We performed a comparison between Tenable.io Container Security and SUSE NeuVector based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at analyzing vulnerabilities and identifying misconfiguration. SUSE NeuVector is praised for its wide range of features, informative user interface, ISO certification checks, and automation capabilities. Tenable.io could improve by automating remediation and CIS benchmarks while enhancing asset visibility and implementing customizable compliance options. SUSE NeuVector needs to expand scanning support and work on monitoring, reporting, and integration.
Service and Support: Some users encountered technical issues when contacting Tenable.io support. SUSE NeuVector's support is praised for being supportive, prompt, and well-informed, although a few reviewers consider the process to be complex.
Ease of Deployment: Tenable.io Container Security comes with clear setup documentation, making the deployment process smooth. Some reviewers think setting up SUSE NeuVector is straightforward, while others find it complex and challenging. Integrating SUSE NeuVector with pipelines is particularly difficult, often requiring the use of custom scripts.
Pricing: Tenable.io Container Security's setup cost is determined by the application's page count. The pricing and licensing experiences of SUSE NeuVector users vary, with some considering it affordable and others indicating a need for improvement.
ROI: Tenable.io Container Security users have provided no feedback on ROI so far. SUSE NeuVector provides the largest ROI for high-risk sectors such as financial services, although its benefits may be limited for some sectors, such as retail.
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"We noted immediate benefits from using the solution."
"The visibility is the best part of the solution."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"The remediation process is good."
"When it comes to the price, we got a really good deal from the vendor instantly."
"The most valuable feature of SUSE NeuVector is the performance, deployment, and cost."
"The tool's deployment is simple. Also, I am impressed with its risk capabilities."
"The UI has a lot of features."
"The most valuable feature of SUSE NeuVector is its run-time security."
"The initial setup is quite good, it's straightforward."
"The features of image scanning and anti-malware are really valuable."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"Nessus scanner is very effective for internal penetration testing."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"The strong security provided by the product in the container environment is its most valuable feature."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"When you find a vulnerability and resolve it, the same issue will not occur again. I want PingSafe to block the same vulnerability from appearing again. I want something like a playbook where the steps that we take to resolve an issue are repeated when that issue happens again."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"Customized queries should be made easier to improve PingSafe."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"A beneficial improvement for PingSafe would be integration with Jira, allowing for a more streamlined ticketing system."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"While it is good, I think the solution's console could be improved."
"The documentation needs to improve a bit."
"SUSE NeuVector could improve by increasing its visibility into other elements of the DevSecOps pipeline. Additionally, scanning around infrastructure would be helpful."
"The tool should offer seamless integration of other security tools while in a hybrid environment."
"The image-scanning features need improvement."
"We are also working with IaaS VMS, but NeuVector doesn't support virtual machines."
"SUSE NeuVector should provide more security protection rules and better container image scanning."
"I would say that this solution should improve monitoring and reporting. I would also like to see more integrations so that we could essentially make it a part of a developing pipeline."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"The initial setup is highly complex."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
SUSE NeuVector is ranked 20th in Container Security with 7 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. SUSE NeuVector is rated 7.8, while Tenable.io Container Security is rated 7.8. The top reviewer of SUSE NeuVector writes "Good value for money; great for policy management". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". SUSE NeuVector is most compared with Sysdig Falco, Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Red Hat Advanced Cluster Security for Kubernetes and SUSE Rancher, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and Sysdig Secure. See our SUSE NeuVector vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.