Tenable Cloud Security and Threat Stack Cloud Security Platform are both leading solutions in cloud security. Users report Tenable Cloud Security has the upper hand due to its rich features that justify the higher cost.
Features: Users recognize Threat Stack for its real-time threat detection, compliance management, and straightforward deployment. Tenable Cloud Security is noted for robust vulnerability assessment, integration capabilities, and comprehensive security metrics.
Room for Improvement: Feedback suggests Threat Stack needs enhanced alert accuracy, better third-party tool integration, and core functionality improvements. Tenable users mention improvements to the UI, the need for advanced threat intelligence data, and streamlined setup procedures.
Ease of Deployment and Customer Service: Threat Stack is noted for its simple deployment and responsive customer service. Tenable is described as requiring more complex setup but offers extensive support resources.
Pricing and ROI: Users find Threat Stack’s cost aligns well with its ROI for its basic offerings. Tenable, though pricier, delivers greater ROI through advanced security functionalities.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
In my experience, there has been 100 percent uptime.
SentinelOne Singularity Cloud is incredibly reliable.
The cloud console is very resilient.
The real-time detection and response capabilities of SentinelOne Singularity Cloud impressive because it is a platform that uses artificial intelligence to determine what is normal and what is abnormal and can lock down any virus it may encounter.
We were shown how ransomware can be immediately stopped in real-time. That was huge.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal manual intervention. Securing containerized applications and virtual machines, it excels in threat intelligence and endpoint protection. However, improvements are needed in performance during high workload periods, and more integrations with third-party tools and better documentation would be beneficial. Users often find the installation process complex, support response times slow, and the dashboard's navigation unintuitive.
What are the key features of SentinelOne Singularity Cloud Security?In specific industries, SentinelOne Singularity Cloud Security is implemented to safeguard critical data and infrastructure. Organizations in finance, healthcare, and technology depend on its real-time threat detection and automated response to protect sensitive information. Its ability to secure containerized applications and virtual machines is particularly valuable in dynamic environments where rapid scaling is necessary.
Tenable Cloud Security is a comprehensive solution designed to help organizations secure their cloud environments across various platforms, including AWS, Azure, and Google Cloud. It offers continuous visibility, compliance management, and threat detection to ensure that cloud infrastructure and applications are protected from vulnerabilities and misconfigurations.
Tenable Cloud Security exemplifies a comprehensive Cloud-Native Application Protection Platform (CNAPP) by providing a unified solution that covers the entire cloud security lifecycle, from development to runtime. This platform is designed to address vulnerabilities, misconfigurations, threats, and compliance risks across multi-cloud environments, making it an essential tool for organizations adopting cloud-native architectures. In practice, Tenable Cloud Security integrates security into the development process through its shift-left approach, particularly with Infrastructure as Code (IaC) security. This ensures that security measures are embedded early in the development lifecycle, allowing teams to identify and mitigate vulnerabilities before they reach production. Once in production, the platform continues to provide real-time visibility into cloud environments, enabling continuous monitoring and proactive threat detection.
The solution's comprehensive protection spans various aspects of cloud security, including the identification and remediation of misconfigurations, automated compliance management, and advanced threat intelligence. By automating these processes, Tenable Cloud Security reduces the manual effort required to manage cloud security, freeing up resources for more strategic initiatives.
What are the key features of Tenable Cloud Security?
What are the benefits of using Tenable Cloud Security?
Tenable Cloud Security is particularly valuable in industries with stringent regulatory requirements, such as finance, healthcare, and retail. For example, in the financial sector, it helps organizations ensure compliance with regulations like PCI-DSS while safeguarding sensitive data across cloud environments.
In summary, Tenable Cloud Security is a robust CNAPP solution that integrates security throughout the cloud lifecycle, providing comprehensive protection and operational efficiency for cloud-native environments.
Threat Stack Cloud Security Platform is a CWPP (Cloud Workload Protection Platform) that provides your organization with comprehensive security for modern applications and APIs. It is designed specifically for monitoring cloud environments, vulnerabilities, covering workloads, infrastructure, and compliance. The solution offers application infrastructure protection for all layers of your infrastructure stack and delivers the necessary observability for proactive and targeted remediation action. In addition, it is platform-independent and easily adapts to various environments. Threat Stack Cloud Security Platform works best for companies who want real-time protection against active external threats and need to reduce alert investigation time. It is ideal for small, medium, or large-sized organizations.
Threat Stack Cloud Security Platform Features
Threat Stack Cloud Security Platform has many valuable key features. Some of the most useful ones include:
Threat Stack Cloud Security Platform Benefits
There are many benefits to implementing Threat Stack Cloud Security Platform. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the Threat Stack Cloud Security Platform solution.
Skyler C., Software Development Manager at Rent Dynamics, says, “The most valuable feature is the SecOps because they have our back and they help us with the reports. We jump on calls monthly to set goals and roadmaps internally for how we can secure our platform more. Their SecOps program is absolutely amazing when you do not have a dedicated resource for security.”
An IT Engineer at a consultancy mentions, “The platform has a good threat and vulnerability manager with very helpful technical support. The scalability is great.”
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.