Aqua Security vs. Tenable.io Container Security

As of June 2019, Aqua Security is ranked 4th in Container Security with 3 reviews vs Tenable.io Container Security which is ranked 7th in Container Security with 1 review. The top reviewer of Aqua Security writes "Integrated with our existing platform, providing visibility into container image vulnerabilities and access control". The top reviewer of Tenable.io Container Security writes "Very effective for internal penetration testing". Aqua Security is most compared with Twistlock, Sysdig Secure and StackRox. Tenable.io Container Security is most compared with Twistlock, Aqua Security and Sysdig Secure.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Anonymous User
Find out what your peers are saying about Trend Micro, Threat Stack, Docker and others in Container Security. Updated: June 2019.
346,318 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
We use Aqua Security for the container security features.Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out, the amount of risk that we were introducing to the platform, and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access.Valuable features include the ability to connect it to our Docker Hub where our images are stored, good integration with Slack, and the connection to the CV, to easily see which CVs are on each image.

Read more »

Nessus scanner is very effective for internal penetration testing.

Read more »

Cons
I would like Aqua Security to look into is the development of a web security portal.

Read more »

I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls.

Read more »

Pricing and Cost Advice
They were reasonable with their pricing. They were pretty down-to-earth about the way they pitched their product and the way they tried to close the deal. They were one of the rare companies that approached the whole valuation in a way that made sense for our company, for our needs, and for their own requirements as well... They will accommodate your needs if they are able to understand them and they're stated clearly.

Read more »

It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders.

Read more »

report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
346,318 professionals have used our research since 2012.
Ranking
4th
out of 20 in Container Security
Views
6,946
Comparisons
5,394
Reviews
2
Average Words per Review
1,386
Avg. Rating
10.0
7th
out of 20 in Container Security
Views
1,094
Comparisons
546
Reviews
1
Average Words per Review
427
Avg. Rating
9.0
Top Comparisons
Compared 85% of the time.
Compared 6% of the time.
Compared 4% of the time.
Also Known As
Tenable FlawCheck, FlawCheck
Learn
Aqua Security
Tenable Network Security
Overview

The Aqua Container Security Platform provides development-to-production lifecycle controls for securing containerized applications that run on-premises or in the cloud, on Windows or Linux, supporting multiple orchestration environments.

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images - including vulnerabilities, malware and policy violations - through integration with the build process.

Offer
Schedule Now

Sign up for a free demo!

Learn more about Tenable.io Container Security
Sample Customers
HPE Salesforce Telstra Ellie Mae Cathay Pacific HomeAwayServiceMaster
Find out what your peers are saying about Trend Micro, Threat Stack, Docker and others in Container Security. Updated: June 2019.
346,318 professionals have used our research since 2012.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email