We just raised a $30M Series A: Read our story
2018-03-12T13:28:00Z

What is your primary use case for Tenable SC?

16

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
1414 Answers

author avatar
Top 5LeaderboardReal User

Tenable SC can be used in any company for vulnerability management life cycle.

2021-10-05T10:32:10Z
author avatar
Real User

We had a requirement to connect multiple branches into one console. We installed Nessus at multiple locations and then connected Nessus. We did the service scan and got the report on the central site with Tenable SC.

2021-04-28T20:32:08Z
author avatar
Top 20Real User

At work we use the enterprise version of Tenable, Tenable.io, and I also use Tenable.sc — which I refer to as SecurityCenter — for local scanning. I use Tenable SecurityCenter every day to scan our entire environment for vulnerabilities. I use a local license during the discovery process for penetration testing. So I'll do an en masse scan, and then also do a scan with Tenable to scan for IPs and vulnerabilities. User-wise, with Tenable SecurityCenter, there's different roles. We have security analysts, admin, etc. I'd say there's probably four or five different roles from people that can just go in and view. Security analysts can upload manual scans and create dashboards and download reports. Then administrators can create accounts, assign roles and responsibilities, and things like that.

2021-01-06T08:10:07Z
author avatar
Reseller

I'm a pre-sales engineer and we are resellers of Tenable.

2020-09-08T09:10:01Z
author avatar
Top 20Reseller

We are a reseller and Tenable SC is one of the products that we implement for our clients. The primary use case is to check for compliance against a specific framework, like NIST, CIS, or something similar. Tenable will check compliance on the assets against that specific framework and give that visibility to the technical staff, top management, and the risk management team. In turn, this will enable them to evaluate the risk that they are facing for non-compliance issues. The second use case is helping the technical staff that handles updates and upgrades to the operating system. It means that they have the most urgent upgrades that they need to cover the high-risk vulnerabilities that can be found and exploited. Beyond this, Tenable SC assists with malware detection and similar functionality.

2020-06-04T09:41:24Z
author avatar
Top 20Consultant

Our primary use case is for vulnerability assessment of our internal network.

2020-04-06T08:22:00Z
author avatar
Real User

Our primary use case is compliance for our audits, for our customers. We were exposed in that we were not meeting contractual obligations. We are monitoring our infrastructure: servers, switches, storage, routers, SAN storage, operating systems, and applications to the extent that the tool is able to see into them. We use it to hit the high ones like Adobe or Microsoft Office and the like. Some of the more niche products that we use may not be in their inventory of vulnerabilities.

2019-11-14T06:34:00Z
author avatar
Top 5LeaderboardReal User

I use this solution to perform vulnerability assessments and then patch my systems using third-party tools. The vulnerability scan is pretty fast and once you give it the right access privileges on the target system, you get very clear and precise details of the vulnerabilities.

2019-09-20T05:17:00Z
author avatar
Real User

Vulnerability assessment and compliance auditing are our primary use cases. That includes baseline configuration scanning. We use it to protect everything in the enterprise environment: servers, workstations, pretty much all operating systems, networking gear. We are doing cloud and we are doing some IOT. We are not using their web application scanning tool.

2019-06-30T10:29:00Z
author avatar
Real User

I'm the one who scans and performs assessments on clinical and medical equipment in our environment. I manage the clinical endpoint devices: MRI systems, bedside monitoring, Alaris pumps, fusion pumps, CTUs, EEGs, EKGs, wireless defibrillators, and a lot of IP cameras that are part of operation room labs. My colleague handles all the regular enterprise IT, database servers, etc. From a scanning standpoint, I do everything from discovery scanning to full-credential auditing and anything and everything in between. That's just for the medical space in a 24/7 production medical environment. We're also using a bit of the Passive Vulnerability Scanner and, eventually, I want to get to using the agents, but we haven't gotten to that stage yet.

2019-05-30T08:12:00Z
author avatar
Real User

The primary use case is to perform vulnerability assessments across the entire network.

2019-05-09T13:12:00Z
author avatar
Real User

I primarily use this solution for vulnerability assessment on the assets that we have. This includes servers, network equipment, appliances, routers, firewalls, and switches.

2018-12-13T11:34:00Z
author avatar
Real User

Basically it reviews our threat landscape vulnerability. So, we just want to be sure that we check compliance in terms of our configuration and compliance to our policies. But, the key is to make sure that we are not exposed to non-vulnerabilities that can be exploited. So, it's more of just securing our threat landscape.

2018-10-28T09:33:00Z
author avatar
User

I use SecurityCenter currently to investigate daily network security events from reports I receive. Our network support team uses it to track, manage, and remediate system vulnerabilities. It works well for the latter, not so much for the former.

2018-03-12T13:28:00Z
Learn what your peers think about Tenable SC. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
552,695 professionals have used our research since 2012.