Try our new research platform with insights from 80,000+ expert users

Tenable Cloud Security vs Zscaler Zero Trust Exchange Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 7, 2024
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Security Posture Management (CSPM)
4th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
4th
Average Rating
8.6
Number of Reviews
88
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (5th), Compliance Management (3rd)
Tenable Cloud Security
Ranking in Cloud Security Posture Management (CSPM)
17th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
14th
Average Rating
8.4
Number of Reviews
9
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (10th), Cloud Workload Protection Platforms (CWPP) (15th), Cloud Infrastructure Entitlement Management (CIEM) (6th)
Zscaler Zero Trust Exchange...
Ranking in Cloud Security Posture Management (CSPM)
10th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
8th
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
62
Ranking in other categories
Data Loss Prevention (DLP) (4th), Cloud Access Security Brokers (CASB) (4th), Application Control (3rd), ZTNA as a Service (1st), Secure Access Service Edge (SASE) (2nd), Remote Browser Isolation (RBI) (1st)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Aug 29, 2024
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Rob Hussey - PeerSpot reviewer
Oct 19, 2023
Helps to react promptly with monitoring and alerting capabilities
We use Ermetic for monitoring and alerting.  The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time.  Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms.  I have been working with the solution…
Vikram Srirama. - PeerSpot reviewer
Oct 4, 2023
A VPN alternative that delivers a zero trust model
The primary use cases for the Zscaler include secure channel access for applications, private file service access, and remote connectivity to the active directory. These are the top three essential functionalities provided by Zscaler Previously, we utilized HubSpot, which required connecting to…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"SentinelOne stands out with its responsiveness to feature requests for Singularity Cloud Security."
"The real-time detection and response capabilities overall are great."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
"The key benefit lies in having the largest and most up-to-date database. When it comes to using any Tenable product, it excels in finding vulnerabilities and providing analytics."
"The product's deployment phase is easy."
"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"Ermetic can provide super visibility for our cloud environment (we are using AWS)."
"The product's visibility and remediation work fine for me."
"The solution’s vulnerability management feature has helped us identify and mitigate risks well."
"The product’s most valuable features are data discovery, activity control, and zero trust exchange."
"The most valuable features of Zscaler SASE include web filtering, application control, and the private access configuration."
"On DLP terms, Zscaler Cloud DLP ensures that data doesn't go outside of the organization. So on the network level, Zscaler does a pretty good job."
"The agent's versatility is notable, used for digital experience monitoring to collect valuable endpoint metrics for troubleshooting."
"The user interface of Zscaler Private Access is excellent. With proper knowledge and expertise, one can efficiently handle intricate enterprise environments without feeling overwhelmed. This leads to exceptional productivity for managed service providers. The user experience is remarkably streamlined, enabling the management of even the most complex enterprise setups without any excessive complications."
"It is easy to use."
"It has some good data security and WIP features, providing secure Internet access."
"The in-line DLP feature is one of the most vital features"
 

Cons

"Some of the navigation and some aspects of the portal may be a little bit confusing."
"Maybe container runtime security could be improved."
"We use PingSafe and also SentinelOne. If PingSafe integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"They need more experienced support personnel."
"We are experiencing problems with Cloud Native Security reporting."
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product."
"Tenable needs to offer a patch-based solution since it is an area where the tool lacks a bit."
"The product must provide more features."
"There is a need for the support team to improve their response time since it is one of the areas where the product's technical team has certain shortcomings."
"If Tenable Cloud Security offers a complete Cnapp solution with CWP, CIEM, and Waap security, it will be able to compete with other competitors."
"I didn't find anything that wasn't useful or needed to be added."
"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
"The pre-defined dictionaries could be improved."
"We would like to extend the SASE applications for Zscaler."
"It has a limitation, if you are creating a rule or something for a web application or something, you could only add five users, not more than that. Five or four users are only included in a rule. If you want to create a rule for more than five or four users, you have to go through other methods, not particularly with the application. Working within the application with this method would be quite easy as compared to listing a URL or a normal IP address."
"Conflicts arise if you do not have the same management teams on the product."
"The connectivity monitoring part should be included in the core license without any extra charges."
"There is improvement in enhancing proper manageability, policies, and logs. So, log management could be improved."
"More on-prem infrastructure is required when Zscaler Private Access is to be implemented as a single point of entry."
"There are latency issues with the solution. They are small, however, they are there when you compare it to other vendors."
 

Pricing and Cost Advice

"PingSafe is affordable."
"The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity."
"Singularity Cloud Workload Security's pricing is good."
"It was reasonable pricing for me."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"It is cheap."
"PingSafe is priced reasonably for our workload."
"Pricing is based on modules, which was ideal for us."
"The tool's price is good compared to other brands. The tool's subscription is for a year."
"The tool's pricing is fair."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
"It's an affordable solution"
"It's expensive currently. But when purchasing for a large number of users, there's room to negotiate. It's really up to the procurement team."
"The pricing is expensive and on the higher end. Honestly, in my opinion, it is not worth the price."
"Zscaler CASB is an expensive solution."
"The product is a little more expensive than other tools."
"In terms of market positioning, I would describe Zscaler Private Access as offering optimal pricing. Based on our experience, Cato Networks tends to be slightly more expensive."
"The solution has increased prices this year."
"The technical support is good."
report
Use our free recommendation engine to learn which Cloud Security Posture Management (CSPM) solutions are best for your needs.
812,651 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
16%
Manufacturing Company
10%
Insurance Company
5%
Computer Software Company
16%
Financial Services Firm
14%
Government
8%
Manufacturing Company
7%
Computer Software Company
17%
Financial Services Firm
13%
Manufacturing Company
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I am personally not taking care of the pricing part, but when we moved from CrowdStrike to Singularity Cloud Native S...
What needs improvement with PingSafe?
They can provide some kind of alert when a new type of risk is there. There can be a specific type of alert showing t...
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
Another team uses the tool. Tenable acquired Ermetic. I think Tenable has features, stays up to date, and upgrades ev...
What is your primary use case for Tenable Cloud Security?
Right now, I use Tenable as CNAPP, and it is good for the product as it offers enhanced security to users. We did use...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What do you like most about Zscaler SASE?
The most valuable features of Zscaler Private Access are reliability, scalability, and availability.
What is your experience regarding pricing and costs for Zscaler SASE?
Zscaler SASE is quite expensive compared to other solutions. The price is not fixed and it does not include all of th...
 

Also Known As

PingSafe
Ermetic, Ermetic Identity Governance for AWS
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Overview

 

Sample Customers

Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Siemens, AutoNation, GE, NOV
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Cloud Security Posture Management (CSPM). Updated: September 2024.
812,651 professionals have used our research since 2012.