We performed a comparison between Tenable.io Container Security and Prisma Cloud by Palo Alto Networks based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at identifying vulnerabilities and resolving deployment misconfigurations. Prisma Cloud provides extensive visibility, robust management options, and a diverse set of security functionalities for multi-cloud and hybrid-cloud environments. Tenable.io Container Security needs enhancements in auto-remediation, asset visibility, and compliance customization. Prisma Cloud requires improvements in dashboards, query building, correlation, and automation.
Service and Support: Customers have experienced difficulties with Tenable's customer service and support. Some customers said Palo Alto provided excellent, helpful, and responsive support. However, a few customers were dissatisfied with slow response times and a lack of satisfactory resolutions.
Ease of Deployment: The setup process for Tenable.io Container Security is considered straightforward with the support of helpful guidebooks. Reviewers had varied experiences when setting up Prisma Cloud. They said it can be easy or challenging depending on the organization's requirements. It typically takes users one or two weeks to deploy Tenable.io, while the deployment time for Prisma Cloud depends on the complexity of the environment.
Pricing: The cost of Tenable.io Container Security is determined by the number of pages in the application. Some users said that Prisma Cloud is reasonably and competitively priced, while others view it as expensive but essential for the benefits it offers.
ROI: Prisma Cloud by Palo Alto Networks has demonstrated its effectiveness in preventing breaches, enhancing risk understanding, and decreasing security expenses. Users offered limited feedback on Tenable's ROI.
Comparison Results: Prisma Cloud by Palo Alto Networks is the preferred choice over Tenable.io Container Security. Prisma Cloud offers extensive visibility and management features. Users like Prisma Cloud's powerful anomaly detection, integration, and coverage of multi-cloud and hybrid environments. Prisma Cloud stands out due to its easy configuration, integration with DevSecOps pipelines, and comprehensive security capabilities.
"The cloud misconfiguration is the most valuable feature."
"With PingSafe, it's easy to onboard new accounts."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"It provides insights into potential vulnerabilities in our code, helping us identify and rectify issues before they can be exploited."
"Cloud security posture management is the preferred feature among other vendors."
"Technical support is quite helpful."
"As a pure-play CSPM, it is pretty good. From the data exposure perspective, Prisma Cloud does a fairly good job. Purely from the perspective of reading the conflicts, it is able to highlight any data exposures that I might be having."
"The most valuable feature is the continuous cloud compliance monitoring and alerting."
"Its ease of integration is valuable because we need to get the solution out of the door quickly, so speed and ease matter."
"Prisma Cloud provides the needed visibility and control regardless of how complex and distributed the cloud environments become."
"The runtime mechanism on the solution is very useful. It's got very good network mapping between containers. If you have more than one container, you can create a content data link between them."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"Nessus scanner is very effective for internal penetration testing."
"The strong security provided by the product in the container environment is its most valuable feature."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"Maybe container runtime security could be improved."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"There are hundreds of built-in policies for AWS and Azure, but GCP and Oracle are not covered as much as AWS. There is a lot of work to do on that part. There is, obviously, a tiny bit of favoritism towards AWS because it has the most market share."
"Currently, custom reports are available, but I feel that those reports are targeting just the L1 or L2 engineers because they are very verbose. So, for every alert, there is a proper description, but as a security posture management portal, Prisma Cloud should give me a dashboard that I can present to my stakeholders, such as CSO, CRO, or CTO. It should be at a little bit higher level. They should definitely put effort into reporting because the reporting does not reflect the requirements of a dashboard for your stakeholders. There are a couple of things that are present on the portal, but we don't have the option to customize dashboards or widgets. There are a limited set of widgets, and those widgets don't add value from the perspective of a security team or any professional who is above L1 or L2 level. Because of this, the reach of Prisma Cloud in an organization or the access to Prisma Cloud will be limited only to L1 and L2 engineers. This is something that their development team should look into."
"I have some challenges customizing and personalizing some of the capabilities in the CSPM in terms of new policies and services. We have to reconfigure and rebuild the CSPM."
"They could improve more features for the enterprise version of the solution."
"The innovation side of the solution could be more efficient and more detailed."
"The deployment and onboarding are plug-and-play, but somewhat hard to handle in terms of integration with external operations tools. The product design isn't up to the current standard. I would recommend having higher standards in terms of integration with other tools, especially operationalized tools."
"They should improve the user experience."
"Some of the usability within the Compute functionality needs improvement. I think when Palo Alto added on the Twistlock functionality, they added a Compute tab on the left side of the navigation. Some of the navigation is just a little dense. There is a lot of navigation where there is a tab and dropdowns. So, just improving some of the navigation where there is just a very dense amount of buttons and drop-down menus, that is probably the only thing, which comes from having a lot of features. Because there are a lot of buttons, just navigating around the platform can be a little challenging for new users."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The initial setup is highly complex."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Prisma Cloud by Palo Alto Networks is ranked 1st in Container Security with 82 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Prisma Cloud by Palo Alto Networks is rated 8.4, while Tenable.io Container Security is rated 7.8. The top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Prisma Cloud by Palo Alto Networks is most compared with Wiz, Microsoft Defender for Cloud, Aqua Cloud Security Platform, AWS Security Hub and F5 Advanced WAF, whereas Tenable.io Container Security is most compared with Aqua Cloud Security Platform, Wiz, Trivy, Red Hat Advanced Cluster Security for Kubernetes and SUSE NeuVector. See our Prisma Cloud by Palo Alto Networks vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.