In March 2022, Tenable Research discovered two vulnerabilities (one critical) in Microsoft Azure platform and both were exploitable. Microsoft downplayed the risk and it took the company 89 days to privately acknowledge the severity of the issue.
Read this article by Tenable CEO Amit Yoran for more details.
2020
2024
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna.
2020
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna.
2021
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna.
2022
Read This Article
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna.
2023
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna.
2024
62%
80%
60%
70%
67%
0
Discover More
“Good Enough” VM
from Microsoft is not good enough.
Over the past two decades, Microsoft’s products have had numerous CVEs with over 1,164 added in 2022 alone.
Tenable predictable cost structure.
Featured
Microsoft unpredictable unaccounted costs.
Read this Article
See Tenable in Action
Learn More
DAYS
Coverage and Accuracy
$
2020
2024
$
$
$
Tenable has complete visibility and assessment of the entire attack surface.
Reducing cyber risk and ensuring compliance requires understanding across traditional IT to the cloud to operational technology.
Tenable’s ability to log on to network devices and check for configuration and settings significantly reduces the rate of false-positives.
Microsoft Defender Vulnerability Management coverage is limited to those endpoints that have an agent, and its network scanning capability is SNMP-based.
Security Beyond the Endpoint
Tenable Exposure View combines Tenable’s vulnerability priority rating with an asset criticality rating (ACR) to objectively measure the risk of an asset, a business unit — or the whole organization.
Microsoft Defender Vulnerability Management scores do not consider context like the criticality of an asset on a network, internal and peer benchmarking, assessment, and remediation maturity.
Prioritize Risk
Read The Report
#1 in Vulnerability Management -
"Tenable named a leader by market analysts and
recognized by customers."
Read The Report
Tenable has been named a leader in The Forrester Wave™: Vulnerability Risk Management, Q3 2023
ANALYST RESEARCH
TRUSTED BY MANY
Microsoft’s recommendations method leads to serious gaps, with the potential of hundreds if not thousands of suggestions.
Tenable enables communication by providing an extensive library of dashboards and reports to help facilitate communication with stakeholders such as, senior leadership, IT and security colleagues, auditors, and the board.
Microsoft Defender has a lack of dashboards and reports. Period.
Communicate Risk
#1 in CVE COVERAGE
80
Vulnerabilities Assessed with 196,000+ Plugins
k
479
Vulnerabilities Disclosed Since January 2019
#1 IN ZERO DAY RESEARCH
24
HRS
Median Time for Coverage of High Profile Issues
#1 in Vulnerability Management
<
Gain the edge every CISO craves - a centralized view of cyber risk across IT, cloud, containers, web apps, identity systems and OT assets.
Featured
Microsoft Defender product suite provides incomplete visibility with inadequate risk context.
Learn More
Download Guide
Security Leader's Guide to Comparing Tenable and Microsoft
COMPETITIVE GUIDE
As of March 2023, Tenable Research has published over 183,000 plugins covering over 74,000 CVEs, and we continue to update and publish our vulnerability coverage and CVE count at tenable.com/plugins.
Microsoft does not publish its CVE count.
Vulnerability Coverage and Accuracy
Compare Tenable to Microsoft
COMPARISON
80K* CVEs the industry’s broadest coverage, accuracy and speed.
Limited vulnerability coverage
(not published)
Do not consider important business context
Exposure view combining Tenable’s vulnerability priority rating with an asset criticality rating
Prioritization
Limited to the endpoints with an agent and basic SNMP-based capability
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Scope of Coverage
Lack of dashboards and reports
Extensive library of dashboards
and reports
Dashboarding and Reporting
Minimal integration with remediation tools like Big Fix
Well supported but 3rd party tools
for remediation, workflow
Vulnerability Management Tool Ecosystem
Lacks a unified and contextual view
All exposures in a unified view:
IT assets, cloud resources, identity systems, web apps, and external attack surface
Unified View
Only support cloud-based implementations
Options are available for on-premis, cloud, and hybrid implementations
Deployment Architecture
Agent-based with limited support for network scanning
Agent-based and agentless
Scanning Technique
Compare Tenable to Microsoft
80K* CVEs the industry’s broadest coverage, accuracy and speed
Vulnerability Coverage and Accuracy
Limited vulnerability coverage (not published)
80K* CVEs the industry’s broadest coverage, accuracy and speed
Limited vulnerability coverage (not published)
Vulnerability Coverage and Accuracy
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Scope of Coverage
Exposure view combining Tenable’s vulnerability priority rating with an asset criticality rating
Do not consider important business context
Prioritization
Exposure view combining Tenable’s vulnerability priority rating with an asset criticality rating
Do not consider important business context
Prioritization
80K* CVEs the industry’s broadest coverage, accuracy and speed
Limited vulnerability coverage
(not published)
Vulnerability Coverage and Accuracy
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Vulnerability Management Tool Ecosystem
Vulnerability Management Tool Ecosystem
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Vulnerability Management Tool Ecosystem
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Vulnerability Management Tool Ecosystem
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Vulnerability Management Tool Ecosystem
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Vulnerability Management Tool Ecosystem
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Vulnerability Management Tool Ecosystem
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Vulnerability Management Tool Ecosystem
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and basic SNMP-based capability
Extensive library of dashboards
and reports
Lack of dashboards and reports
Dashboarding and Reporting
Well supported byt 3rd party tools for remediation, workflow
Minimal integration with remediation tools like Big Fix
Vulnerability Management Tool Ecosystem
All exposures in a unified view: IT assets, cloud resources, identity systems, web apps, and external attack surface
Lacks a unified and contextual view
Unified View
Well supported byt 3rd party tools for remediation, workflow
Minimal integration with remediation tools like Big Fix
Vulnerability Management Tool Ecosystem
Well supported byt 3rd party tools for remediation, workflow
Minimal integration with remediation tools like Big Fix
Vulnerability Management Tool Ecosystem
Well supported byt 3rd party tools for remediation, workflow
Minimal integration with remediation tools like Big Fix
Vulnerability Management Tool Ecosystem
Exposure view combining Tenable’s vulnerability priority rating with an asset criticality rating
Do not consider important business context
Prioritization
Wide variety of assets - endpoints, network devices, operational technology (OT), cloud workloads, web apps
Limited to the endpoints with an agent and
basic SNMP-based capability
Scope of
Coverage
Extensive library of dashboards and reports
Lack of dashboards and reports
Dashboarding and Reporting
Well supported byt 3rd party tools for remediation, workflow
Minimal integration with remediation tools like Big Fix
Vulnerability Management Tool Ecosystem
Options are available for
on-premise, cloud,
and hybrid implementations
Only support cloud-based implementations
Deployment Architecture
Agent-based and agentless
Agent-based with limited support for network scanning
Scanning Technique
* Published by Tenable Research
Tenable versus Microsoft:
Featured