Introducing G2.ai, the future of software buying.Try now

Compare Sysdig Secure and Tenable Nessus

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Sysdig Secure
Sysdig Secure
Star Rating
(111)4.8 out of 5
Market Segments
Enterprise (46.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Sysdig Secure
Tenable Nessus
Tenable Nessus
Star Rating
(297)4.5 out of 5
Market Segments
Mid-Market (39.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$3,390.00 1 License With One-Time Purchase
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Sysdig Secure excels in Quality of Support with a score of 9.8, while Tenable Nessus falls behind at 8.4. Reviewers mention that Sysdig's support team is responsive and knowledgeable, making it easier to resolve issues quickly.
  • Reviewers mention that Sysdig Secure offers superior Compliance Monitoring capabilities, scoring 9.5 compared to Tenable Nessus's 8.8. Users say that Sysdig provides comprehensive compliance reports that help organizations meet regulatory requirements more effectively.
  • Users on G2 highlight Sysdig Secure's Dashboards and Reports feature, which received a perfect score of 9.8, indicating that it provides clear and actionable insights. In contrast, Tenable Nessus's reporting features are seen as less intuitive, with a score of 8.5.
  • Reviewers mention that Sysdig Secure's Risk Scoring feature, rated at 9.1, is more advanced than Tenable Nessus's offering, which lacks the same level of granularity and detail, making it harder for users to prioritize vulnerabilities effectively.
  • Users say that Sysdig Secure's Security Automation capabilities, scoring 9.5, allow for seamless integration into existing workflows, while Tenable Nessus, with a score of 9.0, is noted for having less robust automation features, leading to more manual intervention.
  • G2 users report that Sysdig Secure's Multicloud Visibility feature, rated at 9.7, is a standout, enabling organizations to monitor and manage security across various cloud environments effectively. In comparison, Tenable Nessus's visibility features are perceived as limited, scoring only 8.8.
Pricing
Entry-Level Pricing
Sysdig Secure
No pricing available
Tenable Nessus
Pro - 1 Year
$3,390.00
1 License With One-Time Purchase
Browse all 4 pricing plans
Free Trial
Sysdig Secure
No trial information available
Tenable Nessus
Free Trial is available
Ratings
Meets Requirements
9.5
96
9.0
245
Ease of Use
9.3
99
8.9
247
Ease of Setup
9.1
90
8.8
169
Ease of Admin
9.3
69
8.9
160
Quality of Support
9.8
97
8.4
227
Has the product been a good partner in doing business?
9.7
69
8.7
148
Product Direction (% positive)
9.4
94
9.0
236
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
9.9
31
Not enough data
Management
9.8
30
Not enough data
9.7
29
Not enough data
9.9
30
Not enough data
Operations
9.9
30
Not enough data
9.9
30
Not enough data
9.8
30
Not enough data
Security Controls
9.9
29
Not enough data
Feature Not Available
Not enough data
10.0
28
Not enough data
10.0
25
Not enough data
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Testing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.4
56
Not enough data
Administration
9.1
52
Not enough data
9.3
44
Not enough data
9.6
49
Not enough data
9.5
48
Not enough data
Monitoring
9.4
52
Not enough data
9.3
49
Not enough data
9.4
51
Not enough data
Protection
9.4
52
Not enough data
9.6
55
Not enough data
9.4
52
Not enough data
9.1
46
Not enough data
9.5
40
Not enough data
Security
9.6
38
Not enough data
9.3
38
Not enough data
Feature Not Available
Not enough data
9.6
38
Not enough data
Compliance
9.6
38
Not enough data
9.3
32
Not enough data
9.5
36
Not enough data
Administration
9.6
37
Not enough data
9.6
37
Not enough data
9.4
35
Not enough data
9.2
52
8.2
153
Performance
9.5
45
Feature Not Available
9.5
47
8.9
139
|
Verified
9.2
45
6.7
137
|
Verified
9.5
48
9.1
134
|
Verified
Network
9.6
40
8.8
135
|
Verified
9.8
7
8.8
128
|
Verified
9.5
41
8.4
112
|
Verified
Application
8.5
32
Feature Not Available
8.5
28
7.3
85
8.1
28
7.8
104
Agentic AI - Vulnerability Scanner
Not enough data
8.0
10
Not enough data
8.0
10
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
9.6
38
Not enough data
Activity Monitoring
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Security
9.6
37
Not enough data
9.7
34
Not enough data
9.5
37
Not enough data
Administration
9.5
33
Not enough data
9.7
36
Not enough data
9.7
32
Not enough data
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
API Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Testing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
9.5
45
Not enough data
Configuration
Feature Not Available
Not enough data
9.4
39
Not enough data
9.5
40
Not enough data
9.2
38
Not enough data
Feature Not Available
Not enough data
Visibility
9.6
38
Not enough data
9.8
36
Not enough data
Vulnerability Management
9.7
42
Not enough data
9.6
44
Not enough data
9.6
44
Not enough data
9.5
42
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
8.3
6
Asset Management
Not enough data
6.9
6
Not enough data
7.5
6
Not enough data
4.7
6
Monitoring
Not enough data
8.3
6
Not enough data
10.0
6
Not enough data
8.6
6
Not enough data
9.2
6
Risk Management
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
8.6
6
Not enough data
9.4
6
Generative AI
Not enough data
Not enough data
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
9.3
17
Not enough data
Access control - Cloud Infrastructure Entitlement Management (CIEM)
9.4
16
Not enough data
9.3
16
Not enough data
9.3
15
Not enough data
Feature Not Available
Not enough data
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
9.3
16
Not enough data
Feature Not Available
Not enough data
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
9.3
17
Not enough data
9.4
17
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
Feature Not Available
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Services - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Sysdig Secure
Sysdig Secure
Small-Business(50 or fewer emp.)
13.6%
Mid-Market(51-1000 emp.)
40.0%
Enterprise(> 1000 emp.)
46.4%
Tenable Nessus
Tenable Nessus
Small-Business(50 or fewer emp.)
26.4%
Mid-Market(51-1000 emp.)
39.3%
Enterprise(> 1000 emp.)
34.3%
Reviewers' Industry
Sysdig Secure
Sysdig Secure
Financial Services
20.0%
Information Technology and Services
15.5%
Computer Software
15.5%
Banking
10.0%
Computer & Network Security
9.1%
Other
30.0%
Tenable Nessus
Tenable Nessus
Information Technology and Services
26.0%
Computer & Network Security
16.7%
Financial Services
7.8%
Computer Software
6.4%
Banking
4.6%
Other
38.4%
Alternatives
Sysdig Secure
Sysdig Secure Alternatives
Wiz
Wiz
Add Wiz
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Orca Security
Orca Security
Add Orca Security
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Tenable Nessus
Tenable Nessus Alternatives
Intruder
Intruder
Add Intruder
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Detectify
Detectify
Add Detectify
Wiz
Wiz
Add Wiz
Discussions
Sysdig Secure
Sysdig Secure Discussions
Is Sysdig free?
2 Comments
Chandan S.
CS
They have removed the free trial option without prior consultation or discussion of the use case with the solution architect team.Read more
Benefits
1 Comment
Official Response from Sysdig Secure
With a single, operational view to surface performance, compliance, vulnerabilities, and policy data, users are able to triage issues faster, reduce alert...Read more
Technical Advantages
1 Comment
Official Response from Sysdig Secure
Sysdig enables comprehensive performance and security management while reducing management overhead in a dynamic, microservices-based environment. With a...Read more
Tenable Nessus
Tenable Nessus Discussions
I'm a consultant; can I use Nessus Professional to conduct my client's vulnerability scanning?
2 Comments
ANKIT S.
AS
Yes, you can.Read more
Is Nessus professional the right product for me?
2 Comments
Official Response from Tenable Nessus
Nessus Professional has always been designed for the security professional. The typical Nessus user is a consultant or contractor who is very experienced...Read more
Can I use Nessus professional data in other applications?
2 Comments
Official Response from Tenable Nessus
Yes. Many third party applications can incorporate a Nessus file. This allows consultants to share the data with their clients’ other applications for the...Read more