Tenable.io Container Security Reviews & Product Details

Tenable.io Container Security Overview

What is Tenable.io Container Security?

Security integrated into DevOps. Protect containers in development and operations.

Tenable.io Container Security Details
Product Description

Security integrated into DevOps. Protect containers in development and operations.


Seller Details
Seller
Tenable
Company Website
Year Founded
2002
HQ Location
Columbia, MD
Twitter
@TenableSecurity
75,687 Twitter followers
LinkedIn® Page
www.linkedin.com
1,421 employees on LinkedIn®
Show More
Answer a few questions to help the Tenable.io Container Security community
Have you used Tenable.io Container Security before?
Yes

Tenable.io Container Security Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 2 Tenable.io Container Security reviews
Showing 2 reviews
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
All Industries
Region
Already have Tenable.io Container Security?
Write a Review
CI
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Invitation from G2
What do you like best?

single dashboard with other tenable results Review collected by and hosted on G2.com.

What do you dislike?

feeding results into archer for tracking was difficult Review collected by and hosted on G2.com.

Recommendations to others considering the product:

establish baseline requirements in advance Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

establishing an inventory of containers from which developers can choose that are secure Review collected by and hosted on G2.com.

Show More
Show Less
UC
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Invitation from the seller
What do you like best?

It is easy to import an existing registry through conenctor function Review collected by and hosted on G2.com.

What do you dislike?

You should allow to communicate through a specific port and it is not possible to change it Review collected by and hosted on G2.com.

Recommendations to others considering the product:

To read carefully the specifications prior to the implementation and desing an architecture that not fully fits this requirements in order to evaluate it they can help you Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Change port to adapt it to the client requirements Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Tenable.io Container Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Dynatrace Logo
Dynatrace
4.5
(1,020)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
2
Qualys Cloud Platform. Logo
Qualys Cloud Platform.
4.1
(58)
Vulnerability Management
3
WhiteSource Software Logo
WhiteSource Software
4.4
(49)
Open Source license and security management software
4
Threat Stack Logo
Threat Stack
4.4
(34)
Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss.
5
Aqua Security Logo
Aqua Security
4.5
(1)
Aqua Security provides scalable security for the complete development-to-deployment lifecycle of containerized applications.
6
Prisma Cloud Compute Logo
Prisma Cloud Compute
3.5
(1)
Prisma Cloud Compute provides an enterprise suite for container security that address risks on the host and within the containerized application it enable enterprises to enforce consistent security policies from development to production.
7
Sysdig Platform Logo
Sysdig Platform
4.5
(25)
Sysdig is an open source, system-level exploration that capture system state and activity from a running Linux instance, then save, filter and analyze.
8
Trend Micro Deep Security Logo
Trend Micro Deep Security
4.4
(18)
Trend Micro Deep Security is designed to mprove visibility and simplify security management across physical, virtual, and cloud environments.
9
Lacework Logo
Lacework
4.6
(24)
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unmatched visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.
10
StackRox Logo
StackRox
5.0
(12)
StackRox enables enterprises to detect and disrupt attacks and make their container environments more resilient. Our solutions represent a unique, innovative approach to securing containers across their lifecycle, from build to runtime.
Show More