We performed a comparison between Tenable.io Container Security and Red Hat Advanced Cluster Security for Kubernetes based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at analyzing vulnerabilities and identifying misconfiguration. Red Hat Advanced Cluster Security for Kubernetes receives praise for its resource-sharing capabilities, segmentation, reliable performance, and user-friendly web interface. Tenable.io could improve by automating remediation and CIS benchmarks while enhancing asset visibility and implementing customizable compliance options. Red Hat Advanced Cluster Security for Kubernetes could improve by enhancing testing capabilities, making command line and configuration processes easier, and incorporating zero trust and access control measures.
Service and Support: Some users encountered technical issues when contacting Tenable.io support. Customers using Red Hat Advanced Cluster Security for Kubernetes gave feedback and regard the support they receive as being of high quality.
Ease of Deployment: Tenable.io Container Security comes with clear setup documentation, making the deployment process smooth. Red Hat Advanced Cluster Security for Kubernetes requires considerable time and effort to deploy due to its complex configuration process.
Pricing: Tenable.io Container Security's setup cost is determined by the application's page count. Red Hat Advanced Cluster Security for Kubernetes is moderately priced and cheaper if purchased in a bundle with other Red Hat solutions.
Comparison Results: Tenable.io Container Security is preferred over Red Hat Advanced Cluster Security for Kubernetes. Tenable.io Container Security offers a smooth setup process with helpful guidebooks, quick deployment, and the ability to identify misconfigurations before going live. Red Hat Advanced Cluster Security for Kubernetes has a more complicated setup process, requires more resources for deployment, and lacks certain features offered by other solutions.
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"We liked the search bar in PingSafe. It is a global search. We were able to get some insights from there."
"The most valuable features of PingSafe are the asset inventory and issue indexing."
"The real-time detection and response capabilities overall are great."
"PingSafe offers security solutions for both Kubernetes and CI/CD pipelines."
"The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"The most valuable feature of the solution is its monitoring feature."
"Segmentation is the most powerful feature."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"Scalability-wise, I rate the solution a nine out of ten."
"The most valuable feature is the ability to share resources."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"I am impressed with the tool's visibility."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"The strong security provided by the product in the container environment is its most valuable feature."
"Nessus scanner is very effective for internal penetration testing."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"The main area for improvement I want to see is for the platform to become less resource-intensive. Right now, it can slow down processes on the machine, and it would be a massive improvement if it were more lightweight than it currently is."
"We are experiencing problems with Cloud Native Security reporting."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"There's room for improvement in the graphic explorer."
"Crafting customized policies can be tricky."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The solution's price could be better."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"Red Hat is somewhat expensive."
"The testing process could be improved."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The initial setup is highly complex."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Red Hat Advanced Cluster Security for Kubernetes is ranked 18th in Container Security with 10 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Red Hat Advanced Cluster Security for Kubernetes is rated 8.4, while Tenable.io Container Security is rated 7.8. The top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and CoreOS Clair, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and SUSE NeuVector. See our Red Hat Advanced Cluster Security for Kubernetes vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.