We performed a comparison between Tenable.io Container Security and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Container Security."The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"The management console is highly intuitive to comprehend and operate."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"The management console is the most valuable feature."
"PingSafe offers comprehensive security posture management."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"The strong security provided by the product in the container environment is its most valuable feature."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"Nessus scanner is very effective for internal penetration testing."
"It's easy to use and the interface is simple."
"Signatures are frequently updated."
"Deep Security's most valuable features are antivirus and host intrusion detection."
"There's useful monitoring on offer."
"The initial setup was straightforward and we didn't have any problem with it."
"There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime."
"Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
"The initial setup was straightforward."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"I would like additional integrations."
"We don't get any notifications from PingSafe when the clusters are down."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"Maybe container runtime security could be improved."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"The initial setup is highly complex."
"If I had more reporting, the product would be an A plus."
"I would like to see better pricing. The pricing could be lower."
"We want to see improved authentication."
"There is room for improvement with Trend Micro Deep Security, as there are instances where installations may need to be redone. There seem to be glitches when working with older Windows servers, such as those from 2003 or 2005, requiring us to uninstall and reinstall the product to resolve the issue."
"I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did."
"I would like them to add EDR features, moving away from traditional signature-based anti-malware."
"What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."
"They are still working on the company integration from TippingPoint because this was a recent acquisition from a few years ago. So, a Tipping Point integration with Deep Security, having one single pane of glass dashboard, would provide us a simple use case."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Tenable.io Container Security is ranked 21st in Container Security with 7 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 81 reviews. Tenable.io Container Security is rated 7.8, while Trend Micro Deep Security is rated 8.6. The top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". On the other hand, the top reviewer of Trend Micro Deep Security writes "High availability, effective VPM, and responsive support". Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and Red Hat Advanced Cluster Security for Kubernetes, whereas Trend Micro Deep Security is most compared with Trend Vision One Endpoint Security, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.