We performed a comparison between Tenable.io Container Security and Red Hat Advanced Cluster Security for Kubernetes based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at analyzing vulnerabilities and identifying misconfiguration. Red Hat Advanced Cluster Security for Kubernetes receives praise for its resource-sharing capabilities, segmentation, reliable performance, and user-friendly web interface. Tenable.io could improve by automating remediation and CIS benchmarks while enhancing asset visibility and implementing customizable compliance options. Red Hat Advanced Cluster Security for Kubernetes could improve by enhancing testing capabilities, making command line and configuration processes easier, and incorporating zero trust and access control measures.
Service and Support: Some users encountered technical issues when contacting Tenable.io support. Customers using Red Hat Advanced Cluster Security for Kubernetes gave feedback and regard the support they receive as being of high quality.
Ease of Deployment: Tenable.io Container Security comes with clear setup documentation, making the deployment process smooth. Red Hat Advanced Cluster Security for Kubernetes requires considerable time and effort to deploy due to its complex configuration process.
Pricing: Tenable.io Container Security's setup cost is determined by the application's page count. Red Hat Advanced Cluster Security for Kubernetes is moderately priced and cheaper if purchased in a bundle with other Red Hat solutions.
Comparison Results: Tenable.io Container Security is preferred over Red Hat Advanced Cluster Security for Kubernetes. Tenable.io Container Security offers a smooth setup process with helpful guidebooks, quick deployment, and the ability to identify misconfigurations before going live. Red Hat Advanced Cluster Security for Kubernetes has a more complicated setup process, requires more resources for deployment, and lacks certain features offered by other solutions.
"It is advantageous in terms of time-saving and cost reduction."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"Cloud Native Security offers a valuable tool called an offensive search engine."
"PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"The solution is a good alerting tool."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"Segmentation is the most powerful feature."
"The most valuable feature of the solution is its monitoring feature."
"It is easy to install and manage."
"The technical support is good."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"Scalability-wise, I rate the solution a nine out of ten."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Nessus scanner is very effective for internal penetration testing."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"The strong security provided by the product in the container environment is its most valuable feature."
"It is a scalable solution. Scalability-wise, it is a good solution."
"I'd like to see better onboarding documentation."
"The could improve their mean time to detect."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
"There is a bit of a learning curve for new users."
"They could generally give us better comprehensive rules."
"We'd like to have better notifications. We'd like them to happen faster."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The testing process could be improved."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The solution's visibility and vulnerability prevention should be improved."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"Red Hat is somewhat expensive."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The initial setup is highly complex."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Red Hat Advanced Cluster Security for Kubernetes is ranked 18th in Container Security with 10 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Red Hat Advanced Cluster Security for Kubernetes is rated 8.4, while Tenable.io Container Security is rated 7.8. The top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and CoreOS Clair, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and SUSE NeuVector. See our Red Hat Advanced Cluster Security for Kubernetes vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.