We performed a comparison between Tenable.io Container Security and SUSE NeuVector based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at analyzing vulnerabilities and identifying misconfiguration. SUSE NeuVector is praised for its wide range of features, informative user interface, ISO certification checks, and automation capabilities. Tenable.io could improve by automating remediation and CIS benchmarks while enhancing asset visibility and implementing customizable compliance options. SUSE NeuVector needs to expand scanning support and work on monitoring, reporting, and integration.
Service and Support: Some users encountered technical issues when contacting Tenable.io support. SUSE NeuVector's support is praised for being supportive, prompt, and well-informed, although a few reviewers consider the process to be complex.
Ease of Deployment: Tenable.io Container Security comes with clear setup documentation, making the deployment process smooth. Some reviewers think setting up SUSE NeuVector is straightforward, while others find it complex and challenging. Integrating SUSE NeuVector with pipelines is particularly difficult, often requiring the use of custom scripts.
Pricing: Tenable.io Container Security's setup cost is determined by the application's page count. The pricing and licensing experiences of SUSE NeuVector users vary, with some considering it affordable and others indicating a need for improvement.
ROI: Tenable.io Container Security users have provided no feedback on ROI so far. SUSE NeuVector provides the largest ROI for high-risk sectors such as financial services, although its benefits may be limited for some sectors, such as retail.
"The agentless vulnerability scanning is great."
"It's helped free up staff time so that they can work on other projects."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"The solution is a good alerting tool."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"The initial setup is quite good, it's straightforward."
"The features of image scanning and anti-malware are really valuable."
"The tool's deployment is simple. Also, I am impressed with its risk capabilities."
"The most valuable feature of SUSE NeuVector is the performance, deployment, and cost."
"The UI has a lot of features."
"When it comes to the price, we got a really good deal from the vendor instantly."
"The most valuable feature of SUSE NeuVector is its run-time security."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"The strong security provided by the product in the container environment is its most valuable feature."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Nessus scanner is very effective for internal penetration testing."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Sometimes the Storyline ID is a bit wacky."
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"Bugs need to be disclosed quickly."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"There is room for improvement in the current active licensing model for PingSafe."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
"I would say that this solution should improve monitoring and reporting. I would also like to see more integrations so that we could essentially make it a part of a developing pipeline."
"SUSE NeuVector should provide more security protection rules and better container image scanning."
"The documentation needs to improve a bit."
"We are also working with IaaS VMS, but NeuVector doesn't support virtual machines."
"The tool should offer seamless integration of other security tools while in a hybrid environment."
"The image-scanning features need improvement."
"SUSE NeuVector could improve by increasing its visibility into other elements of the DevSecOps pipeline. Additionally, scanning around infrastructure would be helpful."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The initial setup is highly complex."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
SUSE NeuVector is ranked 20th in Container Security with 7 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. SUSE NeuVector is rated 7.8, while Tenable.io Container Security is rated 7.8. The top reviewer of SUSE NeuVector writes "Good value for money; great for policy management". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". SUSE NeuVector is most compared with Sysdig Falco, Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Red Hat Advanced Cluster Security for Kubernetes and SUSE Rancher, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and Sysdig Secure. See our SUSE NeuVector vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.