We performed a comparison between Tenable.io Container Security and Snyk based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at identifying weaknesses and misconfigurations. Snyk is commended for its scanning features and ability to generate pull requests and resolve problems automatically. Tenable.io Container Security could its auto-remediation, asset visibility, and compliance system customization. Snyk could work on improving compatibility while expanding its vulnerability database and enhancing its reporting mechanism.
Service and Support: Users say Tenable.io support is hindered by technical challenges. Some users said they value Snyk's proactive approach and the abundance of resources they provide, while others said that Snyk should rethink how their support team organizes and prioritizes requests.
Ease of Deployment: Both products are relatively easy to set up with good support from their respective teams.The setup process for Tenable.io Container Security is made easier by solid documentation. Tenable.io takes around one or two weeks to deploy on average, while Snyk's implementation process can take a couple of days or a few weeks. Integrating Snyk with different repositories or CI/CD systems is generally considered to be simple, although some users reported challenges.
Pricing: Tenable.io Container Security's cost is determined by the application's page count. Snyk's pricing is viewed as costly compared to alternative options. Nevertheless, but many users said that Snyk's pricing is justifiable for businesses, as it includes integrated features and avoids additional expenses.
ROI: Tenable.io Container Security yields an ROI by enhancing container security and averting security incidents. Snyk emphasizes economical bug resolution early in the development process, possibly resulting in a significant return on investment.
Comparison Results: Tenable.io Container Security is preferred Snyk. Users appreciate its efficient setup process, extensive vulnerability detection, and ability to identify misconfiguration. Tenable.io Container Security also offers superior technical support and a customizable compliance system. Snyk lacks some of the advanced features and support options provided by Tenable.io.
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"PingSafe offers comprehensive security posture management."
"It is advantageous in terms of time-saving and cost reduction."
"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"PingSafe offers an intuitive user interface that lets us navigate quickly and easily."
"With PingSafe, it's easy to onboard new accounts."
"The solution's vulnerability database, in terms of comprehensiveness and accuracy, is very high-level. As far as I know, it's the best among their competitors."
"Snyk has given us really good results because it is fully automated. We don't have to scan projects every time to find vulnerabilities, as it already stores the dependencies that we are using. It monitors 24/7 to find out if there are any issues that have been reported out on the Internet."
"Snyk helps me pinpoint security errors in my code."
"The most valuable features include enriched information around the vulnerabilities for better triaging, in terms of the vulnerability layer origin and vulnerability tree."
"It is one of the best product out there to help developers find and fix vulnerabilities quickly. When we talk about the third-party software vulnerability piece and potentially security issues, it takes the load off the user or developer. They even provide automitigation strategies and an auto-fix feature, which seem to have been adopted pretty well."
"Snyk performs software composition analysis (SCA) similar to other expensive tools."
"Static code analysis is one of the best features of the solution."
"It has improved our vulnerability rating and reduced our vulnerabilities through the tool during the time that we've had it. It's definitely made us more aware, as we have removed scoping for existing vulnerabilities and platforms since we rolled it out up until now."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"The strong security provided by the product in the container environment is its most valuable feature."
"Nessus scanner is very effective for internal penetration testing."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"The cost has the potential for improvement."
"We can customize security policies but lack auditing capabilities."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"I would like additional integrations."
"There is a bit of a learning curve for new users."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"They were a couple of issues which happened because Snyk lacked some documentation on the integration side. Snyk is lacking a lot of documentation, and I would like to see them improve this. This is where we struggle a bit. For example, if something breaks, we can't figure out how to fix that issue. It may be a very simple thing, but because we don't have the proper documentation around an issue, it takes us a bit longer."
"The tool's initial use is complex."
"We were using Microsoft Docker images. It was reporting some vulnerabilities, but we were not able to figure out the fix for them. It was reporting some vulnerabilities in the Docker images given by Microsoft, which were out of our control. That was the only limitation. Otherwise, it was good."
"The tool needs improvement in license compliance. I would like to see the integration of better policy management in the product's future release. When it comes to the organization that I work for, there are a lot of business units since we are a group of companies. Each of these companies has its specific requirements and its own appetite for risk. This should be able to reflect in flexible policies. We need to be able to configure policies that can be adjusted later or overridden by the business unit that is using the product."
"The product is very expensive."
"We would like to have upfront knowledge on how easy it should be to just pull in an upgraded dependency, e.g., even introduce full automation for dependencies supposed to have no impact on the business side of things. Therefore, we would like some output when you get the report with the dependencies. We want to get additional information on the expected impact of the business code that is using the dependency with the newer version. This probably won't be easy to add, but it would be helpful."
"Snyk's API and UI features could work better in terms of speed."
"The solution's reporting and storage could be improved."
"The initial setup is highly complex."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Snyk is ranked 5th in Container Security with 41 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Snyk is rated 8.2, while Tenable.io Container Security is rated 7.8. The top reviewer of Snyk writes "Performs software composition analysis (SCA) similar to other expensive tools". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Snyk is most compared with SonarQube, Black Duck, GitHub Advanced Security, Fortify Static Code Analyzer and Veracode, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and Red Hat Advanced Cluster Security for Kubernetes. See our Snyk vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.