Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Wiz Reviews & Ratings
    1,059 Ratings
    Company Website
  • Astra Pentest Reviews & Ratings
    209 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    13 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    103 Ratings
    Company Website
  • Resolver Reviews & Ratings
    262 Ratings
    Company Website
  • Action1 Reviews & Ratings
    634 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,098 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • NetBrain Reviews & Ratings
    148 Ratings
    Company Website
  • Carbide Reviews & Ratings
    88 Ratings
    Company Website

What is Tenable Vulnerability Management?

The groundbreaking solution that led the way in this field is dedicated to improving corporate defenses against major cyber threats that heighten business risks. Utilize the top-tier vulnerability management platform available to pinpoint and address your cybersecurity weaknesses. Gain thorough insight into the critical vulnerabilities lurking within your IT framework. Quickly identify high-priority risks that are likely to be exploited and could result in significant business impacts. Implement timely and effective strategies to tackle urgent vulnerabilities and execute necessary corrective actions. Uncover hidden weaknesses through ongoing and proactive assessments of both known and unknown components in your environment, including dynamic cloud resources and tools for a remote workforce. Analyze, contextualize, and react to vulnerabilities by utilizing the comprehensive data and insights provided by Tenable Research. With automated prioritization that integrates vulnerability data, threat intelligence, and advanced analytics, prioritize which vulnerabilities require immediate attention, ensuring a more calculated approach to cybersecurity. By proactively managing potential threats, organizations can enhance the protection of their assets and preserve their operational integrity, ultimately fostering a more resilient business environment. This commitment to continuous improvement is essential in an ever-evolving digital landscape.

What is NorthStar Navigator?

NorthStar empowers organizations to seamlessly integrate threat intelligence and business insights, facilitating a risk-oriented strategy for their vulnerability management initiatives. The platform streamlines the gathering, standardization, unification, and analysis of data related to threats, assets, software, and vulnerabilities. By utilizing a clear scoring system, NorthStar eliminates the cumbersome and manual task of determining the priority for addressing vulnerabilities, thus enhancing overall efficiency. This innovative approach not only saves time but also ensures that resources are allocated effectively to mitigate risks.

Media

Media

Integrations Supported

AT&T Alien Labs Open Threat Exchange
Aloha EPOS
Bugcrowd
Burp Suite
Cisco Catalyst Center
Criminal IP
Cybereason
CylanceENDPOINT
HCL BigFix
IBM Tivoli Monitoring
Nexpose
Palo Alto Networks AutoFocus
Rapid7 Managed Threat Complete
ServiceNow Asset Management
ServiceNow Configuration Management Database
Sophos Cloud Optix
Symantec Data Center Security
Trellix Helix Connect
Veracode

Integrations Supported

AT&T Alien Labs Open Threat Exchange
Aloha EPOS
Bugcrowd
Burp Suite
Cisco Catalyst Center
Criminal IP
Cybereason
CylanceENDPOINT
HCL BigFix
IBM Tivoli Monitoring
Nexpose
Palo Alto Networks AutoFocus
Rapid7 Managed Threat Complete
ServiceNow Asset Management
ServiceNow Configuration Management Database
Sophos Cloud Optix
Symantec Data Center Security
Trellix Helix Connect
Veracode

API Availability

Has API

API Availability

Has API

Pricing Information

$4,399.05 per year
Free Trial Offered?
Free Version

Pricing Information

$8 per device
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Tenable

Company Location

United States

Company Website

www.tenable.com/products/vulnerability-management

Company Facts

Organization Name

NorthStar.io, Inc.

Date Founded

2006

Company Location

United States

Company Website

northstar.io

Categories and Features

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Categories and Features

Asset Tracking

Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History

CMDB

Change Management
Configuration Management
Data Visualization
Device Auto Discovery
IT Asset Management
Impact Management
License Management
Performance Management
Relationship Mapping

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Popular Alternatives

Invicti Reviews & Ratings

Invicti

Invicti Security
Tenable One Reviews & Ratings

Tenable One

Tenable
SanerNow Reviews & Ratings

SanerNow

SecPod Technologies