Try our new research platform with insights from 80,000+ expert users

Tenable.io Container Security vs Trivy comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
2nd
Average Rating
8.6
Reviews Sentiment
7.9
Number of Reviews
106
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Tenable.io Container Security
Ranking in Container Security
23rd
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
8
Ranking in other categories
No ranking in other categories
Trivy
Ranking in Container Security
13th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.1%, up from 1.1% compared to the previous year. The mindshare of Tenable.io Container Security is 1.3%, down from 1.8% compared to the previous year. The mindshare of Trivy is 6.8%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Victor-Akidiva - PeerSpot reviewer
Shows you the exploitable vulnerabilities and helps you prioritize
We were able to integrate Tenable.io Container Security into our CI/CD pipeline. We were running on GitHub Enterprise. We could integrate and scan our pipelines and containers and automate that whole process. The solution's compliance monitoring capabilities are really good because you can perform compliance scans using a number of standards. The solution was deployed on the cloud for us. Tenable.io Container Security has delivered significant financial and operational benefits to our organization. Compliance obligations are very important in financial services. The solution allows us to automate scans and perform many different types of scans across our environments, which is very good. I would recommend the solution to other users because it is one of the top players. Tenable.io Container Security is a good tool for you if you want a tool that does most of the work for you. Overall, I rate the solution a nine out of ten.
Utsav Sharma - PeerSpot reviewer
Maintain operational efficiency by detecting misconfigurations and vulnerabilities
The vulnerability scanning feature is excellent as it supports various container capabilities like Docker and Sharma. It also offers repository scanning in the source code domain, allowing pre-push code scans. The misconfiguration detection works well for CloudFormation, Docker files, and Terraform. Its compliance support, like NIST, ensures that configurations align with standards. Trivy helps me significantly detect misconfigurations missed by the ops engineers or in Terraform by the naked eye. It ensures that my deployments are free of misconfigurations and vulnerabilities.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"With PingSafe, it's easy to onboard new accounts."
"The most valuable aspect of Singularity Cloud Security is its unified dashboard."
"We use the infrastructure as code scanning, which is good."
"The visibility is the best part of the solution."
"SentinelOne Singularity Cloud Security offers several valuable features, most notably the rapid vulnerability notifications that provide timely alerts regarding our infrastructure."
"SentinelOne's behaviour analytics are valuable because they detect anomalies and malicious behaviour that signature-based solutions might miss."
"Our organization is growing steadily, so our infrastructure is expanding, and we're managing more technical resources. Singularity Cloud Security helps us track our resources so that we don't get lost in the overwhelming volume of things and ensures we follow best practices. The solution gives us better visibility into our resources and enables faster resolution."
"It has a user-friendly dashboard that I can access without any difficulty."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"It is a scalable solution. Scalability-wise, it is a good solution."
"The strong security provided by the product in the container environment is its most valuable feature."
"Nessus scanner is very effective for internal penetration testing."
"The solution shows you the exploitable vulnerabilities and helps you prioritize."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"I rate Trivy a nine out of ten."
"Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images."
"The vulnerability scanning feature is excellent as it supports various container capabilities like Docker and Sharma."
"It is open-source."
"Trivy's open source nature and wide functionality are incredibly valuable."
"Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images."
"The most valuable feature of Trivy is its easy integration with the CI/CD pipeline."
"Trivy's open source nature and wide functionality are incredibly valuable."
 

Cons

"A few YouTube videos could be helpful. There isn't a lot of information out there to look at."
"The documentation that I use for the initial setup can be more detailed or written in a more user-friendly language to avoid troubles."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"There is a bit of a learning curve for new users."
"While the future roadmap presented by SentinelOne appears promising, I hope the envisioned advancements are realistically achievable and that the gap between current offerings and long-term goals is not too significant."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"The initial setup is highly complex."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"The solution’s pricing could be improved."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"Trivy generates many false positives, flagging non-existent vulnerabilities. Improvements could include better contextual analysis or granular filtering."
"In our CI/CD pipelines, Trivy lacks built-in functionality for report analysis."
"Currently, the container image scanning is static. A dynamic scanning capability during runtime would be a significant advantage."
"In our CI/CD pipelines, Trivy lacks built-in functionality for report analysis."
"For malware detection, I need to use two tools: Trivy as my anomaly scanner and ClamAV. I am integrating these two tools into the CI pipeline. If both malware and anomaly detection could be managed by one tool, I would not need to depend on two tools. That would be my suggestion."
"The only problem is that Trivy does not support reporting features such as generating reports in CSV, which is useful for auditing and reporting."
"Trivy can improve by providing an output in PDF format."
"Trivy generates many false positives, flagging non-existent vulnerabilities."
 

Pricing and Cost Advice

"The features included in PingSafe justify its price point."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"It was reasonable pricing for me."
"I am not involved in the pricing, but it is cost-effective."
"Singularity Cloud Workload Security's pricing is good."
"It is cost-effective compared to other solutions in the market."
"PingSafe is fairly priced."
"The cost for PingSafe is average when compared to other CSPM tools."
"The solution's pricing is neither cheap nor very expensive."
"I rate the product’s pricing a six out of ten."
"The product does not operate on a pay-per-license model."
"It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders."
"I rate the tool's pricing a three out of ten."
Information not available
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
842,296 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Financial Services Firm
20%
Government
11%
Manufacturing Company
9%
Computer Software Company
8%
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of criti...
What do you like most about Tenable.io Container Security?
The tool's most valuable feature is scanning, reporting, and troubleshooting.
What needs improvement with Trivy?
One drawback I have observed with Trivy is the difficulty in building or integrating a UI, particularly for an operat...
What is your primary use case for Trivy?
The main use case for Trivy is to scan Docker images or packages for CVEs, specifically for vulnerabilities. I use th...
What advice do you have for others considering Trivy?
I rate Trivy an eight out of ten. This rating reflects its open-source nature, comprehensive scanning capabilities, a...
 

Also Known As

PingSafe
Tenable FlawCheck, FlawCheck
No data available
 

Overview

 

Sample Customers

Information Not Available
ServiceMaster
Information Not Available
Find out what your peers are saying about Tenable.io Container Security vs. Trivy and other solutions. Updated: March 2025.
842,296 professionals have used our research since 2012.