back to top

Trending Content:

Cursor: Is This The Way forward for Coding… – AI

Within the ever-evolving panorama of synthetic intelligence (AI) and...

Tenable vs Symantec for Steady Safety | Cybersecurity

Efficient cybersecurity nowadays is a posh and multifaceted affair involving a myriad of approaches: intrusion detection/prevention, vulnerability detection, malware mitigation, safety configuration administration (SCM), safety info and occasion administration (SIEM), patch administration, file integrity monitoring (FIM), and extra. For many organizations, nevertheless, the shortest path of least resistance means deploying a consolidated platform combining a multitude of those approaches. Tenable SecurityCenter Steady View (CV) and Symantec Endpoint Safety are two such choices.

A mixture of those mechanisms—on prime of conventional endpoint and perimeter safety units (e.g., firewalls, IDPS)—is critical to fend off more and more subtle cyber assaults. That stated, no panacea exists for cybercrime; actually, main IT safety distributors have additionally come into the crosshairs of attackers as of late. Moreover, all software program is intrinsically vulnerable to flaws and safety gaps, even safety merchandise. Maintain this in thoughts as we examine these two merchandise—on the finish of the day, companies most certainly to rebound from inevitable knowledge breaches are those which can be most resilient—not essentially these with the very best/most safety mechanisms in place.

Tenable

Most generally recognized for its free Nessus vulnerability scanner, Tenable and its flagship SecurityCenter CV are well-liked amongst enterprises for vulnerability administration and safety analytics.

The Tenable interface. Supply: Tenable Community Safety / YouTube.com.

Safety occasions and knowledge could be seen and managed by means of the platform’s pre-built, customizable dashboards and experiences. Moreover, SecurityCenter CV affords steady visibility, superior analytics, real-time metrics, and steady compliance, amongst others.

Symantec

Symantec Endpoint Safety combines 5 layers of safety: community risk safety and a rule-based firewall, signature-based antivirus and superior file heuristics, status scoring, AI-powered zero-day safety, and superior persistent threats mitigation and malware removing—all managed by means of a single interface. 

Risk_log_Exception.jpgThe Symantec Endpoint Safety UI. Supply: help.symantec.com.

The platform makes use of knowledge gleaned from the monitoring, analyzing, and processing of greater than 10 trillion safety occasions per 12 months worldwide—its so-called World Intelligence Community (GIN). By utilizing GIN to determine recordsdata to be scanned, Symantec Endpoint Safety eliminates and deduplicates superfluous jobs for smarter, sooner safety.

Facet-by-Facet Scoring: Tenable vs. Symantec1. Functionality Set

Each SecurityCenter CV and Symantec Endpoint Safety mix a number of parts of safety into one safety platform. Symantec’s platform embrace sturdy options like malware removing and antivirus whereas Tenable SecurityCenter CV’s Nessus vulnerability scanner and superior safety analytics are its sturdy factors.

2. Ease of Use

Tenable SecurityCenter CV’s HTML5 front-end feels patently fashionable and intuitive with well-laid out navigation parts and dashboards. In distinction, Symantec’s interface appears dated; regardless of this, the platform is nonetheless trivial to realize proficiency with.

3. Neighborhood Help

Tenable’s Nessus was beforehand an open supply mission—and continues to be a well-liked vulnerability scanners with a large neighborhood of supporters. Symantec additionally has a substantial base of neighborhood supporters, due largely to its longstanding position as a number one international cybersecurity vendor.

4. Launch Price

Tenable SecurityCenter is on model 5.3.2 whereas its Nessus Vulnerability Scanner is presently at model 6.7, with each seeing releases and updates frequently. Curiously, Symantec Endpoint Safety has been at model 12.1 since 2011.

5. Pricing and Help

Tenable SecurityCenter prices upwards of over $20,000 sans annual upkeep—not precisely a drop within the bucket for price-conscious organizations. Symantec Endpoint Safety prices considerably much less: ~$499 for as much as 25 customers. Enterprise pricing is out there on request.

Each present premium cellphone and internet help, although Symantec’s high quality of help falls brief. Tenable affords extra custom-made onsite help choices in addition to a spread {of professional} providers to enhance its flagship providing.

6. API and Extensibility

Like most fashionable software program functions, Tenable SecurityCenter gives a REST API for customized integrations. Symantec Endpoint Safety comes with a set of restricted public internet service APIs for distant monitoring and administration (RMM) functions.

7. third Social gathering Integrations

Tenable contains a myriad of integrations with well-liked distributors like Cisco, Salesforce. and Airwatch, to call a couple of. In distinction, customized third get together integrations with Symantec are potential however restricted.

8. Corporations that Use It

Each Tenable and Symantec have sizable person bases and rely most of the world’s most recognizable international manufacturers as their prospects. The truth is, Tenable has over a million customers and over 20,000 enterprise prospects worldwide: the U.S. Division of Protection, Deloitte, Visa, BMW, Adidas, and Microsoft, to call a couple of. A few of Symantec’s marquee prospects embrace Acer, ING, eBay, the Metropolis of London, and Carnegie Company.

9. Studying Curve

Each safety platforms have comparatively easy studying curves; that stated, Tenable’s answer is extra in step with the expectations of up to date customers.

Scoreboard and Abstract

 
Tenable
Symantec

Functionality set
5/5 
5/5

Ease of use 
4/5 
3/5 

Neighborhood help 
5/5 
5/5 

Launch charge 
5/5 
3/5 

Pricing and help 
3/5 
2/5 

API and extensibility 
5/5 
3/5 

third get together integrations 
5/5 
1/5 

Corporations that use it 
5/5 
5/5 

Studying curve 
4/5 
4/5 

Complete
4.6/5
3.4/5

You will have heard about Symantec’s latest, sweeping fiasco involving the invention of essential bugs throughout its product line. All in all, safety flaws in 25 of its merchandise, together with varied Norton-branded options and its flagship safety platform Symantec Endpoint Safety had been discovered to be weak, placing thousands and thousands in danger. Potential Symantec prospects ought to actually take this into consideration, as they might probably fall sufferer to self-replicating assaults designed to sabotage their computer systems.

Bug/vulnerabilities apart, each Symantec Endpoint Safety and Tenable SecurityCenter CV are well-liked choices for steady safety. Tenable affords superior safety analytics and a well-liked battle-tested vulnerability scanner however its excessive price ticket make it extra of an enterprise-oriented answer. Symantec Endpoint Safety’s low price interprets to extra particular person and SMB prospects, however it lacks attributes subtle customers would anticipate from a contemporary software program suite.

Latest

Chef vs Puppet | Cybersecurity

Puppet and Chef have each developed considerably—suffice to say,...

How you can Enhance MySQL Safety: Prime 11 Methods | Cybersecurity

Within the pantheon of open supply heavyweights, few applied...

What’s Social Engineering? Definition + Assault Examples | Cybersecurity

Social Engineering, within the context of cybersecurity, is the...

5 Issues You Have to Know About Third-Celebration Danger in 2024 | Cybersecurity

It is now not sufficient to easily be certain...

Newsletter

spot_img

Don't miss

What’s Fourth-Social gathering Danger Administration (FPRM)? | Cybersecurity

Fourth-party danger administration is the method of figuring out,...

PCB ‘postpones’ first-class Quaid-e-Azam Trophy

Karachi Whites throughout the closing of the Quaid-e-Azam Trophy...

Vendor Publish-Knowledge Breach Questionnaire (Free Template) | Cybersecurity

A post-data breach questionnaire is important for evaluating the...
spot_imgspot_img

What’s Spear Phishing? | Cybersecurity

Spear phishers search for goal who may lead to monetary acquire or publicity of commerce secrets and techniques for company espionage, personally identifiable info (PII) for identification...

Chef vs Puppet | Cybersecurity

Puppet and Chef have each developed considerably—suffice to say, we’re lengthy overdue in revisiting these two heavy-hitters. On this article we’ll take a recent...

How you can Enhance MySQL Safety: Prime 11 Methods | Cybersecurity

Within the pantheon of open supply heavyweights, few applied sciences are as ubiquitous because the MySQL RDBMS. Integral to standard software program packages like...

LEAVE A REPLY

Please enter your comment!
Please enter your name here