We performed a comparison between Tenable.io Container Security and Prisma Cloud by Palo Alto Networks based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at identifying vulnerabilities and resolving deployment misconfigurations. Prisma Cloud provides extensive visibility, robust management options, and a diverse set of security functionalities for multi-cloud and hybrid-cloud environments. Tenable.io Container Security needs enhancements in auto-remediation, asset visibility, and compliance customization. Prisma Cloud requires improvements in dashboards, query building, correlation, and automation.
Service and Support: Customers have experienced difficulties with Tenable's customer service and support. Some customers said Palo Alto provided excellent, helpful, and responsive support. However, a few customers were dissatisfied with slow response times and a lack of satisfactory resolutions.
Ease of Deployment: The setup process for Tenable.io Container Security is considered straightforward with the support of helpful guidebooks. Reviewers had varied experiences when setting up Prisma Cloud. They said it can be easy or challenging depending on the organization's requirements. It typically takes users one or two weeks to deploy Tenable.io, while the deployment time for Prisma Cloud depends on the complexity of the environment.
Pricing: The cost of Tenable.io Container Security is determined by the number of pages in the application. Some users said that Prisma Cloud is reasonably and competitively priced, while others view it as expensive but essential for the benefits it offers.
ROI: Prisma Cloud by Palo Alto Networks has demonstrated its effectiveness in preventing breaches, enhancing risk understanding, and decreasing security expenses. Users offered limited feedback on Tenable's ROI.
Comparison Results: Prisma Cloud by Palo Alto Networks is the preferred choice over Tenable.io Container Security. Prisma Cloud offers extensive visibility and management features. Users like Prisma Cloud's powerful anomaly detection, integration, and coverage of multi-cloud and hybrid environments. Prisma Cloud stands out due to its easy configuration, integration with DevSecOps pipelines, and comprehensive security capabilities.
"The policies that come prepackaged in the tool have been very valuable to us. They're accurate and they provide good guidance as to why the policy was created, as well as how to remediate anything that violates the policy."
"The product provides very good network security."
"The solution gives us a lot of visibility across all of our cloud solutions."
"We were pleased with Prisma's custom and built-in reports. We could go into the dashboard and see all these notifications telling us which subscriptions didn't have TLS 1.2 enabled. The security controls were the most valuable features."
"Prisma Cloud's most important feature is its auto-remediation."
"The container and serverless security is most valuable. It is quite a new technology for this region. Even though containers have been there for a long time, the adoption of containers is very minimal in this region. When it comes to using Kubernetes containers in a complex architecture, there is a lack of security in the market. People aren't aware of the security controls or the process for governance. Container security provided by Prisma Cloud is quite good at filling that gap."
"The client wasn't using all of the features, but the one that stood out was infrastructure-as-code (IaC). I built IaC use cases and was trying to get them to use it. I also liked cloud workload protection. I worked with the vulnerability management team to develop a process. It's a manual process, so it can be challenging to remediate many image or container issues. It was nice that we could build out a reporting process and download the reports. The reports are solid."
"The application visibility is amazing. For example, sometimes we don't know what a particular custom port is for and what is running on it. The visibility enables us to identify applications, what the protocol is, and what service is behind it. Within Azure, it is doing a great job of providing visibility. We know exactly what is passing through our network. If there is an issue of any sort we are able to quickly detect it and fix the problem."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"The strong security provided by the product in the container environment is its most valuable feature."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"It is a scalable solution. Scalability-wise, it is a good solution."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Nessus scanner is very effective for internal penetration testing."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"A couple of exporting functionalities should be more user-friendly because if I want to export something, I can get a lot of data visible to that particular CSV."
"Sometimes, when you assign subnets to regions, the IP address will jump from one location to another because it will automatically change substantially. Then, we need to add those IP subnets to our firewall for existing access. The need to update those subnets potentially causes maintenance or access issues. So far, we can only provide bigger customers with six subnets, and a small company may not be able to access those services."
"The UI is good, however, they could improve the experience."
"Getting new guys trained on using the solution requires some thought. If someone is already trained on Palo Alto then he's able to adapt quickly. But, if someone is coming from another platform such as Fortinet, or maybe he's from the system side, that is where we need some help. We need to find out if there is an online track or training that they can go to."
"One definite area for improvement is the auto-remediation or the CWP area. The second one is the RQL language. It is still not very flexible and does not cover a lot of use cases. The RQL language could be dramatically improved to add more options."
"They could improve more features for the enterprise version of the solution."
"One major observation is that it is not possible to implement Prisma Cloud on-premises. This is the limitation. Prisma Cloud itself is on a cloud. It is sitting on AWS and Google Cloud. It is a SaaS solution, but some of my clients have a local regulatory requirement, and they want to install it locally on their premises. That capability is not there, but government entities and ministries want to have Prisma Cloud installed locally."
"There is room for improvement on the logging and monitoring front because it's still not as holistic as I would want it to be."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"The initial setup is highly complex."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Prisma Cloud by Palo Alto Networks is ranked 1st in Container Security with 82 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Prisma Cloud by Palo Alto Networks is rated 8.4, while Tenable.io Container Security is rated 7.8. The top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Prisma Cloud by Palo Alto Networks is most compared with Wiz, Microsoft Defender for Cloud, Aqua Cloud Security Platform, AWS Security Hub and F5 Advanced WAF, whereas Tenable.io Container Security is most compared with Aqua Cloud Security Platform, Wiz, Trivy, Red Hat Advanced Cluster Security for Kubernetes and Sysdig Secure. See our Prisma Cloud by Palo Alto Networks vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.