App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Webroot Business Endpoint Protection vs Nessus Comparison

Add to Compare

Compare similar apps

Keeper Business logo

Keeper Business

4.7

SentinelOne logo

SentinelOne

4.7

Splunk Enterprise logo

Splunk Enterprise

4.6

Netwrix Auditor logo

Netwrix Auditor

4.5

Web.com logo

Web.com

2.8

Orca Security logo

Orca Security

4.8

Good recommendations?

Overview

Category Leaders

Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

Pricing

Starting from

150

/user

Per year

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

Starting from

4000.20

One-time payment

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

User reviews

4.5

203

5

4

3

2

1

141

40

13

4

5

  • Value for money
  • Ease of use
  • Features
  • Customer support
93%
would recommend this app

4.7

67

5

4

3

2

1

47

19

1

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

I like that it is keeping my systems secure and detecting any problems. It is affordable and easy to use.
By far the easiest endpoint solution for our needs. Setup was a breeze to roll out to our endusers! everyone was able to remotely install client by the click of a link and that is awesome.
Almost everyone I suggested Webroot to bought & installed it, they were quite impressed at how much better their computers & other devices ran so much smoother.

Pros

You can be up and running in just a few minutes, and the ability to have recurring scans is a great way for this product to help you with your security program.
Is a great product to scan systems for vulnerabilities, nice GUI and easy to manage. Customer support has also been great to us.
There are plugins for every vulnerability, and it can scan either credentialed or uncredentialed. It is very easy to use, and generates really good reports and provides good feedback.

Cons

Our experience with Webroot has been one of the worst that I have ever experienced. Their customer service is absolutely terrible.
It is hard for me to find something wrong with this software.
Worst Customer Service I have ever encountered.

Cons

The vulnerability scanner is not totally accurate in some situations and some results must be checked to verify the vulnerability.
The software can be difficult to use sometimes and it doesn't always scan with the credentials needed to have compliant scans.
The most perceptive Vulnerability Scanning Software.
  • Vendor responds to reviews
  • Last reviewa month ago
  • Vendor responds to reviews
  • Last review7 days ago

Key features

  • Total features24
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Assessment Management
  • Asset Discovery
  • Behavioral Analytics
  • Compliance Management
  • Data Security
  • Device Management
  • Endpoint Management
  • Endpoint Protection
  • Firewalls
  • IOC Verification
  • Monitoring
  • Network Scanning
  • Network Security
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Analytics
  • Risk Assessment
  • Runtime Container Security
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • VPN
  • Vulnerability / Threat Prioritization
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Web-Application Security
  • Website Crawling
  • Whitelisting/Blacklisting
  • Total features32
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Assessment Management
  • Asset Discovery
  • Behavioral Analytics
  • Compliance Management
  • Data Security
  • Device Management
  • Endpoint Management
  • Endpoint Protection
  • Firewalls
  • IOC Verification
  • Monitoring
  • Network Scanning
  • Network Security
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Analytics
  • Risk Assessment
  • Runtime Container Security
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • VPN
  • Vulnerability / Threat Prioritization
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Web-Application Security
  • Website Crawling
  • Whitelisting/Blacklisting

Integrations

  • Total integrations16
  • Azure Active Directory
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft SharePoint
  • Microsoft Teams
  • Okta
  • OneLogin
  • ServiceNow
  • Slack
  • Splunk Enterprise
  • WordPress
  • Zendesk Suite
  • Total integrations10
  • Azure Active Directory
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft SharePoint
  • Microsoft Teams
  • Okta
  • OneLogin
  • ServiceNow
  • Slack
  • Splunk Enterprise
  • WordPress
  • Zendesk Suite

User reviews that mention these apps

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend9/10

Share this review:

Nessus logo

Nessus

Best tool in the market for Vulnerability scanning

Reviewed 4 years ago

It is very much efficient than any other tools offered by the competitors in scanning. Overall Value for money solution for VA scans in enterprise

Pros

It has up to date plugins to scan latest vulnerabilities or malwares are in the market. Plugins are updated every week to cover latest vulnerabilities. It can scan the scope system based on various standards like PCI DSS and HIPAA which other scanners in the market don't have. It performs credentials scans which other scanners like Qualys,Openvas doesn’t offer.

Cons

Nessus doesn’t detect any active protection on scope system which can block the credential scan. It cannot scan device if the 2FA is implemented on the scope system.

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend9/10

Share this review:

Nessus logo

Nessus

Great vulnerability assessment tool

Reviewed 4 years ago

Very good tool to perform vulnerability assessment for home users to business users.

Pros

It supports from simple host discovery scans to detailed vulnerability scans like malware scan, credential path audit. This tool can also perform scan to test the latest vulnerabilities like Meltdown and Spectre and WannaCry ransomware etc. This vulnerability scanner has almost up-to-date plugins. The plugins are updated almost daily to weekly to scan the latest vulnerabilities in the market. Nessus...

Cons

The professional version of this tool is very costly. It yet doesn’t support credential based scan for machines which have 2 factor authentication implemented on it.