We performed a comparison between Tenable.io Container Security and Prisma Cloud by Palo Alto Networks based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at identifying vulnerabilities and resolving deployment misconfigurations. Prisma Cloud provides extensive visibility, robust management options, and a diverse set of security functionalities for multi-cloud and hybrid-cloud environments. Tenable.io Container Security needs enhancements in auto-remediation, asset visibility, and compliance customization. Prisma Cloud requires improvements in dashboards, query building, correlation, and automation.
Service and Support: Customers have experienced difficulties with Tenable's customer service and support. Some customers said Palo Alto provided excellent, helpful, and responsive support. However, a few customers were dissatisfied with slow response times and a lack of satisfactory resolutions.
Ease of Deployment: The setup process for Tenable.io Container Security is considered straightforward with the support of helpful guidebooks. Reviewers had varied experiences when setting up Prisma Cloud. They said it can be easy or challenging depending on the organization's requirements. It typically takes users one or two weeks to deploy Tenable.io, while the deployment time for Prisma Cloud depends on the complexity of the environment.
Pricing: The cost of Tenable.io Container Security is determined by the number of pages in the application. Some users said that Prisma Cloud is reasonably and competitively priced, while others view it as expensive but essential for the benefits it offers.
ROI: Prisma Cloud by Palo Alto Networks has demonstrated its effectiveness in preventing breaches, enhancing risk understanding, and decreasing security expenses. Users offered limited feedback on Tenable's ROI.
Comparison Results: Prisma Cloud by Palo Alto Networks is the preferred choice over Tenable.io Container Security. Prisma Cloud offers extensive visibility and management features. Users like Prisma Cloud's powerful anomaly detection, integration, and coverage of multi-cloud and hybrid environments. Prisma Cloud stands out due to its easy configuration, integration with DevSecOps pipelines, and comprehensive security capabilities.
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
"We use the infrastructure as code scanning, which is good."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"As a frequently audited company, we value PingSafe's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"I found the network queue sets useful. I also liked the Workload Protection Module, the vulnerability findings, and how the rule sets handle the vulnerabilities based on severity."
"Technical support is quite helpful."
"The ability to monitor the artifact repository is one of the most valuable features because we have a disparate set of development processes, but everything tends to land in a common set of artifact repositories. The solution gives us a single point where we can apply security control for monitoring. That's really helpful."
"The most valuable feature is the continuous cloud compliance monitoring and alerting."
"The application visibility is amazing. For example, sometimes we don't know what a particular custom port is for and what is running on it. The visibility enables us to identify applications, what the protocol is, and what service is behind it. Within Azure, it is doing a great job of providing visibility. We know exactly what is passing through our network. If there is an issue of any sort we are able to quickly detect it and fix the problem."
"What I like most about Prisma Cloud is its zero-day signatures, maximum security, minimal downtime, cloud visibility, control, and ease of deployment."
"Most of the customers we are tackling have different tools and solutions, like Qualys, Nessus, and vulnerability management assessment solutions. There are plugins for them, and we can integrate Prisma Cloud with them. We can enrich our telemetry with their data and use the predefined correlation rules in Prisma Cloud. That means we have that work done in seconds."
"The client wasn't using all of the features, but the one that stood out was infrastructure-as-code (IaC). I built IaC use cases and was trying to get them to use it. I also liked cloud workload protection. I worked with the vulnerability management team to develop a process. It's a manual process, so it can be challenging to remediate many image or container issues. It was nice that we could build out a reporting process and download the reports. The reports are solid."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Nessus scanner is very effective for internal penetration testing."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"The strong security provided by the product in the container environment is its most valuable feature."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"When we get a new finding from PingSafe, I wish we could get an alert in the console, so we can work on it before we see it in the report. It would be very useful for the team that is actively working on the PingSafe platform, so we can close the issue the same day before it appears in the daily report."
"We use PingSafe and also SentinelOne. If PingSafe integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"PingSafe can improve by eliminating 100 percent of the false positives."
"While it is good, I think the solution's console could be improved."
"PingSafe is an excellent CSPM tool, but the CWPP features need to improve, and there is a scope for more application security posture management features. There aren't many ASPM solutions on the market, and existing ones are costly. I would like to see PingSafe develop into a single pane of glass for ASPM, CSPM, and CWPP. Another feature I'd like to see is runtime protection."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"There's room for improvement in the graphic explorer."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"In terms of securing cloud-native development at build time, a lot of improvement is needed. Currently, it's more a runtime solution than a build-time solution. For runtime, I would rate it at seven out of 10, but for build-time there is a lot of work to be done."
"It can be too expensive for small companies."
"Getting new guys trained on using the solution requires some thought. If someone is already trained on Palo Alto then he's able to adapt quickly. But, if someone is coming from another platform such as Fortinet, or maybe he's from the system side, that is where we need some help. We need to find out if there is an online track or training that they can go to."
"The solution does not currently support servers for GCP."
"I have some challenges customizing and personalizing some of the capabilities in the CSPM in terms of new policies and services. We have to reconfigure and rebuild the CSPM."
"They need to improve the API gateway."
"We would like it to have more features from the risk and compliance perspectives."
"They need to make the settings more flexible to fit our internal policies about data. We didn't want developers to see some data, but we wanted them to have access to the console because it was going to help them... It was a pain to have to set up the access to some languages and some data."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The initial setup is highly complex."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Prisma Cloud by Palo Alto Networks is ranked 1st in Container Security with 82 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Prisma Cloud by Palo Alto Networks is rated 8.4, while Tenable.io Container Security is rated 7.8. The top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Prisma Cloud by Palo Alto Networks is most compared with Wiz, Microsoft Defender for Cloud, Aqua Cloud Security Platform, AWS Security Hub and Qualys VMDR, whereas Tenable.io Container Security is most compared with Aqua Cloud Security Platform, Wiz, Trivy, Red Hat Advanced Cluster Security for Kubernetes and Sysdig Secure. See our Prisma Cloud by Palo Alto Networks vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.