Try our new research platform with insights from 80,000+ expert users

Tenable Cloud Security vs Trellix Cloud Workload Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
107
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Tenable Cloud Security
Ranking in Cloud Workload Protection Platforms (CWPP)
15th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
9
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th), Cloud Security Posture Management (CSPM) (19th), Cloud-Native Application Protection Platforms (CNAPP) (15th), Cloud Infrastructure Entitlement Management (CIEM) (5th)
Trellix Cloud Workload Secu...
Ranking in Cloud Workload Protection Platforms (CWPP)
19th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Cloud Workload Protection Platforms (CWPP) category, the mindshare of SentinelOne Singularity Cloud Security is 2.5%, up from 0.9% compared to the previous year. The mindshare of Tenable Cloud Security is 2.0%, up from 2.0% compared to the previous year. The mindshare of Trellix Cloud Workload Security is 0.3%, down from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Ondrej Kováč - PeerSpot reviewer
Has vulnerability detection, software composition analysis and asset management features
Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product. Another area needing improvement is the implementation complexity, especially in multi-cloud environments. Tenable Cloud Security's features mean there's a steep learning curve, which can consume significant time and resources to utilize the platform's potential and fully see immediate benefits. It's similar to AI in that you must spend time fine-tuning and training before it truly helps.
Madan Mohan - PeerSpot reviewer
Easy policy designing and highly scalable solution
The customers really want protection against unauthorized applications running on their servers. They should avoid installing any unknown source and use Trellix Cloud Workload Security for the best solution in workload security. It includes DNS with ransomware protection. With this, they can have complete protection for their servers. Additionally, any solution working with the database should implement change control. So, if any changes are made on the database side, they should be resolved and verified to ensure they are not made by any unknown source. This is the best solution we suggest to customers who want granular control to protect their servers. It's easy to deploy with a single agent. Overall, I would rate the solution a nine out of ten because policy designing is very easy too. And the manageability is very easy. You can easily manage it through EPO and deploy policies within five to ten minutes. No issues with that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"My favorite feature is Storyline."
"We're monitoring several cloud accounts with Singularity. It is convenient to identify issues or security failures in any account. It's nice to have all the details we need to solve these issues."
"Singularity Cloud Security's most valuable features are its ease of scalability and comprehensive security measures."
"PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"Singularity Cloud Security offers autonomous response capabilities, automatically remediating threats and restoring affected files without manual intervention."
"If you have multi-cloud tenancy using AWS and Azure, you can have a single dashboard where you can onboard all the cloud infrastructure and have visibility into it."
"The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
"The product's visibility and remediation work fine for me."
"The key benefit lies in having the largest and most up-to-date database. When it comes to using any Tenable product, it excels in finding vulnerabilities and providing analytics."
"The solution’s vulnerability management feature has helped us identify and mitigate risks well."
"The product's deployment phase is easy."
"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"The most valuable feature is the application control."
"The discovery feature is the most valuable. After you integrate your cloud environment, maybe an Azure or AWS, or a private environment hosted on VMware, it automatically starts discovering the number of servers that are running on that cloud and the number of services that you have done. It is a beautiful feature because, from a security standpoint, it is difficult to identify which VM is compliant or not when you keep on provisioning a number of VMs in the cloud. It also checks for compliance. It checks whether a system is compliant and whether antivirus is installed on a VM. If an antivirus is installed, it checks whether the antivirus is updated to the latest signature package or not. All these things are beautifully done by McAfee Cloud Workload Security. For communicating with the McAfee server, you need to install an agent on the VM. McAfee Cloud Workload Security gives you a direct opportunity to install an agent on a Windows machine. If you have a Windows cloud, you can directly push that agent onto the VM through your McAfee portal. It provides you a single dashboard view of all servers present in the cloud. It shows the servers on which the antivirus is already installed as well as the servers for which the antivirus installation is still pending. This dashboard view is a much-needed thing. It also has a centralized management, which makes it easy to use."
 

Cons

"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments."
"The SentinelOne customer support needs improvement, as they are sometimes late in responding, which is critical in a production issue."
"Maybe container runtime security could be improved."
"With Cloud Native Security, we can't selectively enable or disable alerts based on our specific use case."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"PingSafe's current documentation could be improved to better assist customers during the cluster onboarding process."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"The product must provide more features."
"I didn't find anything that wasn't useful or needed to be added."
"Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product."
"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
"I have faced several bug incidents with the solution"
"There is a need for the support team to improve their response time since it is one of the areas where the product's technical team has certain shortcomings."
"Tenable needs to offer a patch-based solution since it is an area where the tool lacks a bit."
"If Tenable Cloud Security offers a complete Cnapp solution with CWP, CIEM, and Waap security, it will be able to compete with other competitors."
"There is room for improvement in the pricing model."
"Its vulnerability assessment is not the best. We cannot identify the vulnerabilities that are related to the operating system by using McAfee Cloud Workload Security. I wish McAfee would add a vulnerability assessment tool that will not only identify the vulnerability but will also be able to generate a report so that the required patching can be done for the servers. Currently, McAfee Cloud Workload Security only integrates with AWS and Azure. If it can also integrate with GCP, Alibaba, and other cloud services available in the market, it would be good because not all people are using Azure and AWS."
 

Pricing and Cost Advice

"PingSafe's pricing is good because it provides us with a solution."
"PingSafe is fairly priced."
"For pricing, it currently seems to be in line with market rates."
"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"Singularity Cloud Security by SentinelOne is cost-efficient."
"The features included in PingSafe justify its price point."
"The tool's pricing is fair."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
"The tool's price is good compared to other brands. The tool's subscription is for a year."
"It is not an expensive product. I am in the Indian market, and it is one of the most reliable and cost-effective solutions."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
845,485 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
16%
Manufacturing Company
9%
Government
5%
Computer Software Company
15%
Financial Services Firm
11%
Government
11%
Manufacturing Company
7%
Comms Service Provider
14%
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
The documentation could be better. Besides improving the documentation, obtaining a professional or partner specializ...
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
Another team uses the tool. Tenable acquired Ermetic. I think Tenable has features, stays up to date, and upgrades ev...
What is your primary use case for Tenable Cloud Security?
Right now, I use Tenable as CNAPP, and it is good for the product as it offers enhanced security to users. We did use...
What do you like most about McAfee Cloud Workload Security?
The most valuable feature is the application control.
What is your experience regarding pricing and costs for McAfee Cloud Workload Security?
I would rate it a seven out of ten, where one is a low price, and ten is a high price. Trellix doesn't charge any add...
What needs improvement with McAfee Cloud Workload Security?
There is room for improvement in the pricing model. The price could be a bit lower.
 

Also Known As

PingSafe
Ermetic, Ermetic Identity Governance for AWS
McAfee Cloud Workload Security
 

Overview

 

Sample Customers

Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Information Not Available
Find out what your peers are saying about Tenable Cloud Security vs. Trellix Cloud Workload Security and other solutions. Updated: March 2025.
845,485 professionals have used our research since 2012.