We performed a comparison between Tenable.io Container Security and Snyk based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at identifying weaknesses and misconfigurations. Snyk is commended for its scanning features and ability to generate pull requests and resolve problems automatically. Tenable.io Container Security could its auto-remediation, asset visibility, and compliance system customization. Snyk could work on improving compatibility while expanding its vulnerability database and enhancing its reporting mechanism.
Service and Support: Users say Tenable.io support is hindered by technical challenges. Some users said they value Snyk's proactive approach and the abundance of resources they provide, while others said that Snyk should rethink how their support team organizes and prioritizes requests.
Ease of Deployment: Both products are relatively easy to set up with good support from their respective teams.The setup process for Tenable.io Container Security is made easier by solid documentation. Tenable.io takes around one or two weeks to deploy on average, while Snyk's implementation process can take a couple of days or a few weeks. Integrating Snyk with different repositories or CI/CD systems is generally considered to be simple, although some users reported challenges.
Pricing: Tenable.io Container Security's cost is determined by the application's page count. Snyk's pricing is viewed as costly compared to alternative options. Nevertheless, but many users said that Snyk's pricing is justifiable for businesses, as it includes integrated features and avoids additional expenses.
ROI: Tenable.io Container Security yields an ROI by enhancing container security and averting security incidents. Snyk emphasizes economical bug resolution early in the development process, possibly resulting in a significant return on investment.
Comparison Results: Tenable.io Container Security is preferred Snyk. Users appreciate its efficient setup process, extensive vulnerability detection, and ability to identify misconfiguration. Tenable.io Container Security also offers superior technical support and a customizable compliance system. Snyk lacks some of the advanced features and support options provided by Tenable.io.
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"The ease of use of the platform is very nice."
"Cloud Native Security is a tool that has good monitoring features."
"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"The solution is a good alerting tool."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"The most valuable feature is that they add a lot of their own information to the vulnerabilities. They describe vulnerabilities and suggest their own mitigations or version upgrades. The information was the winning factor when we compared Snyk to others. This is what gave it more impact."
"From the software composition analysis perspective, it first makes sure that we understand what is happening from a third-party perspective for the particular product that we use. This is very difficult when you are building software and incorporating dependencies from other libraries, because those dependencies have dependencies and that chain of dependencies can go pretty deep. There could be a vulnerability in something that is seven layers deep, and it would be very difficult to understand that is even affecting us. Therefore, Snyk provides fantastic visibility to know, "Yes, we have a problem. Here is where it ultimately comes from." It may not be with what we're incorporating, but something much deeper than that."
"The solution's vulnerability database, in terms of comprehensiveness and accuracy, is very high-level. As far as I know, it's the best among their competitors."
"It has improved our vulnerability rating and reduced our vulnerabilities through the tool during the time that we've had it. It's definitely made us more aware, as we have removed scoping for existing vulnerabilities and platforms since we rolled it out up until now."
"Its reports are nice and provide information about the issue as well as resolution. They also provide a proper fix. If there's an issue, they provide information in detail about how to remediate that issue."
"What is valuable about Snyk is its simplicity."
"The most effective feature in securing project dependencies stems from its ability to highlight security vulnerabilities."
"I am impressed with the product's security vulnerability detection. My peers in security are praising the tool for its accuracy to detect security vulnerabilities. The product is very easy to onboard. It doesn't require a lot of preparation or prerequisites. It's a bit of a plug-and-play as long as you're using a package manager or for example, you are using a GitHub repository. And that is an advantage for this tool because developers don't want to add more tools to what they're currently using."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"The strong security provided by the product in the container environment is its most valuable feature."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Nessus scanner is very effective for internal penetration testing."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"Customized queries should be made easier to improve PingSafe."
"I would like additional integrations."
"The categorization of the results from the vulnerability assessment could be improved."
"There is no break-glass account feature. They should implement this as soon as possible because we can't implement SSO without a break-glass feature."
"PingSafe's current documentation could be improved to better assist customers during the cluster onboarding process."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"Maybe container runtime security could be improved."
"We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
"We would like to have upfront knowledge on how easy it should be to just pull in an upgraded dependency, e.g., even introduce full automation for dependencies supposed to have no impact on the business side of things. Therefore, we would like some output when you get the report with the dependencies. We want to get additional information on the expected impact of the business code that is using the dependency with the newer version. This probably won't be easy to add, but it would be helpful."
"Scalability has some issues because we have a lot of code and its use is mandatory. Therefore, it can be slow at times, especially because there are a lot of projects and reporting. Some UI improvements could help with this."
"It can be improved from the reporting perspective and scanning perspective. They can also improve it on the UI front."
"I think Snyk should add more of a vulnerability protection feature in the tool since it is an area where it lacks."
"A feature we would like to see is the ability to archive and store historical data, without actually deleting it. It's a problem because it throws my numbers off. When I'm looking at the dashboard's current vulnerabilities, it's not accurate."
"The product is very expensive."
"Basically the licensing costs are a little bit expensive."
"I would like to give further ability to grouping code repositories, in such a way that you could group them by the teams that own them, then produce alerting to those teams. The way that we are seeing it right now, the alerting only goes to a couple of places. I wish we could configure the code to go to different places."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"The initial setup is highly complex."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Snyk is ranked 5th in Container Security with 41 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Snyk is rated 8.2, while Tenable.io Container Security is rated 7.8. The top reviewer of Snyk writes "Performs software composition analysis (SCA) similar to other expensive tools". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Snyk is most compared with SonarQube, Black Duck, GitHub Advanced Security, Fortify Static Code Analyzer and Veracode, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and Red Hat Advanced Cluster Security for Kubernetes. See our Snyk vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.