Introducing G2.ai, the future of software buying.Try now

Compare Saner CVEM and Tenable Security Center

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Saner CVEM
Saner CVEM
Star Rating
(76)4.5 out of 5
Market Segments
Mid-Market (41.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Please Check with SecPod Any number of units
Free Trial is available
Learn more about Saner CVEM
Tenable Security Center
Tenable Security Center
Star Rating
(82)4.6 out of 5
Market Segments
Enterprise (65.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Tenable Security Center

Saner CVEM vs Tenable Security Center

When assessing the two solutions, reviewers found them equally easy to use. However, Saner CVEM is easier to set up and administer.reviewers also preferred doing business with Saner CVEM overall.

  • Reviewers felt that Tenable Security Center meets the needs of their business better than Saner CVEM.
  • When comparing quality of ongoing product support, reviewers felt that Saner CVEM is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Saner CVEM over Tenable Security Center.
Pricing
Entry-Level Pricing
Saner CVEM
Custom Based
Please Check with SecPod
Any number of units
Learn more about Saner CVEM
Tenable Security Center
No pricing available
Free Trial
Saner CVEM
Free Trial is available
Tenable Security Center
No trial information available
Ratings
Meets Requirements
8.9
64
9.2
44
Ease of Use
8.6
65
8.6
48
Ease of Setup
9.1
46
8.6
42
Ease of Admin
9.0
28
8.6
43
Quality of Support
9.2
64
8.5
47
Has the product been a good partner in doing business?
9.1
27
8.8
40
Product Direction (% positive)
9.8
64
8.4
44
Features by Category
8.9
35
8.6
43
Performance
8.9
33
8.0
29
8.9
33
8.8
33
8.4
31
7.9
33
9.2
33
9.1
35
Network
8.9
31
9.0
29
8.8
30
9.1
31
9.2
32
8.9
24
Application
8.5
29
8.5
19
8.5
28
7.9
15
8.2
28
8.3
20
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
8.5
32
Not enough data
Asset Inventory
8.8
31
Not enough data
8.7
32
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.1
32
Not enough data
Generative AI
8.2
13
Not enough data
8.3
13
Not enough data
Agentic AI - IT Asset Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
8.4
32
Not enough data
8.4
32
Not enough data
8.6
32
Not enough data
8.0
31
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
8.9
28
8.7
42
Risk Analysis
8.8
26
9.1
35
8.3
27
8.6
35
9.1
27
9.4
35
Vulnerability Assesment
9.3
27
9.6
35
9.4
27
9.5
35
8.3
25
9.3
31
8.9
27
8.9
34
Automation
8.7
26
7.5
21
8.5
25
7.8
26
Feature Not Available
8.1
26
8.3
23
8.2
25
Attack Surface ManagementHide 12 FeaturesShow 12 Features
9.9
12
Not enough data
Asset Management
9.4
11
Not enough data
9.7
11
Not enough data
9.4
11
Not enough data
Monitoring
9.7
11
Not enough data
9.5
11
Not enough data
9.1
11
Not enough data
9.1
11
Not enough data
Risk Management
9.7
11
Not enough data
8.9
11
Not enough data
9.2
11
Not enough data
9.2
11
Not enough data
Generative AI
9.4
8
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Saner CVEM
Saner CVEM
Tenable Security Center
Tenable Security Center
Saner CVEM and Tenable Security Center are categorized as Vulnerability Scanner and Risk-Based Vulnerability Management
Unique Categories
Tenable Security Center
Tenable Security Center has no unique categories
Reviews
Reviewers' Company Size
Saner CVEM
Saner CVEM
Small-Business(50 or fewer emp.)
38.9%
Mid-Market(51-1000 emp.)
41.7%
Enterprise(> 1000 emp.)
19.4%
Tenable Security Center
Tenable Security Center
Small-Business(50 or fewer emp.)
13.9%
Mid-Market(51-1000 emp.)
20.8%
Enterprise(> 1000 emp.)
65.3%
Reviewers' Industry
Saner CVEM
Saner CVEM
Information Technology and Services
30.6%
Computer & Network Security
18.1%
Internet
6.9%
Accounting
5.6%
Information Services
4.2%
Other
34.7%
Tenable Security Center
Tenable Security Center
Financial Services
13.9%
Computer & Network Security
12.5%
Banking
12.5%
Information Technology and Services
9.7%
Government Administration
6.9%
Other
44.4%
Alternatives
Saner CVEM
Saner CVEM Alternatives
NinjaOne
NinjaOne
Add NinjaOne
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Atera
Atera
Add Atera
Tenable Security Center
Tenable Security Center Alternatives
InsightVM (Nexpose)
InsightVM (Nexpose)
Add InsightVM (Nexpose)
Qualys VMDR
Qualys VMDR
Add Qualys VMDR
Wiz
Wiz
Add Wiz
Arctic Wolf
Arctic Wolf
Add Arctic Wolf
Discussions
Saner CVEM
Saner CVEM Discussions
Monty the Mongoose crying
Saner CVEM has no discussions with answers
Tenable Security Center
Tenable Security Center Discussions
What is the best way to break up scans so they don't use licenses up and so scans don't end up getting blocked?
1 Comment
Christopher P.
CP
I would recommend to break in to groups based on your organization and run host discovery first and run asset based scanning to avoid this situation....Read more
What is Tenable.sc used for?
1 Comment
Sanford W.
SW
Tenable products look for vulnerabilities in systems and devices. This way you can fix those before the bad gues get in. Think of it this way. Remember...Read more
Monty the Mongoose crying
Tenable Security Center has no more discussions with answers