We performed a comparison between Tenable.io Container Security and Wiz based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Tenable.io Container Security excels at analyzing vulnerabilities and identifying misconfiguration. Wiz stands out for its risk prioritization and Security Graph features. The solution boasts user-friendly dashboards and agentless scanning of cloud environments. Tenable.io could improve by automating remediation and CIS benchmarks while enhancing asset visibility and implementing customizable compliance options. Wiz could benefit from better logging support, better EKS and Kubernetes compatibility, and an improved remediation workflow.
Service and Support: Some users encountered technical issues when contacting Tenable.io support. Wiz has been largely praised for their exceptional customer service and support.
Ease of Deployment: Tenable.io Container Security comes with clear setup documentation, making the deployment process smooth. Wiz's setup was described as straightforward, requiring only a short amount of time.
Pricing: Tenable.io Container Security's setup cost is determined by the application's page count. Some users find Wiz expensive, while others think the price is reasonable given its capabilities.
ROI: Wiz delivers instant advantages, enhanced productivity, and a considerable return on investment for companies. Tenable.io Container Security users have provided no feedback on ROI so far.
Comparison Results: Users prefer Tenable.io Container Security over Wiz for its simple setup process and extensive vulnerability database, and transparent pricing structure based on application size. Reviewers wish Wiz had better Kubernetes compatibility and a streamlined remediation workflow.
"It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"The cloud misconfiguration is the most valuable feature."
"We use the infrastructure as code scanning, which is good."
"As a frequently audited company, we value PingSafe's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Nessus scanner is very effective for internal penetration testing."
"The strong security provided by the product in the container environment is its most valuable feature."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"The CSPM module has been the most effective. It was easy to deploy and covered all our accounts through APIs, requiring no agents. Wiz provides instant visibility into high-level risks that we need to address."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"Out of all the features, the one item that has been most valuable is the fact that Wiz puts into context all the pieces that create an issue, and applies a particular risk evaluation that helps us prioritize when we need to address a misconfiguration, vulnerability, or any issue that would put our environment into risk."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"The solution is very user-friendly."
"The vulnerability management modules and the discovery and inventory are the most valuable features. Before using Wiz, it was a very manual process for both. After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud. We're able to correspond and understand what the vulnerability landscape looks like a lot faster."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The security baseline and vulnerability assessments is the valuable feature."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"PingSafe can improve by eliminating 100 percent of the false positives."
"They need more experienced support personnel."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The initial setup is highly complex."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"Given the level of visibility into all the cloud environments Wiz provides, it would be nice if they could integrate some kind of mechanism to better manage tenants on multiple platforms. For example, let's say that some servers don't have an application they need, such as an antivirus. Wiz could include an API or something to push those applications out to the servers. It would be great if you could remedy these issues directly from the Wiz platform."
"Wiz's reporting capabilities could be refined a bit. They are making headway on that, but more executive-style dashboards would be nice. They just implemented a community aspect where you can share documents and feedback. This was something users had been requesting for a while. They are listening to customer feedback and making changes."
"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform."
"The remediation workflow within the Wiz could be improved."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging."
"We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade... We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately."
"The solution's container security could be improved."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Tenable.io Container Security is ranked 21st in Container Security with 7 reviews while Wiz is ranked 2nd in Container Security with 12 reviews. Tenable.io Container Security is rated 7.8, while Wiz is rated 9.2. The top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". On the other hand, the top reviewer of Wiz writes "Multiple features help us prioritize remediation, and agentless implementation reduces overhead". Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Trivy, Red Hat Advanced Cluster Security for Kubernetes and SUSE NeuVector, whereas Wiz is most compared with Prisma Cloud by Palo Alto Networks, Orca Security, Microsoft Defender for Cloud, AWS Security Hub and Lacework. See our Tenable.io Container Security vs. Wiz report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.