We performed a comparison between Tenable.io Container Security and Red Hat Advanced Cluster Security for Kubernetes based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at analyzing vulnerabilities and identifying misconfiguration. Red Hat Advanced Cluster Security for Kubernetes receives praise for its resource-sharing capabilities, segmentation, reliable performance, and user-friendly web interface. Tenable.io could improve by automating remediation and CIS benchmarks while enhancing asset visibility and implementing customizable compliance options. Red Hat Advanced Cluster Security for Kubernetes could improve by enhancing testing capabilities, making command line and configuration processes easier, and incorporating zero trust and access control measures.
Service and Support: Some users encountered technical issues when contacting Tenable.io support. Customers using Red Hat Advanced Cluster Security for Kubernetes gave feedback and regard the support they receive as being of high quality.
Ease of Deployment: Tenable.io Container Security comes with clear setup documentation, making the deployment process smooth. Red Hat Advanced Cluster Security for Kubernetes requires considerable time and effort to deploy due to its complex configuration process.
Pricing: Tenable.io Container Security's setup cost is determined by the application's page count. Red Hat Advanced Cluster Security for Kubernetes is moderately priced and cheaper if purchased in a bundle with other Red Hat solutions.
Comparison Results: Tenable.io Container Security is preferred over Red Hat Advanced Cluster Security for Kubernetes. Tenable.io Container Security offers a smooth setup process with helpful guidebooks, quick deployment, and the ability to identify misconfigurations before going live. Red Hat Advanced Cluster Security for Kubernetes has a more complicated setup process, requires more resources for deployment, and lacks certain features offered by other solutions.
"PingSafe provides email alerts and ranks issues based on severity, such as high, critical, etc., that help us prioritize issues."
"The cloud misconfiguration is the most valuable feature."
"The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator."
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"The user-friendly dashboard offers both convenience and security by providing quick access to solutions and keeping us informed of potential threats."
"The visibility is the best part of the solution."
"We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software."
"Scalability-wise, I rate the solution a nine out of ten."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"Segmentation is the most powerful feature."
"The most valuable feature of the solution is its monitoring feature."
"The technical support is good."
"The most valuable feature is the ability to share resources."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"The strong security provided by the product in the container environment is its most valuable feature."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"Nessus scanner is very effective for internal penetration testing."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"It is a scalable solution. Scalability-wise, it is a good solution."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"The categorization of the results from the vulnerability assessment could be improved."
"The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe. This way, all the data related to security will be in one single place. Currently, we have to check a couple of things on PingSafe, and we have to validate that same data on the AWS Cloud to be sure. If they can collaborate like that, it will be great."
"The cost has the potential for improvement."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"We can customize security policies but lack auditing capabilities."
"The testing process could be improved."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The solution's price could be better."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"Red Hat is somewhat expensive."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The solution's visibility and vulnerability prevention should be improved."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The initial setup is highly complex."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Red Hat Advanced Cluster Security for Kubernetes is ranked 18th in Container Security with 10 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Red Hat Advanced Cluster Security for Kubernetes is rated 8.4, while Tenable.io Container Security is rated 7.8. The top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and CoreOS Clair, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and SUSE NeuVector. See our Red Hat Advanced Cluster Security for Kubernetes vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.