Automox is an endpoint management solution used to keep desktops, laptops, and servers updated and ready for users anywhere in the world. Using automation, IT can fix critical vulnerabilities and boost user productivity.
$1
per month per endpoint
Tenable Nessus
Score 8.8 out of 10
N/A
Tenable headquartered in Columbia offers Nessus, a vulnerability scanning and security assessment solution used to analyze an entity's security posture, vulnerability testing, and provide configuration assessments.
$2,790
Pricing
Automox
Tenable Nessus
Editions & Modules
No answers on this topic
1 Year
$2,790.00
1 Year + Advanced Support
$3,190.00
2 Years
$5,440.00
2 Years + Advanced Support
$6,240.00
3 Years
$7,951.00
3 Years + Advanced Support
$9,151.00
Offerings
Pricing Offerings
Automox
Tenable Nessus
Free Trial
Yes
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Automox can patch macOS, Windows, and Linux endpoints with PatchOS, an offering at $1 per endpoint/ month with an annual commitment.
The Automate Essentials or Automate Enterprise packages are for scaling IT automation, endpoint configuration, and software updates.
Modules are available with Automox Assist, a one-on-one remote endpoint control and assistance for helpdesk technicians.
—
More Pricing Information
Community Pulse
Automox
Tenable Nessus
Considered Both Products
Automox
Verified User
Director
Chose Automox
Automox requires no server installation or maintenance. Pricing is competitive. It is cloud-based with a high level of uptime. I would recommend it to mid-sized businesses with a number of remote locations and different operating systems. It is simple to use and requires no …
Smaller organisations such as ourselves, who have outgrown their MSP but still need to retain control of their system and have visibility of the estate. The tool enables us to have real-time visibility and deploy or remediate as needed. We have also purchased Rapid7, which integrates natively into the product, making it a more powerful tool moving forward.
It is an excellent tool for scanning servers, workstations, and network devices to identify missing patches and misconfiguration; we regularly use it to confirm patch effectiveness after the update; it also helps us for preparing audits such as iso 27001, and regulatory requirements, it also helps us to identify open ports and services that violate security.
Nessus is best at performing vulnerability scans, in fact, it gives findings and moreover accurate findings of the assessments. It does not do penetration testing or exploit the vulnerabilities because it is concerned about scanning the systems/applications.
In fact, Nessus has multiple profiles/policies to perform different types of scans such as, scans oriented for PCI-DSS, malware scans, web application scans, bad shell shock detection scan to name a few.
Nessus has the ability to classify the vulnerabilities into risk-based categories from critical to even informational which I think is one of the things that separates Nessus from other vulnerability scanners.
Server patching orchestration. There is no way to patch and reboot systems in order of importance, such as database servers before application servers.
Worklets for patching .net core and similar.
Worklets for removing unwanted Java installs or other unwanted software.
Integration with Tenable Vulnerability Management.
AI script development should be included at no additional cost; GPT or Gemini can be used instead for free and pasted into Automox. Why charge when others are free?
Official worklets are slow to be added or updated.
The tool has lots of options for setting up before scanning any device, this methodology could be simplified further with default configuration for various devices predefined, anyhow we can use this technique by making use of policies.
For advanced users we cannot disable the plugins inside the plugin groups, we can enable the whole set of plugins at a time, for few hundreds its ok, but thousands of plugins are of waste of resource and time.
This is a software that just works. Once configured its a set and forget kind of tool that keeps things up to date and alerts me if something is wrong. I was able to work through an expansion project to deploy an additional 500 devices in almost no time and create a robust self-patching environment.
Nessus is best and easy to use application for Vulnerabilities finding and reporting, it has multiple platforms and wide scope covering almost all devices for security improvement so far, thus we are very likely to continue its services.
It truly functions like a single pane of glass. While our use case is for EC2 instances in AWS, it can manage endpoints across all clouds, or even deployed hardware (laptops). We do manage instances in multiple AWS accounts and there is no set up required between orgs. This accomplishes our needs for real time tracking, and historical reporting for all of our in scope resources.
Tenable Nessus is a great product and provides a lot of value, but it is difficult to set up and use and the amount of data it generates can be overwhelming. It does help us prioritize based on the severity of the detection, however there are sometimes mitigating factors that we have implemented that Nessus does not account for, which causes lots of noise in the reports.
1. Simplicity and Ease of Use 2. Cross-Platform Support 3. Powerful Automation with Worklets 4. Real-Time Visibility and Control 5. Fast and Reliable Cloud-Based Updates 6. Strong Security Focus
I haven't needed to contact support yet. But issues are easily solved with a quick internet search which means support and by extension, the larger community are involved and knowledgeable.
Implementing Automox successfully starts with a clear strategy for organizing and grouping devices based on operating systems, environments, or business criticality. This ensures that patching and configuration policies can be applied with precision. A phased rollout approach is essential—beginning with a pilot group allows teams to test patching schedules, reboot behaviors, and custom Worklets before scaling across the organization. Leveraging Worklets from the start can significantly boost automation by enforcing security baselines and performing routine system tasks. Integration with existing SOC tools, such as SIEMs, enhances visibility and response time by correlating patch compliance with threat intelligence. Additionally, aligning patching schedules with operational downtimes minimizes disruptions, and consistent monitoring and reporting helps maintain compliance and prepare for audits. Overall, Automox offers a streamlined and effective solution, but its true value is unlocked through thoughtful planning, testing, and integration with existing IT and security workflows.
All of these other products are overly complicated with user interfaces that are not very friendly.. too technical, even for IT pros. They are also expensive for smaller companies or those with limited IT budgets. I've found that these other solutions are really geared for larger enterprises more than small to midsized companies, which is fine... but then they tend to market themselves as good for everyone, when they are really not.
Sometimes when we identify a vulnerability with Nessus that has an exploit, we made a proof of concept with Metasploit in order to show to the IT managers the importance of the software/hardware hardening.
Patches are now fully up to date and we have no longer been dinged for it from our pen testing partners.
Reduced man hours spent on maintaining an update server and the hours spent looking at each machine to ensure it patched all software both windows and third party.
Allows for us to provide a vendor with a means to connect to our systems without the use of a VPN.
Nessus certainly has a positive impact while me while performing my job, either as security research, or performing vulnerability assessments for clients. It gives a lot of information about the system/application after performing scans. The number of false positives is also less compared to other vulnerability scanners.
The professional edition is very useful as policy templates available in this edition are very handy and useful even to perform compliance scan like PCI DSS scan.
Also, the ability to export the scan results into reports in formats like HTML, PDF is very useful which could be for performing system/application reviews.