Try our new research platform with insights from 80,000+ expert users

Tenable.io Container Security vs Trend Micro Deep Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.6
Reviews Sentiment
8.1
Number of Reviews
92
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Tenable.io Container Security
Average Rating
8.0
Number of Reviews
8
Ranking in other categories
Container Security (22nd)
Trend Micro Deep Security
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
88
Ranking in other categories
Virtualization Security (1st), Cloud and Data Center Security (7th)
 

Mindshare comparison

Container Security
Virtualization Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Aug 29, 2024
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Amit Goyal - PeerSpot reviewer
Sep 21, 2022
A great solution for identifying vulnerabilities, and it has helped us secure our organization
The best part about Tenable.io Container Security is that they have well-prepared guidebooks for their deployment. Initially, we had queries and questions about deployment, but after we completed it for one or two clients, it was easier for us. The amount of people needed for deployment depends on the engagement and the number of applications. It is usually a consultant on one application, but an entire application security team is involved. On average, deployment takes around one or two weeks. No maintenance is required, but we need to ensure connectivity with the Tenable Portal. This ensures it updates whenever there are new updates or patches from the back end. Tenable.io Container Security is suitable for all companies.
Venugopal Potumudi - PeerSpot reviewer
Nov 7, 2022
Easy to implement, good integrations, and helpful technical support services
It is mainly an antivirus product for both desktops as well as servers. It has additional modules which can be enabled in fast manner. It uses the same agent and additional modules like FIM, Filing Integrity Management and ELP services.  The product is easy to implement and easy to integrate with…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"PingSafe's most valuable feature is its unified console."
"Singularity Cloud Workload Security provides us with better security detection and more visibility. It is another resource that we can use to detect vulnerabilities in our company's systems. For example, it can help us detect new file processes that we are not familiar with, which could be used by attackers to exploit our systems. Singularity Cloud Workload Security can also help us diagnose and analyze data to determine whether it is malicious or not. Singularity Cloud Workload Security is like another pair of eyes that can help us protect our systems from cyberattacks."
"The most valuable features of PingSafe are cloud misconfiguration, Kubernetes, and IaC scanning."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"My favorite feature is Storyline."
"With PingSafe, it's easy to onboard new accounts."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"Nessus scanner is very effective for internal penetration testing."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"The strong security provided by the product in the container environment is its most valuable feature."
"The solution shows you the exploitable vulnerabilities and helps you prioritize."
"It has improved functions by bringing us complete security on our clients' virtual environment."
"Deep Security provides us with a lot of reassurance about security threats. You don't have to worry about a patch not being there in the software. You're confident that all the patches and vulnerabilities are taken care of."
"It provides the type of data and availability that we need to have. We don't have to worry about intrusions."
"DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good."
"One of the most valuable features is that it's a firewall-based solution. We just open the required reports to the server—to server communication—and that's how we use Deep Security."
"There's useful monitoring on offer."
"The performance is good."
"It is stable and we have not faced any challenges during the rolled out"
 

Cons

"The could improve their mean time to detect."
"The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
"Customized queries should be made easier to improve PingSafe."
"A two-month grace period for extended searches would be a valuable improvement."
"Crafting customized policies can be tricky."
"A few YouTube videos could be helpful. There isn't a lot of information out there to look at."
"With Cloud Native Security, we can't selectively enable or disable alerts based on our specific use case."
"We had a glitch in PingSafe where it fed us false positives in the past."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"The solution’s pricing could be improved."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The initial setup is highly complex."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"Deep Security's most valuable features are antivirus and host intrusion detection."
"There could be a centralized management server to oversee all platform functionalities."
"The email relays and proxies could be improved."
"There should be signature-based advanced and responsive features."
"A minor issue in Trend Micro Deep Security is that once the tool is upgraded, it shows some machines as offline or not reported while showing a recent update as outdated. The tool has some server connection issues."
"We'd like to have more application control."
"The working interface and the reports for non-technical people could use improvement. They are a bit scary."
"I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved."
 

Pricing and Cost Advice

"Singularity Cloud Workload Security's pricing is good."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"PingSafe's primary advantage is its ability to consolidate multiple tools into a single user interface, but, beyond this convenience, it may not offer significant additional benefits to justify its price."
"The features included in PingSafe justify its price point."
"Its pricing is okay. It is in line with what other providers were providing. It is not cheap. It is not expensive."
"The pricing for PingSafe in India was more reasonable than other competitors."
"The tool is cost-effective."
"PingSafe is affordable."
"It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders."
"I rate the product’s pricing a six out of ten."
"The product does not operate on a pay-per-license model."
"I rate the tool's pricing a three out of ten."
"The solution's pricing is neither cheap nor very expensive."
"It is a very expensive solution. It would be nice if they lower its price. Its license is based on the machines."
"Most of it is annual at this stage."
"The price of Trend Micro Deep Security could be less expensive."
"If you need an additional 10 or 20 licenses, you will need to pay additional fees."
"We are paying approximately $50,000 each month, it's definitely expensive."
"The tool's pricing is high."
"While the pricing was on the higher side, the manageability and comprehensive alerts provided by the product justified the cost."
"CrowdStrike had an advantage over Trend Micro when it came to pricing. Trend Micro had several modules, so it was a little priced up, but CrowdStrike was not. However, even CrowdStrike has increased their price now, so probably both of them are on par, but the number of modules that Trend Micro has is far more than CrowdStrike. It comes with file integrity monitoring, application control, and web reputation. It has outbound URL protection, and it also has ransomware protection for servers, whereas CrowdStrike Falcon is a straightforward solution."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
16%
Manufacturing Company
10%
Insurance Company
5%
Financial Services Firm
21%
Manufacturing Company
10%
Government
10%
Computer Software Company
10%
Educational Organization
38%
Computer Software Company
11%
Financial Services Firm
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I am personally not taking care of the pricing part, but when we moved from CrowdStrike to Singularity Cloud Native S...
What needs improvement with PingSafe?
They can provide some kind of alert when a new type of risk is there. There can be a specific type of alert showing t...
What do you like most about Tenable.io Container Security?
The tool's most valuable feature is scanning, reporting, and troubleshooting.
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is t...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and container...
 

Also Known As

PingSafe
Tenable FlawCheck, FlawCheck
Deep Security
 

Overview

 

Sample Customers

Information Not Available
ServiceMaster
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Palo Alto Networks, Wiz, SentinelOne and others in Container Security. Updated: October 2024.
814,649 professionals have used our research since 2012.