We performed a comparison between Qualys VMDR and Tenable.io Container Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Qualys VMDR is praised for its user-friendly interface, prioritization system, and customizable dashboard. It effectively addresses vulnerabilities and offers valuable scanning capabilities. Tenable.io Container Security excels at analyzing vulnerabilities and identifying misconfiguration. Reviewers said Qualys VMDR could improve by offering more customization options and integrating more seamlessly with other systems. The interface could be clearer, and Qualys could enhance scanning capabilities for IoT and industrial control systems. Tenable.io could improve by automating remediation and CIS benchmarks while enhancing asset visibility and implementing customizable compliance options.
Service and Support: Qualys VMDR's customer service is mostly considered accessible and responsive. However, some reviewers reported slow response times and expressed a desire for more skilled support personnel. Some users encountered technical issues when contacting Tenable.io support.
Ease of Deployment: The Qualys VMDR setup is considered uncomplicated and efficient, requiring only a short amount of time. A few users encountered challenges with integration and ensuring data privacy. Tenable.io Container Security comes with clear setup documentation, making the deployment process smooth.
Pricing: The cost of Qualys VMDR varies depending on the organization's business requirements. Some find it affordable, but others consider it costly compared to alternatives. Tenable.io Container Security's setup cost is determined by the application's page count.
ROI: Qualys VMDR offers users a solid ROI by efficiently identifying vulnerabilities and effectively reducing risks. Tenable.io Container Security users have provided no feedback on ROI so far.
Comparison Results: Qualys VMDR is preferred over Tenable.io Container Security. Users appreciate Qualys VMDR for its simple setup, user-friendly interface, and extensive vulnerability overview. They also liked useful features like continuous monitoring and asset tagging. Tenable.io Container Security falls short in terms of technical support response times and automation features.
"We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"The mean time to detect has been reduced."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"With PingSafe, it's easy to onboard new accounts."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"The most recent is VMDR, which provides a comprehensive overview of how to detect, patch, and remediate specific vulnerabilities."
"Qualys VM's best features are vulnerability management and customizable scoring."
"The biggest benefit is from a security operations perspective, where we are able to drive our security posture upwards by remediating any discovered vulnerabilities."
"The features that are most valuable are the identification, scan features, and the identification of vulnerabilities."
"The most valuable feature of the solution is the external channel."
"Technical support is fantastic."
"The solution is easy to use."
"The initial setup is straightforward."
"The strong security provided by the product in the container environment is its most valuable feature."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"Nessus scanner is very effective for internal penetration testing."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"It is a scalable solution. Scalability-wise, it is a good solution."
"While it is good, I think the solution's console could be improved."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"It would be really helpful if the solution improves its agent deployment process."
"PingSafe is an excellent CSPM tool, but the CWPP features need to improve, and there is a scope for more application security posture management features. There aren't many ASPM solutions on the market, and existing ones are costly. I would like to see PingSafe develop into a single pane of glass for ASPM, CSPM, and CWPP. Another feature I'd like to see is runtime protection."
"We can customize security policies but lack auditing capabilities."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"Bugs need to be disclosed quickly."
"Improve the API speed."
"The customer support is very bad."
"Sometimes the scanning can get overwhelmed and start to drag when a lot of users are trying to scan at once."
"Qualys could be improved in its overall performance compared to other vulnerability management or scanning tools."
"Sometimes we face a problem with accessing the tool and not getting an expected result. From a technology point of view, they need to look into this."
"They should make it accessible for more operating systems."
"The IoT scan is not great."
"There's a need to upgrade or fix the potential vulnerability rate. Around 20,000 potential vulnerabilities were showing in Qualys VMDR, but none of the other tools showed them. When we checked, it wasn't the case. Support explained that even small issues were being counted as vulnerabilities, causing issues in our audit. So, the security features could be improved to identify vulnerabilities accurately."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"The initial setup is highly complex."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Tenable.io Container Security Pricing and Cost Advice →
Qualys VMDR is ranked 11th in Container Security with 77 reviews while Tenable.io Container Security is ranked 21st in Container Security with 7 reviews. Qualys VMDR is rated 8.2, while Tenable.io Container Security is rated 7.8. The top reviewer of Qualys VMDR writes "Good visibility but expensive and needs better support". On the other hand, the top reviewer of Tenable.io Container Security writes "It helps you catch misconfigurations before they go into a production environment where they're harder to deal with". Qualys VMDR is most compared with Tenable Nessus, Tenable Security Center, Rapid7 InsightVM, Microsoft Defender Vulnerability Management and Tenable Vulnerability Management, whereas Tenable.io Container Security is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, Wiz, Trivy and JFrog Xray. See our Qualys VMDR vs. Tenable.io Container Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.