We performed a comparison between Tenable.io Container Security and Uptycs based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Container Security."It is advantageous in terms of time-saving and cost reduction."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"The UI is very good."
"It's helped free up staff time so that they can work on other projects."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"The ease of use of the platform is very nice."
"We noted immediate benefits from using the solution."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"The strong security provided by the product in the container environment is its most valuable feature."
"Nessus scanner is very effective for internal penetration testing."
"They have multiple great features."
"I'd like to see better onboarding documentation."
"Their search feature could be better."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"I would like additional integrations."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The initial setup is highly complex."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"We end up facing a lot of issues after upgrades."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Tenable.io Container Security is ranked 21st in Container Security with 7 reviews while Uptycs is ranked 27th in Container Security with 1 review. Tenable.io Container Security is rated 7.8, while Uptycs is rated 8.0. The top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". On the other hand, the top reviewer of Uptycs writes "Great features, good support, and lots of functionality". Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and Red Hat Advanced Cluster Security for Kubernetes, whereas Uptycs is most compared with CrowdStrike Falcon, Aqua Cloud Security Platform, Wiz, Orca Security and Lacework.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.