vulnerability assessment solution.

Key Features:
- Automate your vulnerability scanning process

[Browse all 4 editions](https://www.g2.com/products/tenable-nessus/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Website Security

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | 8.9/10 | 26 |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Content Delivery** | 8.7 (18 reviews) | Not enough data | Not enough data | 
| **Dashboard &amp; Reporting** | 9.5 (22 reviews) | Not enough data | Not enough data | 
| **Alerting** | 9.0 (22 reviews) | Not enough data | Not enough data | 

#### Risk Analysis

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Blacklist and Whitelist** | Feature Not Available | Not enough data | Not enough data | 
| **Vulnerability Assessment** | 9.3 (23 reviews) | Not enough data | Not enough data | 
| **Security Auditing** | 9.2 (23 reviews) | Not enough data | Not enough data | 

#### Threat Protection

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Firewall** | 7.9 (13 reviews) | Not enough data | Not enough data | 
| **DDoS Protection** | Feature Not Available | Not enough data | Not enough data | 
| **Malware Detection** | 8.2 (14 reviews) | Not enough data | Not enough data | 
| **Malware Removal** | Feature Not Available | Not enough data | Not enough data | 

#### Generative AI

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **AI Text Summarization** | Feature Not Available | Not enough data | Not enough data | 

### Penetration Testing

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | 8.7/10 | 21 |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **API / Integrations** | 8.2 (14 reviews) | Not enough data | Not enough data | 
| **Extensibility** | 8.3 (13 reviews) | Not enough data | Not enough data | 
| **Reporting and Analytics** | 9.1 (18 reviews) | Not enough data | Not enough data | 

#### Analysis

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Issue Tracking** | 8.4 (15 reviews) | Not enough data | Not enough data | 
| **Reconnaissance** | 9.0 (17 reviews) | Not enough data | Not enough data | 
| **Vulnerability Scan** | 9.7 (18 reviews) | Not enough data | Not enough data | 

#### Testing

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Command-Line Tools** | 7.6 (12 reviews) | Not enough data | Not enough data | 
| **Manual Testing** | 8.6 (15 reviews) | Not enough data | Not enough data | 
| **Test Automation** | 9.0 (18 reviews) | Not enough data | Not enough data | 
| **Performance and Reliability** | 9.1 (18 reviews) | Not enough data | Not enough data | 

### Static Application Security Testing (SAST)

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **API / Integrations** | Not enough data | Not enough data | Not enough data | 
| **Extensibility** | Not enough data | Not enough data | Not enough data | 

#### Analysis

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Reporting and Analytics** | Not enough data | Not enough data | Not enough data | 
| **Issue Tracking** | Not enough data | Not enough data | Not enough data | 
| **Static Code Analysis** | Not enough data | Not enough data | Not enough data | 
| **Code Analysis** | Not enough data | Not enough data | Not enough data | 

#### Testing

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Command-Line Tools** | Not enough data | Not enough data | Not enough data | 
| **Manual Testing** | Not enough data | Not enough data | Not enough data | 
| **Test Automation** | Not enough data | Not enough data | Not enough data | 
| **Compliance Testing** | Not enough data | Not enough data | Not enough data | 
| **Black-Box Scanning** | Not enough data | Not enough data | Not enough data | 
| **Detection Rate** | Not enough data | Not enough data | Not enough data | 
| **False Positives** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI - Static Application Security Testing (SAST)

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 

### Dynamic Application Security Testing (DAST)

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | 8.4/10 | 30 |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **API / Integrations** | 8.2 (21 reviews) | Not enough data | Not enough data | 
| **Extensibility** | 8.3 (20 reviews) | Not enough data | Not enough data | 

#### Analysis

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Reporting and Analytics** | 9.0 (29 reviews) | Not enough data | Not enough data | 
| **Issue Tracking** | 9.2 (26 reviews) | Not enough data | Not enough data | 
| **Static Code Analysis** | Feature Not Available | Not enough data | Not enough data | 
| **Vulnerability Scan** | 9.4 (29 reviews) | Not enough data | Not enough data | 
| **Code Analysis** | 7.6 (18 reviews) | Not enough data | Not enough data | 

#### Testing

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Manual Testing** | 7.1 (19 reviews) | Not enough data | Not enough data | 
| **Test Automation** | 8.5 (24 reviews) | Not enough data | Not enough data | 
| **Compliance Testing** | 8.4 (23 reviews) | Not enough data | Not enough data | 
| **Black-Box Scanning** | 9.1 (21 reviews) | Not enough data | Not enough data | 
| **Detection Rate** | 8.6 (21 reviews) | Not enough data | Not enough data | 
| **False Positives** | 7.4 (21 reviews) | Not enough data | Not enough data | 

### Web Application Firewall (WAF)

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Analysis

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Logging and Reporting** | Not enough data | Not enough data | Not enough data | 
| **Issue Tracking** | Not enough data | Not enough data | Not enough data | 
| **Security Monitoring** | Not enough data | Not enough data | Not enough data | 

#### Controls

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Application-Layer Controls ** | Not enough data | Not enough data | Not enough data | 
| **Traffic Controls** | Not enough data | Not enough data | Not enough data | 
| **Network Controls** | Not enough data | Not enough data | Not enough data | 

#### Functionality

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **API / Integrations** | Not enough data | Not enough data | Not enough data | 
| **Extensibility** | Not enough data | Not enough data | Not enough data | 
| **Bot Traffic** | Not enough data | Not enough data | Not enough data | 

#### Generative AI

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | 8.6/10 | 20 |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | 8.2/10 | 158 |

#### Performance

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Issue Tracking** | 8.6 (18 reviews) ✓ Verified | Not enough data | Feature Not Available | 
| **Detection Rate** | 9.0 (18 reviews) ✓ Verified | Not enough data | 8.9 (139 reviews) ✓ Verified | 
| **False Positives** | 7.9 (20 reviews) ✓ Verified | Not enough data | 6.7 (136 reviews) ✓ Verified | 
| **Automated Scans** | 9.1 (19 reviews) ✓ Verified | Not enough data | 9.0 (135 reviews) ✓ Verified | 

#### Network

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Compliance Testing** | 8.7 (14 reviews) ✓ Verified | Not enough data | 8.8 (134 reviews) ✓ Verified | 
| **Perimeter Scanning** | 8.6 (11 reviews) ✓ Verified | Not enough data | 8.8 (127 reviews) ✓ Verified | 
| **Configuration Monitoring** | 8.3 (11 reviews) ✓ Verified | Not enough data | 8.4 (110 reviews) ✓ Verified | 

#### Application

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Manual Application Testing** | 8.2 (15 reviews) | Not enough data | Feature Not Available | 
| **Static Code Analysis** | 8.2 (15 reviews) ✓ Verified | Not enough data | 7.3 (83 reviews) | 
| **Black Box Testing** | 9.2 (18 reviews) ✓ Verified | Not enough data | 7.8 (102 reviews) | 

#### Agentic AI - Vulnerability Scanner

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 8.1 (9 reviews) | 
| **Proactive Assistance** | Not enough data | Not enough data | 7.9 (8 reviews) | 

### Software Composition Analysis

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Functionality - Software Composition Analysis 

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Language Support** | Not enough data | Not enough data | Not enough data | 
| **Integration** | Not enough data | Not enough data | Not enough data | 
| **Transparency** | Not enough data | Not enough data | Not enough data | 

#### Effectiveness - Software Composition Analysis

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Remediation Suggestions** | Not enough data | Not enough data | Not enough data | 
| **Continuous Monitoring** | Not enough data | Not enough data | Not enough data | 
| **Thorough Detection** | Not enough data | Not enough data | Not enough data | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | 8.8/10 | 19 |
| **Tenable Nessus** | N/A | N/A |

#### API Management 

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **API Discovery** | Feature Not Available | 9.8 (19 reviews) | Not enough data | 
| **API Monitoring** | Feature Not Available | 9.8 (18 reviews) | Not enough data | 
| **Reporting** | Feature Not Available | 8.2 (18 reviews) | Not enough data | 
| **Change Management** | Feature Not Available | 8.0 (9 reviews) | Not enough data | 

#### Security Testing

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Compliance Monitoring** | Feature Not Available | 8.7 (14 reviews) | Not enough data | 
| **API Verification** | Feature Not Available | 9.1 (18 reviews) | Not enough data | 
| **API Testing** | Not enough data | 8.9 (19 reviews) | Not enough data | 

#### Security Management

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Security and Policy Enforcement** | Not enough data | 8.6 (15 reviews) | Not enough data | 
| **Anomoly Detection** | Feature Not Available | 8.7 (18 reviews) | Not enough data | 
| **Bot Detection** | Feature Not Available | 8.6 (15 reviews) | Not enough data | 

### Attack Surface Management

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | 8.3/10 | 6 |

#### Asset Management

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Asset Discovery** | Not enough data | Not enough data | 6.9 (6 reviews) | 
| **Shadow IT Detection** | Not enough data | Not enough data | 7.5 (6 reviews) | 
| **Change Management** | Not enough data | Not enough data | 4.7 (6 reviews) | 

#### Monitoring

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Gap Analysis** | Not enough data | Not enough data | 8.3 (6 reviews) | 
| **Vulnerability Intelligence** | Not enough data | Not enough data | 10.0 (6 reviews) | 
| **Compliance Monitoring** | Not enough data | Not enough data | 8.6 (6 reviews) | 
| **Continuous Monitoring** | Not enough data | Not enough data | 9.2 (6 reviews) | 

#### Risk Management

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Risk-Prioritization** | Not enough data | Not enough data | 9.2 (6 reviews) | 
| **Reconnaissance** | Not enough data | Not enough data | 9.2 (6 reviews) | 
| **At-Risk Analysis** | Not enough data | Not enough data | 8.6 (6 reviews) | 
| **Threat Intelligence** | Not enough data | Not enough data | 9.4 (6 reviews) | 

#### Generative AI

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | Not enough data | 

### Software Supply Chain Security Tools

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Security

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Tampering** | Not enough data | Not enough data | Not enough data | 
| **Malicious Code** | Not enough data | Not enough data | Not enough data | 
| **Verification** | Not enough data | Not enough data | Not enough data | 
| **Security Risks** | Not enough data | Not enough data | Not enough data | 

#### Tracking

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Bill of Materials** | Not enough data | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | Not enough data | 
| **Monitoring** | Not enough data | Not enough data | Not enough data | 

### Application Security Posture Management (ASPM)

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Risk management - Application Security Posture Management (ASPM)

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Vulnerability Management** | Not enough data | Not enough data | Not enough data | 
| **Risk Assessment and Prioritization** | Not enough data | Not enough data | Not enough data | 
| **Compliance Management** | Not enough data | Not enough data | Not enough data | 
| **Policy Enforcement** | Not enough data | Not enough data | Not enough data | 

#### Integration and efficiency - Application Security Posture Management (ASPM)

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Integration with Development Tools** | Not enough data | Not enough data | Not enough data | 
| **Automation and Efficiency** | Not enough data | Not enough data | Not enough data | 

#### Reporting and Analytics - Application Security Posture Management (ASPM)

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Trend Analysis** | Not enough data | Not enough data | Not enough data | 
| **Risk Scoring** | Not enough data | Not enough data | Not enough data | 
| **Customizable Dashboards** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI  - Application Security Posture Management (ASPM)

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | Not enough data | 

### Static Code Analysis

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Agentic AI - Static Code Analysis

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Cloud Visibility

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | Not enough data | 

#### Security

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Data Security** | Not enough data | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | Not enough data | 

#### Identity

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **SSO** | Not enough data | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | Not enough data | 

### Interactive Application Security Testing (IAST)

| Product | Score | Reviews |
|---|---|---|
| **Invicti (formerly Netsparker)** | N/A | N/A |
| **Traceable AI** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Agentic AI - Interactive Application Security Testing (IAST)

| Feature | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (2):** [Dynamic Application Security Testing (DAST) Software](https://www.g2.com/categories/dynamic-application-security-testing-dast), [API Security Tools](https://www.g2.com/categories/api-security)

**Unique to Invicti (formerly Netsparker) (8):** [Penetration Testing Tools](https://www.g2.com/categories/penetration-testing-tools), [Website Security Software](https://www.g2.com/categories/website-security), [Static Application Security Testing (SAST) Software](https://www.g2.com/categories/static-application-security-testing-sast), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [Software Composition Analysis Tools](https://www.g2.com/categories/software-composition-analysis), [Static Code Analysis Tools](https://www.g2.com/categories/static-code-analysis), [Interactive Application Security Testing (IAST) Software](https://www.g2.com/categories/interactive-application-security-testing-iast), [Application Security Posture Management (ASPM) Software](https://www.g2.com/categories/application-security-posture-management-aspm)

**Unique to Traceable AI (3):** [Software Supply Chain Security Solutions](https://www.g2.com/categories/software-supply-chain-security-tools), [Bot Detection and Mitigation Software](https://www.g2.com/categories/bot-detection-and-mitigation), [Web Application Firewalls (WAF)](https://www.g2.com/categories/web-application-firewall-waf)

**Unique to Tenable Nessus (2):** [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)


---
## Reviewer Demographics

### By Company Size

| Segment | Invicti (formerly Netsparker) | Traceable AI | Tenable Nessus | 
|---|---|---|---|
| **Small-Business** | 23.1% | 9.1% | 26.1% | 
| **Mid-Market** | 29.2% | 18.2% | 39.4% | 
| **Enterprise** | 47.7% | 72.7% | 34.5% | 

### By Industry

#### Invicti (formerly Netsparker)

- **Computer Software:** 12.3%
- **Telecommunications:** 10.8%
- **Financial Services:** 9.2%
- **Information Technology and Services:** 9.2%
- **Computer &amp; Network Security:** 6.2%
- **Internet:** 6.2%
- **Insurance:** 4.6%
- **Automotive:** 3.1%
- **Consumer Goods:** 3.1%
- **Education Management:** 3.1%
- **Other:** 32.3%

#### Traceable AI

- **Financial Services:** 30.4%
- **Computer Software:** 17.4%
- **Insurance:** 13.0%
- **Information Technology and Services:** 13.0%
- **Utilities:** 4.3%
- **Telecommunications:** 4.3%
- **Real Estate:** 4.3%
- **Construction:** 4.3%
- **Computer Networking:** 4.3%
- **Computer &amp; Network Security:** 4.3%

#### Tenable Nessus

- **Information Technology and Services:** 25.7%
- **Computer &amp; Network Security:** 16.5%
- **Financial Services:** 7.4%
- **Computer Software:** 6.0%
- **Banking:** 4.6%
- **Government Administration:** 3.9%
- **Higher Education:** 3.2%
- **Hospital &amp; Health Care:** 2.5%
- **Education Management:** 2.1%
- **Telecommunications:** 2.1%
- **Other:** 26.1%

---
## Alternatives

### Alternatives to Invicti (formerly Netsparker)

- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [HCL AppScan](https://www.g2.com/products/hcl-appscan/reviews) — 4.1/5 stars (76 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [Detectify](https://www.g2.com/products/detectify/reviews) — 4.5/5 stars (51 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (791 reviews)
- [Pentest-Tools.com](https://www.g2.com/products/pentest-tools-com/reviews) — 4.8/5 stars (100 reviews)
- [Postman](https://www.g2.com/products/postman/reviews) — 4.6/5 stars (1773 reviews)
- [GitHub](https://www.g2.com/products/github/reviews) — 4.7/5 stars (2348 reviews)

### Alternatives to Traceable AI

- [Cloudflare Application Security and Performance](https://www.g2.com/products/cloudflare-application-security-and-performance/reviews) — 4.5/5 stars (601 reviews)
- [Postman](https://www.g2.com/products/postman/reviews) — 4.6/5 stars (1773 reviews)
- [HAProxy](https://www.g2.com/products/haproxy/reviews) — 4.7/5 stars (900 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [Fingerprint](https://www.g2.com/products/fingerprintjs-fingerprint/reviews) — 4.7/5 stars (379 reviews)
- [Orca Security](https://www.g2.com/products/orca-security/reviews) — 4.6/5 stars (258 reviews)
- [DataDome](https://www.g2.com/products/datadome/reviews) — 4.7/5 stars (231 reviews)
- [apisec.ai](https://www.g2.com/products/apisec-ai/reviews) — 4.7/5 stars (230 reviews)
- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [HUMAN Sightline Cyberfraud Defense](https://www.g2.com/products/human-sightline-cyberfraud-defense/reviews) — 4.5/5 stars (205 reviews)

### Alternatives to Tenable Nessus

- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [Detectify](https://www.g2.com/products/detectify/reviews) — 4.5/5 stars (51 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (791 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [Acunetix by Invicti](https://www.g2.com/products/acunetix-by-invicti/reviews) — 4.1/5 stars (105 reviews)
- [Pentest-Tools.com](https://www.g2.com/products/pentest-tools-com/reviews) — 4.8/5 stars (100 reviews)
- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [Orca Security](https://www.g2.com/products/orca-security/reviews) — 4.6/5 stars (258 reviews)
- [APPCHECK](https://www.g2.com/products/appcheck/reviews) — 4.6/5 stars (67 reviews)
- [Astra Pentest](https://www.g2.com/products/astra-pentest/reviews) — 4.6/5 stars (185 reviews)

---
## Top Discussions

### Invicti (formerly Netsparker)

- Title: [What is Invicti (formerly Netsparker) used for?](https://www.g2.com/discussions/what-is-invicti-formerly-netsparker-used-for) — 1 comment
  > **Top comment:** "Dynamic application Security Scanning - DAST Scan"
- Title: [What are URL rewrites and URL rewrite rules?](https://www.g2.com/discussions/netsparker-web-application-security-scanner-96cf6c3d-02fc-4405-a800-e28a0f893517) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "Web application developers use URL Rewrite Rules to hide parameters in the URL directory structure and is typically used to make it easier for search engines..."
- Title: [What is the Knowledge base node and what is reported in it?](https://www.g2.com/discussions/netsparker-web-application-security-scanner) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "Netsparker Desktop and Netsparker Cloud are not just web vulnerability scanners that automatically identify vulnerabilities in web applications. They are all..."
- Title: [How Does Netsparker Integrate with Your Existing SDLC?](https://www.g2.com/discussions/netsparker-scanners-faqs-e4a57e60-032c-4486-a798-94cc2b423ed8) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "We developed the TeamCity, Jenkins and Bamboo plugins to help you complete the Netsparker Cloud-assisted SDLC. Using our plugins, users with Administration..."
- Title: [What are the Plans &amp; Editions of Netsparker?](https://www.g2.com/discussions/netsparker-scanners-faqs-7c0a080f-a51b-479a-9fd4-47828171f241) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "The New Netsparker Plans:

Netsparker Standard – this plan includes Netsparker Desktop, which allows you to scan up to 20 websites
Netsparker Team – this..."

### Traceable AI

No discussions available for this product.

### Tenable Nessus

- Title: [Is there a free version of Nessus?](https://www.g2.com/discussions/is-there-a-free-version-of-nessus) — 2 comments
  > **Top comment:** "30 /15 days trail is available "
- Title: [What does Nessus Professional scan for?](https://www.g2.com/discussions/about-nessus-2b3f6c8f-4cde-460a-bd61-f2527f0cdb45) — 2 comments, 1 upvote
  > **Top comment:** "It scans the system for  different vulnerabilities depending on what policy you want to scan the system with (like Internal PCI, Policy Compliance, SCAP,..."
- Title: [What types of devices can Nessus Professional scan?](https://www.g2.com/discussions/device-types-78d9c056-eb92-4435-aad4-32afa6a1a445) — 2 comments, 1 upvote
  > **Top comment:** "Windows PCs/servers , Linux systems/servers, Mobiles, IPMI devices like iLO, iDRAC, network switches, storage arrays, etc."
- Title: [How many IP Addresses can I scan?](https://www.g2.com/discussions/ip-addresses-b6ef755d-8e1e-4949-818a-ec228e8ac779) — 2 comments, 1 upvote
  > **Top comment:** "It depends on your license."
- Title: [What do I need to run Nessus professional?](https://www.g2.com/discussions/environment-c71784d4-2685-42a7-870f-56620a4bcb97) — 2 comments, 1 upvote
  > **Top comment:** "you don&#39;t need any special requirements you can run on any windows or Linux machine without any hazel."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/invicti-formerly-netsparker-vs-traceable-ai-vs-tenable-nessus)

