Try our new research platform with insights from 80,000+ expert users

Red Hat Advanced Cluster Security for Kubernetes vs Tenable.io Container Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (4th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Red Hat Advanced Cluster Se...
Ranking in Container Security
20th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
Tenable.io Container Security
Ranking in Container Security
27th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.4%, up from 1.0% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.4%, down from 3.0% compared to the previous year. The mindshare of Tenable.io Container Security is 1.1%, down from 1.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Phat Pham - PeerSpot reviewer
A great management console, and visibility, but needs more bandwidth
The management console is the most valuable feature. It offers a variety of options for us to view. If a threat is detected, there is a specific area where we can view the different incidents that have occurred. This is the threat that is associated with that host. We can also have deep visibility into the activities within the host within a specific time frame. This is very useful, especially when we can view the process tree. This allows us to see how one process propagates to another process, and so on. We can then look back to the beginning of the process to see where it came from. How was it downloaded? Which URL did it come from? Was it internal or external? This information has been very helpful when we are diagnosing a specific incident. The File Fence feature is also useful. When we view a file within Singularity Cloud Workload Security, we can put it into our sandbox to see what type of file it is and whether it is malicious or not. There is also the scan feature, which is very helpful. When we scan a host remotely, it can return to us with information about the detections that were made on that host. This can help us to identify and alert others about any potential threats.
Igor Khalitov - PeerSpot reviewer
Allows teams to create their own virtual spaces and share resources
They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it. They're trying to create it so that it's easier, like on Cloud Foundry. If you specify some service, you just go to the marketplace on Cloud Foundry and find something you want to create, like a database of a certain size and CPU, and it's automatically created for you. In your application, you just create a manifest file where you specify the name of this source. If you automatically bind the application to that source, that would be like a database. There is no need to manually produce a database. By binding your application to the source, Cloud Foundry automatically creates a connection for you for your source code. So you basically don't use any ODBC or JDBC objects for your source code.
Yusuf-Hashmi - PeerSpot reviewer
It helps you catch misconfigurations before they go into a production environment where they're harder to deal with
They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed. Asset visibility is also critical. While Tenable provides visibility into containers, it could be done much better. Compliance is one of the most crucial aspects of container security. It should be more customizable. For example, I would like a rating system where Tenable reports a risk score for each container based on user-defined metrics, such as severity, activity, or compliance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Overall, I would rate it a ten on ten for cloud security."
"The best features we value in SentinelOne Singularity Cloud Security include compliance monitoring features, as we are a frequently audited company. They provide reports with compliance scores, showing how well we meet certain regulatory standards, such as HIPAA, and we can show our compliance as a percentage."
"Its performance impact on the systems is low, which means there is a minimal impact on system performance compared to traditional antivirus solutions."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"It saves time, makes your environment more secure, and improves compliance. SentinelOne Singularity Cloud Security helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security."
"Cloud Security has provided a single view to observe all workloads, prioritization for handling cloud assets, and reduced noise by distinguishing false positives effectively."
"Singularity Cloud Security's most valuable features are its ease of scalability and comprehensive security measures."
"The most valuable feature of the solution is its monitoring feature."
"I am impressed with the tool's visibility."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"The technical support is good."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"Segmentation is the most powerful feature."
"The most valuable feature is the ability to share resources."
"Scalability-wise, I rate the solution a nine out of ten."
"The solution shows you the exploitable vulnerabilities and helps you prioritize."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"Nessus scanner is very effective for internal penetration testing."
"It is a scalable solution. Scalability-wise, it is a good solution."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"The strong security provided by the product in the container environment is its most valuable feature."
 

Cons

"The documentation could be better."
"The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
"The documentation could be better."
"I have noticed that the dashboard occasionally gets stuck, potentially due to internet issues. It could benefit from enhancements to be more robust and smoother."
"SentinelOne Singularity Cloud Security could be improved with easier integrations to the Singularity Data Lake, particularly for various vendors."
"There is a bit of a learning curve for new users."
"While SentinelOne offers robust security features, its higher cost may present a challenge for budget-conscious organizations."
"To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"Red Hat is somewhat expensive."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The solution's visibility and vulnerability prevention should be improved."
"The solution's price could be better."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The testing process could be improved."
"The initial setup is highly complex."
"The solution’s pricing could be improved."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
 

Pricing and Cost Advice

"PingSafe falls somewhere in the middle price range, neither particularly cheap nor expensive."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"It was reasonable pricing for me."
"PingSafe is fairly priced."
"I am not involved in the pricing, but it is cost-effective."
"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"We purchase a yearly basis license for the solution."
"It's a costly solution"
"The pricing model is moderate, meaning it is not very expensive."
"I rate the product’s pricing a six out of ten."
"I rate the tool's pricing a three out of ten."
"It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders."
"The solution's pricing is neither cheap nor very expensive."
"The product does not operate on a pay-per-license model."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
851,604 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
Financial Services Firm
25%
Computer Software Company
12%
Government
10%
Manufacturing Company
7%
Financial Services Firm
18%
Government
13%
Manufacturing Company
10%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What needs improvement with PingSafe?
The price is on the higher side. The dashboard can be more detailed.
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the b...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for th...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling,...
What do you like most about Tenable.io Container Security?
The tool's most valuable feature is scanning, reporting, and troubleshooting.
 

Also Known As

PingSafe
StackRox
Tenable FlawCheck, FlawCheck
 

Overview

 

Sample Customers

Information Not Available
City National Bank, U.S. Department of Homeland Security
ServiceMaster
Find out what your peers are saying about Red Hat Advanced Cluster Security for Kubernetes vs. Tenable.io Container Security and other solutions. Updated: April 2025.
851,604 professionals have used our research since 2012.