Try our new research platform with insights from 80,000+ expert users

Prisma Cloud by Palo Alto Networks vs Tenable.io Container Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 24, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Prisma Cloud by Palo Alto N...
Ranking in Container Security
1st
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
111
Ranking in other categories
Web Application Firewall (WAF) (8th), Cloud Security Posture Management (CSPM) (2nd), Cloud-Native Application Protection Platforms (CNAPP) (2nd), Data Security Posture Management (DSPM) (2nd)
Tenable.io Container Security
Ranking in Container Security
26th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Container Security category, the mindshare of Prisma Cloud by Palo Alto Networks is 10.6%, down from 14.8% compared to the previous year. The mindshare of Tenable.io Container Security is 1.1%, down from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
Prisma Cloud by Palo Alto Networks10.6%
Tenable.io Container Security1.1%
Other88.3%
Container Security
 

Featured Reviews

Harsh_Vardhan - PeerSpot reviewer
Provides visibility and control that our customers need
Different modules are valuable for different customers. We are leveraging CSPM. It is one of the best solutions for comprehensive visibility into cloud resource configurations and compliance. It has a lot of out-of-the-box policies, and the visibility that we are getting is impressive. The DSPM module is valuable. This is the latest one that Palo Alto procured from Dig Security. No competitor provides this functionality in a single pane of glass. The support for Linux and container security is also very good. That is the beauty of Prisma Cloud. However, in terms of Windows security, Prisma Cloud is lacking because currently, there is no runtime protection available. The UI is very good. We get all the things within a single UI. It is easy to use. A new user can easily understand it. It is very user-friendly.
SumeshKumar - PeerSpot reviewer
A scalable tool that needs to make its setup phase easier while improving the stability it provides
The initial setup of Tenable.io Container Security is a little bit complex. If you have a bigger cluster or container environment, then the solution's deployment phase may take more than three months since you won't directly go for the solution's block mode. To start things in the solution, you will have to deploy it in SIEM mode, while the detection mode will provide you with visibility in accordance with which you need to take actions for production, which needs time. Regarding the time taken for deployment, for detection, it may not take more than a week, but in production, it may take at least three months to be completed. For the deployment process, there are some scripts available along with some YAML files that you need to run on the cluster, specifically considering the cluster you want to focus more on before creating Tenable Cloud Security Console. After creating Tenable Cloud Security Console, you can proceed with the onboarding process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Prisma scans things and shows all the vulnerabilities and packages that are vulnerable, and which layers, by default, have vulnerabilities. So developers can easily go into the package or a particular layer and make changes to their code. It's very transparent."
"It helps to identify the misconfigurations by monitoring regularly which helps to secure the organization's cloud environment."
"I have not seen any limitations. Everything is customizable. You can do whatever you want, defining the reporting and custom use cases. They recently updated the UI, so it's much better than before."
"Prisma Cloud's most valuable asset is its ability to provide detailed visibility into container activity."
"I was looking for a vulnerability scanner and I was looking for one place in which I could find everything. This tool not only does vulnerability scanning, but it also gives me an asset management tool."
"The application visibility is amazing. For example, sometimes we don't know what a particular custom port is for and what is running on it. The visibility enables us to identify applications, what the protocol is, and what service is behind it. Within Azure, it is doing a great job of providing visibility. We know exactly what is passing through our network. If there is an issue of any sort we are able to quickly detect it and fix the problem."
"The thing that I like the most is that when it comes to runtime events, whenever we see an event, we are able to look through the logs. It is pretty easy to look back through everything that took place."
"Prisma Cloud has enabled us to take a very strong preventive approach to cloud security. One of the hardest things with cloud is getting visibility into workloads. With Prisma Cloud, you can go in and get that visibility, then set up policies to alert on risky behavior, e.g., if there are security groups or firewall ports open up. So, it is very helpful in preventing configuration errors in the cloud by having visibility. If there are issues, then you can find them and fix them."
"Nessus scanner is very effective for internal penetration testing."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"The solution shows you the exploitable vulnerabilities and helps you prioritize."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"It is a scalable solution. Scalability-wise, it is a good solution."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"The strong security provided by the product in the container environment is its most valuable feature."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
 

Cons

"It does not provide runtime security or protection for Windows Server. It is currently lacking in terms of Windows environment."
"The access controls for our bank roles were not granular enough. We needed specific people to do particular actions, and we often had to give some people way too much access for them to be able to do what they needed in Prisma. They couldn't do their jobs if they didn't have that level of access, so other people had to do that part for them. It would help to have more granular role-based access controls."
"Palo Alto needs to add more support staff to improve their response time."
"Prisma Cloud's application security capabilities should be enhanced."
"Prisma Cloud's application security capabilities should be enhanced."
"There are hundreds of built-in policies for AWS and Azure, but GCP and Oracle are not covered as much as AWS. There is a lot of work to do on that part. There is, obviously, a tiny bit of favoritism towards AWS because it has the most market share."
"Sometimes we do get false alerts. That should be improved."
"They need to make the settings more flexible to fit our internal policies about data. We didn't want developers to see some data, but we wanted them to have access to the console because it was going to help them... It was a pain to have to set up the access to some languages and some data."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The solution’s pricing could be improved."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The initial setup is highly complex."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
 

Pricing and Cost Advice

"The pricing is competitive. From what I have seen in the past, it is on par with the others."
"Its licensing cost depends on the type of license such as the business license or the enterprise license. The enterprise license is costlier than the business license, but we get more visibility and more modules. If you have a multi-cloud environment and subscribe to each cloud's native CSPM tool, it is costly. If you are using a single tool like Prisma Cloud, with a single license, you can monitor all environments, such as Google Cloud, Azure, AWS, and Oracle Cloud. The cost of Prisma Cloud is less than the cost of subscribing to the CSPM tool of each cloud provider. This is where Prisma Cloud can save costs."
"One thing we're very pleased about is how the licensing model for Prisma is based on work resources. You buy a certain amount of work resources and then, as they enable new capabilities within Prisma, it just takes those work resource units and applies them to new features. This enables us to test and use the new features without having to go back and ask for and procure a whole new product, which could require going through weeks, and maybe months, of a procurement process."
"The price for Prisma Cloud is reasonable."
"I don't know a better way to do it, but their licensing is a little confusing. That's due to the breadth of different types of technologies they are trying to cover. The way you license depends on where you're securing. When they were Twistlock it was a simple licensing scheme and you could tell what you were doing. Now that they've changed that scheme with Palo Alto, it is quite confusing. It's very difficult to predict what your costs are going to be as you try to expand coverage."
"If a competitor came along and said, "We'll give you half the price," that doesn't necessarily mean that's the right answer, at all. We wouldn't necessarily entertain it that way. Does it do what we need it to do? Does it work with the things that we want it to work with? That is the important part for us. Pricing wasn't the big consideration it might be in some organizations. We spend millions on public cloud. In that context, it would not make sense to worry about the small price differences that you get between the products."
"The pricing structure is easy to understand. Depending on the use case the pricing of the solution can be different. There are not any additional costs to the standard living fees."
"Prisma Cloud is cost-efficient, but the credits are on the higher end."
"I rate the tool's pricing a three out of ten."
"The product does not operate on a pay-per-license model."
"The solution's pricing is neither cheap nor very expensive."
"It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders."
"I rate the product’s pricing a six out of ten."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
868,787 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
14%
Manufacturing Company
10%
Government
6%
Financial Services Firm
15%
Manufacturing Company
12%
Government
10%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business34
Midsize Enterprise20
Large Enterprise58
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise4
 

Questions from the Community

What is your primary use case for Prisma Cloud by Palo Alto Networks?
Prisma Cloud helps support DevSecOps methodologies, making those responsibilities easier to manage.
What Cloud-Native Application Protection Platform do you recommend?
We like Prisma Cloud by Palo Alto Networks, since it offers us incredible visibility into our entire cloud system. We are able to easily see where our container vulnerabilities lie and and where cl...
What do you think of Aqua Security vs Prisma Cloud?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valuable feature and their speed of integration is very good. The initial setup was ...
What do you like most about Tenable.io Container Security?
The tool's most valuable feature is scanning, reporting, and troubleshooting.
 

Also Known As

Prisma Public Cloud, RedLock Cloud 360, RedLock, Twistlock, Aporeto
Tenable FlawCheck, FlawCheck
 

Overview

 

Sample Customers

Amgen, Genpact, Western Asset, Zipongo, Proofpoint, NerdWallet, Axfood, 21st Century Fox, Veeva Systems, Reinsurance Group of America
ServiceMaster
Find out what your peers are saying about Prisma Cloud by Palo Alto Networks vs. Tenable.io Container Security and other solutions. Updated: September 2025.
868,787 professionals have used our research since 2012.