# Microsoft Defender for Endpoint, Tenable Security Center vs Tenable Nessus Comparison

| | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Star Rating** | 4.4 out of 5 | 4.6 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 310 | 83 | 301 | 
| **Largest Market Segment** | Enterprise (38.5% of reviews) | Enterprise (64.4% of reviews) | Mid-Market (39.4% of reviews) | 
| **Entry Level Price** | No pricing available | No pricing available | $3,390.00 1 License With One-Time Purchase | 

---
## Top Pros & Cons

### Microsoft Defender for Endpoint

Pros:
- Ease of Use (20 reviews)
- Threat Detection (18 reviews)

Cons:
- Compatibility Issues (8 reviews)
- Complexity (8 reviews)

### Tenable Security Center

Pros:
- Features (2 reviews)
- Compliance Management (1 reviews)

Cons:
- Complexity (1 reviews)
- Complex Queries (1 reviews)

### Tenable Nessus

Pros:
- Vulnerability Identification (21 reviews)
- Vulnerability Detection (19 reviews)

Cons:
- Slow Scanning (8 reviews)
- Expensive (6 reviews)

---
## Ratings Comparison
| Rating | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
  | **Meets Requirements** | 8.6 (249 reviews) | 9.2 (45 reviews) | 9.0 (248 reviews) | 
  | **Ease of Use** | 8.6 (255 reviews) | 8.6 (49 reviews) | 8.9 (250 reviews) | 
  | **Ease of Setup** | 8.5 (165 reviews) | 8.6 (43 reviews) | 8.8 (172 reviews) | 
  | **Ease of Admin** | 8.6 (156 reviews) | 8.6 (43 reviews) | 8.9 (161 reviews) | 
  | **Quality of Support** | 8.5 (239 reviews) | 8.5 (48 reviews) | 8.4 (229 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.6 (152 reviews) | 8.8 (40 reviews) | 8.7 (149 reviews) | 
  | **Product Direction (% positive)** | 9.2 (248 reviews) | 8.4 (45 reviews) | 8.9 (238 reviews) | 

---
## Pricing

### Microsoft Defender for Endpoint

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Tenable Security Center

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Tenable Nessus

#### Entry-Level Pricing

Plan: Pro - 1 Year

Price: $3,390.00 1 License With One-Time Purchase

Description: 1-year license of the industry-leading vulnerability assessment solution.

Key Features:
- Automate your vulnerability scanning process

[Browse all 4 editions](https://www.g2.com/products/tenable-nessus/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Dynamic Application Security Testing (DAST)

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | N/A | N/A |
| **Tenable Security Center** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **API / Integrations** | Not enough data | Not enough data | Not enough data | 
| **Extensibility** | Not enough data | Not enough data | Not enough data | 

#### Analysis

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Reporting and Analytics** | Not enough data | Not enough data | Not enough data | 
| **Issue Tracking** | Not enough data | Not enough data | Not enough data | 
| **Static Code Analysis** | Not enough data | Not enough data | Not enough data | 
| **Vulnerability Scan** | Not enough data | Not enough data | Not enough data | 
| **Code Analysis** | Not enough data | Not enough data | Not enough data | 

#### Testing

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Manual Testing** | Not enough data | Not enough data | Not enough data | 
| **Test Automation** | Not enough data | Not enough data | Not enough data | 
| **Compliance Testing** | Not enough data | Not enough data | Not enough data | 
| **Black-Box Scanning** | Not enough data | Not enough data | Not enough data | 
| **Detection Rate** | Not enough data | Not enough data | Not enough data | 
| **False Positives** | Not enough data | Not enough data | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | N/A | N/A |
| **Tenable Security Center** | 8.6/10 | 43 |
| **Tenable Nessus** | 8.2/10 | 158 |

#### Performance

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Issue Tracking** | Not enough data | 8.0 (29 reviews) | Feature Not Available | 
| **Detection Rate** | Not enough data | 8.8 (33 reviews) | 8.9 (139 reviews) ✓ Verified | 
| **False Positives** | Not enough data | 7.9 (33 reviews) | 6.7 (136 reviews) ✓ Verified | 
| **Automated Scans** | Not enough data | 9.1 (35 reviews) | 9.0 (135 reviews) ✓ Verified | 

#### Network

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Compliance Testing** | Not enough data | 9.0 (29 reviews) | 8.8 (134 reviews) ✓ Verified | 
| **Perimeter Scanning** | Not enough data | 9.1 (31 reviews) | 8.8 (127 reviews) ✓ Verified | 
| **Configuration Monitoring** | Not enough data | 8.9 (24 reviews) | 8.4 (110 reviews) ✓ Verified | 

#### Application

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Manual Application Testing** | Not enough data | 8.5 (19 reviews) | Feature Not Available | 
| **Static Code Analysis** | Not enough data | 7.9 (15 reviews) | 7.3 (83 reviews) | 
| **Black Box Testing** | Not enough data | 8.3 (20 reviews) | 7.8 (102 reviews) | 

#### Agentic AI - Vulnerability Scanner

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 8.1 (9 reviews) | 
| **Proactive Assistance** | Not enough data | Not enough data | 7.9 (8 reviews) | 

### Endpoint Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | 8.6/10 | 26 |
| **Tenable Security Center** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Compliance** | 8.8 (23 reviews) | Not enough data | Not enough data | 
| **Web Control** | 8.3 (22 reviews) | Not enough data | Not enough data | 
| **Application Control** | 8.7 (23 reviews) | Not enough data | Not enough data | 
| **Asset Management** | 8.6 (22 reviews) | Not enough data | Not enough data | 
| **Device Control** | 8.8 (21 reviews) | Not enough data | Not enough data | 

#### Functionality

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **System Isolation** | 9.0 (22 reviews) | Not enough data | Not enough data | 
| **Firewall** | 8.5 (22 reviews) | Not enough data | Not enough data | 
| **Endpoint Intelligence** | 8.9 (23 reviews) | Not enough data | Not enough data | 
| **Malware Detection** | 8.6 (22 reviews) | Not enough data | Not enough data | 

#### Analysis

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Automated Remediation** | 8.5 (23 reviews) | Not enough data | Not enough data | 
| **Incident Reports** | 8.5 (22 reviews) | Not enough data | Not enough data | 
| **Behavioral Analysis** | 8.3 (21 reviews) | Not enough data | Not enough data | 

### Risk-Based Vulnerability Management

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | N/A | N/A |
| **Tenable Security Center** | 8.7/10 | 43 |
| **Tenable Nessus** | N/A | N/A |

#### Risk Analysis

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Risk Scoring** | Not enough data | 9.1 (35 reviews) | Not enough data | 
| **Reporting** | Not enough data | 8.6 (36 reviews) | Not enough data | 
| **Risk-Prioritization** | Not enough data | 9.4 (36 reviews) | Not enough data | 

#### Vulnerability Assesment

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Vulnerability Scanning** | Not enough data | 9.6 (35 reviews) | Not enough data | 
| **Vulnerability Intelligence** | Not enough data | 9.5 (35 reviews) | Not enough data | 
| **Contextual Data** | Not enough data | 9.3 (31 reviews) | Not enough data | 
| **Dashboards** | Not enough data | 8.9 (35 reviews) | Not enough data | 

#### Automation

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Automated Remediation** | Not enough data | 7.5 (21 reviews) | Not enough data | 
| **Workflow Automation** | Not enough data | 7.8 (27 reviews) | Not enough data | 
| **Security Testing** | Not enough data | 8.1 (26 reviews) | Not enough data | 
| **Test Automation** | Not enough data | 8.2 (25 reviews) | Not enough data | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | N/A | N/A |
| **Tenable Security Center** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### API Management 

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **API Discovery** | Not enough data | Not enough data | Not enough data | 
| **API Monitoring** | Not enough data | Not enough data | Not enough data | 
| **Reporting** | Not enough data | Not enough data | Not enough data | 
| **Change Management** | Not enough data | Not enough data | Not enough data | 

#### Security Testing

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Compliance Monitoring** | Not enough data | Not enough data | Not enough data | 
| **API Verification** | Not enough data | Not enough data | Not enough data | 
| **API Testing** | Not enough data | Not enough data | Not enough data | 

#### Security Management

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Security and Policy Enforcement** | Not enough data | Not enough data | Not enough data | 
| **Anomoly Detection** | Not enough data | Not enough data | Not enough data | 
| **Bot Detection** | Not enough data | Not enough data | Not enough data | 

### Attack Surface Management

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | N/A | N/A |
| **Tenable Security Center** | N/A | N/A |
| **Tenable Nessus** | 8.3/10 | 6 |

#### Asset Management

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Asset Discovery** | Not enough data | Not enough data | 6.9 (6 reviews) | 
| **Shadow IT Detection** | Not enough data | Not enough data | 7.5 (6 reviews) | 
| **Change Management** | Not enough data | Not enough data | 4.7 (6 reviews) | 

#### Monitoring

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Gap Analysis** | Not enough data | Not enough data | 8.3 (6 reviews) | 
| **Vulnerability Intelligence** | Not enough data | Not enough data | 10.0 (6 reviews) | 
| **Compliance Monitoring** | Not enough data | Not enough data | 8.6 (6 reviews) | 
| **Continuous Monitoring** | Not enough data | Not enough data | 9.2 (6 reviews) | 

#### Risk Management

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Risk-Prioritization** | Not enough data | Not enough data | 9.2 (6 reviews) | 
| **Reconnaissance** | Not enough data | Not enough data | 9.2 (6 reviews) | 
| **At-Risk Analysis** | Not enough data | Not enough data | 8.6 (6 reviews) | 
| **Threat Intelligence** | Not enough data | Not enough data | 9.4 (6 reviews) | 

#### Generative AI

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | Not enough data | 

### Antivirus

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | 8.0/10 | 57 |
| **Tenable Security Center** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Generative AI

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **AI Text Generation** | 8.0 (52 reviews) | Not enough data | Not enough data | 
| **AI Text Summarization** | 8.0 (52 reviews) | Not enough data | Not enough data | 

### Endpoint Detection &amp; Response (EDR)

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | N/A | N/A |
| **Tenable Security Center** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Services - Endpoint Detection &amp; Response (EDR) 

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Managed Services** | Not enough data | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | N/A | N/A |
| **Tenable Security Center** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Cloud Visibility

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | Not enough data | 

#### Security

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Data Security** | Not enough data | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | Not enough data | 

#### Identity

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **SSO** | Not enough data | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | Not enough data | 

### Endpoint Protection

| Product | Score | Reviews |
|---|---|---|
| **Microsoft Defender for Endpoint** | N/A | N/A |
| **Tenable Security Center** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### System Control

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Device Control** | Not enough data | Not enough data | Not enough data | 
| **Web Control** | Not enough data | Not enough data | Not enough data | 
| **Application Control** | Not enough data | Not enough data | Not enough data | 
| **Asset Management** | Not enough data | Not enough data | Not enough data | 
| **System Isolation** | Not enough data | Not enough data | Not enough data | 

#### Vulnerability Prevention

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Endpoint Intelligence** | Not enough data | Not enough data | Not enough data | 
| **Firewall** | Not enough data | Not enough data | Not enough data | 
| **Malware Detection** | Not enough data | Not enough data | Not enough data | 

#### Security Management

| Feature | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Incident Reports** | Not enough data | Not enough data | Not enough data | 
| **Security Validation** | Not enough data | Not enough data | Not enough data | 
| **Compliance ** | Not enough data | Not enough data | Not enough data | 

---
## Categories

**Unique to Microsoft Defender for Endpoint (3):** [Antivirus Software](https://www.g2.com/categories/antivirus), [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr), [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms)

**Unique to Tenable Security Center (2):** [Risk-Based Vulnerability Management Software](https://www.g2.com/categories/risk-based-vulnerability-management), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)

**Unique to Tenable Nessus (4):** [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [Dynamic Application Security Testing (DAST) Software](https://www.g2.com/categories/dynamic-application-security-testing-dast), [API Security Tools](https://www.g2.com/categories/api-security)


---
## Reviewer Demographics

### By Company Size

| Segment | Microsoft Defender for Endpoint | Tenable Security Center | Tenable Nessus | 
|---|---|---|---|
| **Small-Business** | 27.1% | 13.7% | 26.1% | 
| **Mid-Market** | 34.4% | 21.9% | 39.4% | 
| **Enterprise** | 38.5% | 64.4% | 34.5% | 

### By Industry

#### Microsoft Defender for Endpoint

- **Information Technology and Services:** 25.5%
- **Computer &amp; Network Security:** 14.1%
- **Financial Services:** 6.0%
- **Computer Software:** 6.0%
- **Telecommunications:** 2.3%
- **Banking:** 2.3%
- **Computer Networking:** 2.0%
- **Airlines/Aviation:** 1.7%
- **Education Management:** 1.7%
- **Consumer Services:** 1.7%
- **Other:** 36.6%

#### Tenable Security Center

- **Financial Services:** 13.7%
- **Banking:** 13.7%
- **Computer &amp; Network Security:** 12.3%
- **Information Technology and Services:** 9.6%
- **Government Administration:** 6.8%
- **Education Management:** 4.1%
- **Insurance:** 4.1%
- **Defense &amp; Space:** 4.1%
- **Hospital &amp; Health Care:** 4.1%
- **Pharmaceuticals:** 2.7%
- **Other:** 24.7%

#### Tenable Nessus

- **Information Technology and Services:** 25.7%
- **Computer &amp; Network Security:** 16.5%
- **Financial Services:** 7.4%
- **Computer Software:** 6.0%
- **Banking:** 4.6%
- **Government Administration:** 3.9%
- **Higher Education:** 3.2%
- **Hospital &amp; Health Care:** 2.5%
- **Education Management:** 2.1%
- **Telecommunications:** 2.1%
- **Other:** 26.1%

---
## Alternatives

### Alternatives to Microsoft Defender for Endpoint

- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (973 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (825 reviews)
- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.7/5 stars (404 reviews)
- [Trellix Endpoint Security](https://www.g2.com/products/trellix-endpoint-security/reviews) — 4.3/5 stars (327 reviews)
- [Check Point Harmony Endpoint](https://www.g2.com/products/check-point-harmony-endpoint/reviews) — 4.5/5 stars (284 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [ThreatDown](https://www.g2.com/products/threatdown/reviews) — 4.6/5 stars (1083 reviews)
- [Bitdefender GravityZone XDR](https://www.g2.com/products/bitdefender-gravityzone-xdr/reviews) — 4.0/5 stars (85 reviews)
- [Cisco Secure Endpoints](https://www.g2.com/products/cisco-secure-endpoints/reviews) — 4.5/5 stars (27 reviews)
- [Cortex XDR](https://www.g2.com/products/palo-alto-networks-cortex-xdr/reviews) — 4.6/5 stars (53 reviews)

### Alternatives to Tenable Security Center

- [InsightVM (Nexpose)](https://www.g2.com/products/insightvm-nexpose/reviews) — 4.4/5 stars (78 reviews)
- [Qualys VMDR](https://www.g2.com/products/qualys-vmdr/reviews) — 4.4/5 stars (167 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (786 reviews)
- [Arctic Wolf](https://www.g2.com/products/arctic-wolf/reviews) — 4.7/5 stars (279 reviews)
- [Red Hat Ansible Automation Platform](https://www.g2.com/products/red-hat-ansible-automation-platform/reviews) — 4.6/5 stars (377 reviews)
- [CloudBees](https://www.g2.com/products/cloudbees/reviews) — 4.4/5 stars (622 reviews)
- [Cisco Vulnerability Management (formerly Kenna.VM)](https://www.g2.com/products/cisco-vulnerability-management-formerly-kenna-vm/reviews) — 4.3/5 stars (217 reviews)
- [Gearset DevOps](https://www.g2.com/products/gearset-devops/reviews) — 4.7/5 stars (292 reviews)
- [Harness Platform](https://www.g2.com/products/harness-platform/reviews) — 4.6/5 stars (281 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)

### Alternatives to Tenable Nessus

- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [Invicti (formerly Netsparker)](https://www.g2.com/products/invicti-formerly-netsparker/reviews) — 4.6/5 stars (69 reviews)
- [Detectify](https://www.g2.com/products/detectify/reviews) — 4.5/5 stars (51 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (786 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [Acunetix by Invicti](https://www.g2.com/products/acunetix-by-invicti/reviews) — 4.1/5 stars (105 reviews)
- [Pentest-Tools.com](https://www.g2.com/products/pentest-tools-com/reviews) — 4.8/5 stars (100 reviews)
- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [Orca Security](https://www.g2.com/products/orca-security/reviews) — 4.6/5 stars (254 reviews)
- [APPCHECK](https://www.g2.com/products/appcheck/reviews) — 4.6/5 stars (67 reviews)

---
## Top Discussions

### Microsoft Defender for Endpoint

- Title: [What is Endpoint Defender?](https://www.g2.com/discussions/what-is-endpoint-defender) — 1 comment
  > **Top comment:** "In general terms, &quot;Endpoint Defender&quot; could potentially refer to a category of cybersecurity solutions designed to protect individual devices (endpoints)..."
- Title: [Which feature in Microsoft Defender for endpoint?](https://www.g2.com/discussions/which-feature-in-microsoft-defender-for-endpoint) — 1 comment
  > **Top comment:** "Comprehensive protection: Microsoft Defender for Endpoint provides protection against a wide range of threats, including viruses, malware, ransomware, and..."
- Title: [when scheduled scan starts it consume  100% CPU, can you kindly provide solution for it.](https://www.g2.com/discussions/37198-when-scheduled-scan-starts-it-consume-100-cpu-can-you-kindly-provide-solution-for-it) — 1 comment, 1 upvote
  > **Top comment:** "Method I: Ensure that no other Adware, Antimalware or Antivirus software is installed or not fully removed
Method II: Prevent Windows Defender from scanning..."
- Title: [can i use this for my video games?](https://www.g2.com/discussions/32645-can-i-use-this-for-my-video-games) — 1 comment, 1 upvote
  > **Top comment:** "if you are using Xbox, then all software&#39;s are certified by Microsoft, so no need the virus scan "

### Tenable Security Center

- Title: [What is Tenable.sc used for?](https://www.g2.com/discussions/tenable-security-center-what-is-tenable-sc-used-for) — 1 comment
  > **Top comment:** "Tenable products look for vulnerabilities in systems and devices.  This way you can fix those before the bad gues get in.  Think of it this way.  Remember..."
- Title: [What is the best way to break up scans so they don&#39;t use licenses up and so scans don&#39;t end up getting blocked?](https://www.g2.com/discussions/32520-what-is-the-best-way-to-break-up-scans-so-they-don-t-use-licenses-up-and-so-scans-don-t-end-up-getting-blocked) — 1 comment, 1 upvote
  > **Top comment:** "I would recommend to break in to groups based on your organization and run host discovery first and run asset based scanning to avoid this situation...."

### Tenable Nessus

- Title: [Is there a free version of Nessus?](https://www.g2.com/discussions/is-there-a-free-version-of-nessus) — 2 comments
  > **Top comment:** "30 /15 days trail is available "
- Title: [What does Nessus Professional scan for?](https://www.g2.com/discussions/about-nessus-2b3f6c8f-4cde-460a-bd61-f2527f0cdb45) — 2 comments, 1 upvote
  > **Top comment:** "It scans the system for  different vulnerabilities depending on what policy you want to scan the system with (like Internal PCI, Policy Compliance, SCAP,..."
- Title: [What types of devices can Nessus Professional scan?](https://www.g2.com/discussions/device-types-78d9c056-eb92-4435-aad4-32afa6a1a445) — 2 comments, 1 upvote
  > **Top comment:** "Windows PCs/servers , Linux systems/servers, Mobiles, IPMI devices like iLO, iDRAC, network switches, storage arrays, etc."
- Title: [How many IP Addresses can I scan?](https://www.g2.com/discussions/ip-addresses-b6ef755d-8e1e-4949-818a-ec228e8ac779) — 2 comments, 1 upvote
  > **Top comment:** "It depends on your license."
- Title: [What do I need to run Nessus professional?](https://www.g2.com/discussions/environment-c71784d4-2685-42a7-870f-56620a4bcb97) — 2 comments, 1 upvote
  > **Top comment:** "you don&#39;t need any special requirements you can run on any windows or Linux machine without any hazel."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/microsoft-defender-for-endpoint-vs-tenable-security-center-vs-tenable-nessus)

