We performed a comparison between Tenable.io Container Security and Snyk based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at identifying weaknesses and misconfigurations. Snyk is commended for its scanning features and ability to generate pull requests and resolve problems automatically. Tenable.io Container Security could its auto-remediation, asset visibility, and compliance system customization. Snyk could work on improving compatibility while expanding its vulnerability database and enhancing its reporting mechanism.
Service and Support: Users say Tenable.io support is hindered by technical challenges. Some users said they value Snyk's proactive approach and the abundance of resources they provide, while others said that Snyk should rethink how their support team organizes and prioritizes requests.
Ease of Deployment: Both products are relatively easy to set up with good support from their respective teams.The setup process for Tenable.io Container Security is made easier by solid documentation. Tenable.io takes around one or two weeks to deploy on average, while Snyk's implementation process can take a couple of days or a few weeks. Integrating Snyk with different repositories or CI/CD systems is generally considered to be simple, although some users reported challenges.
Pricing: Tenable.io Container Security's cost is determined by the application's page count. Snyk's pricing is viewed as costly compared to alternative options. Nevertheless, but many users said that Snyk's pricing is justifiable for businesses, as it includes integrated features and avoids additional expenses.
ROI: Tenable.io Container Security yields an ROI by enhancing container security and averting security incidents. Snyk emphasizes economical bug resolution early in the development process, possibly resulting in a significant return on investment.
Comparison Results: Tenable.io Container Security is preferred Snyk. Users appreciate its efficient setup process, extensive vulnerability detection, and ability to identify misconfiguration. Tenable.io Container Security also offers superior technical support and a customizable compliance system. Snyk lacks some of the advanced features and support options provided by Tenable.io.
"The management console is highly intuitive to comprehend and operate."
"PingSafe offers comprehensive security posture management."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"My favorite feature is Storyline."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"The user interface is well-designed and easy to navigate."
"Snyk helps me pinpoint security errors in my code."
"It has improved our vulnerability rating and reduced our vulnerabilities through the tool during the time that we've had it. It's definitely made us more aware, as we have removed scoping for existing vulnerabilities and platforms since we rolled it out up until now."
"The solution's vulnerability database, in terms of comprehensiveness and accuracy, is very high-level. As far as I know, it's the best among their competitors."
"The most valuable features are their GitLab and JIRA integrations. The GitLab integration lets us pull projects in pretty easily, so that it's pretty minimal for developers to get it set up. Using the JIRA integration, it's also pretty easy to get the information that is generated, as a result of that GitLab integration, back to our teams in a non-intrusive way and in a workflow that we are already using."
"There are many valuable features. For example, the way the scanning feature works. The integration is cool because I can integrate it and I don't need to wait until the CACD, I can plug it in to our local ID, and there I can do the scanning. That is the part I like best."
"Snyk categorizes the level of vulnerability into high, medium, and low, which helps organizations prioritize which issues to tackle first."
"Our customers find container scans most valuable. They are always talking about it."
"Static code analysis is one of the best features of the solution."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"Nessus scanner is very effective for internal penetration testing."
"It is a scalable solution. Scalability-wise, it is a good solution."
"The strong security provided by the product in the container environment is its most valuable feature."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"The categorization of the results from the vulnerability assessment could be improved."
"There is no break-glass account feature. They should implement this as soon as possible because we can't implement SSO without a break-glass feature."
"PingSafe can improve by eliminating 100 percent of the false positives."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"Customized queries should be made easier to improve PingSafe."
"here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed."
"The way Snyk notifies if we have an issue, there are a few options: High vulnerability or medium vulnerability. The problem with that is high vulnerabilities are too broad, because there are too many. If you enable notifications, you get a lot of notifications, When you get many notifications, they become irrelevant because they're not specific. I would prefer to have control over the notifications and somehow decide if I want to get only exploitable vulnerabilities or get a specific score for a vulnerability. Right now, we receive too many high vulnerabilities. If we enable notifications, then we just get a lot of spam message. Therefore, we would like some type of filtering system to be built-in for the system to be more precise."
"We've also had technical issues with blocking newly introduced vulnerabilities in PRs and that was creating a lot of extra work for developers in trying to close and reopen the PR to get rid of some areas. We ended up having to disable that feature altogether because it wasn't really working for us and it was actually slowing down developer velocity."
"For the areas that they're new in, it's very early stages for them. For example, their expertise is in looking at third-party components and packages, which is their bread-and-butter and what they've been doing for ages, but for newer features such as static analysis I don't think they've got compatibility for all the languages and frameworks yet."
"The solution could improve the reports. They have been working on improving the reports but more work could be done."
"I think Snyk should add more of a vulnerability protection feature in the tool since it is an area where it lacks."
"The feature for automatic fixing of security breaches could be improved."
"A feature we would like to see is the ability to archive and store historical data, without actually deleting it. It's a problem because it throws my numbers off. When I'm looking at the dashboard's current vulnerabilities, it's not accurate."
"There are some new features that we would like to see added, e.g., more visibility into library usage for the code. Something along the lines where it's doing the identification of where vulnerabilities are used, etc. This would cause them to stand out in the market as a much different platform."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The initial setup is highly complex."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
More Singularity Cloud Security by SentinelOne Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Snyk is ranked 5th in Container Security with 41 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Snyk is rated 8.2, while Tenable.io Container Security is rated 7.8. The top reviewer of Snyk writes "Performs software composition analysis (SCA) similar to other expensive tools". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Snyk is most compared with SonarQube, Black Duck, GitHub Advanced Security, Fortify Static Code Analyzer and Veracode, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and Red Hat Advanced Cluster Security for Kubernetes. See our Snyk vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.