No more typing reviews! Try our Samantha, our new voice AI agent.

Amazon EKS vs Tenable.io Container Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Amazon EKS
Ranking in Container Security
12th
Average Rating
8.4
Reviews Sentiment
6.2
Number of Reviews
96
Ranking in other categories
Container Management (1st)
Tenable.io Container Security
Ranking in Container Security
23rd
Average Rating
8.0
Reviews Sentiment
6.1
Number of Reviews
9
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Container Security category, the mindshare of Amazon EKS is 0.3%, up from 0.1% compared to the previous year. The mindshare of Tenable.io Container Security is 1.1%, up from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Mindshare Distribution
ProductMindshare (%)
Amazon EKS0.3%
Tenable.io Container Security1.1%
Other98.6%
Container Security
 

Featured Reviews

Mahesh Dash - PeerSpot reviewer
DevOps Consultant at US Contract | Freelancer
Has enabled seamless infrastructure configuration while improving identity integration and monitoring capabilities
It has been since 2019 that I started using Amazon EKS. At that time, it was completely new, and many people were not using it just yet; it started from version 1.21, and right now we are on 1.33. Recently, 1.34 has been launched, but it's not yet available in the service catalog; we can see only 1.33. A lot of improvements have been made. We had numerous add-ons to install manually because Kubernetes is a completely different service than AWS cloud provider, and everyone has opted to use it. After opting, there is an identity that you have to maintain—one at Kubernetes level and one at the AWS provider level. You have to maintain one identity at IAM level and one within the cluster, Amazon EKS. A few things do not make sense within the add-ons, many of the secret providers that read the secret from Secrets Manager and then mount it as a volume. We use a service called EBS CSI driver, which reads the secrets or sensitive data from Secrets Manager and then mounts it as a volume to the pod at runtime. However, that doesn't have a dynamic feature where, if any changes happen in the secrets, it can read and populate in the environment. Sometimes consider your RDS password or OpenSearch password rotates. Amazon EKS doesn't have that feature to read the dynamic one and consider that the password has changed overnight; there is no functionality from the provider to see the changes and then restart the pod or fetch the new value. This often leads to downtime of 12 or even 6 hours, depending on when you realize it, so that needs improvement. Nonetheless, mostly on the add-on side, they have developed a lot; earlier we were installing them manually, but now with EKS auto mode, many things VPC CLI and pod identity service—around four plugins—are installed by default, which is a good thing. However, I believe there should be some solution that is self-contained, covering generic use cases. With the 1.33 release, they have addressed most of my earlier concerns, but I am still looking for some improvements, particularly in CloudWatch monitoring. In IT, we manage two aspects: either the system or the application. Currently, the application logs and monitoring are not very robust in CloudWatch; you can only find things if you are familiar with them. Fortunately, we are familiar, as most of the monitoring involves two types of databases: one is a time series for monitoring data, and the other is an indexing solution for a streaming service. This means we need to get the logs from each node, index them, and populate them on a screen. That part remains a separate service, but if they managed it within Amazon EKS service, where the monitoring is consolidated in one place, you wouldn't need to rely on Prometheus, Grafana, or different services. It would be advantageous to have a consolidated platform for EKS, as Kubernetes is leveraged; monitoring and logging should also be integrated simply by enabling parameters or tags. This would create a self-contained platform where people can onboard and start using it. Currently, I still need to enable logging and monitoring among other things myself; that shouldn't be the case after six or seven years in the market. On a scale from 1 to 10, I would rate Amazon EKS tech support an eight. Some individuals have a deep understanding of the services and can identify potential bottlenecks, especially with load balancer endpoints and certificate management. The shift from NGINX to AWS load balancers has diminished many previous issues. However, not every support engineer meets the same level of expertise, hence why I rate it a solid eight, which I consider decent.
AS
Cyber Security Architect at a security firm with 201-500 employees
Detailed container image reports have improved vulnerability insight and support secure operations
Most valuable are the reports that are quite good, particularly the detailed ones for container image scanning. Tenable.io Container Security is giving me the vulnerability information of Docker images and the information about software bill of materials. However, my challenge at this time is that I am using all these solutions with GitLab Ultimate, and it does not support integration, so I am doing some alternate arrangements which are giving me operational complexity because I need to introduce something else instead of GitLab Ultimate. That is the primary concern regarding the benefits of real-time visibility into my containerized application security status.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"What I find best about Amazon EKS is its simplicity and that I don't need to care about control plane."
"It has always helped me. It is the repository where we store our images...The microservices appear to be well-made, and I don't have any comments on them as I don't see any flaws."
"The main benefits from using Amazon EKS include it being a well-tested product that we can use to deploy our workload; its management system is very efficient, we can deploy things very easily and resolve our issues efficiently, and it has deep AWS integration and a managed control plane."
"The stability is excellent."
"It's a faster solution to adopt on native applications."
"The best features of Amazon EKS are simplicity and the management portal."
"The best feature I found in Amazon EKS is ease of implementation; I'm not very knowledgeable about video software and had to learn it quickly for this specific project, and I found it very easy to implement."
"The good thing was the integration of services. The only thing we had to think about was how we were pushing the code to GitHub or Bitbucket."
"Most valuable are the reports that are quite good, particularly the detailed ones for container image scanning."
"The strong security provided by the product in the container environment is its most valuable feature."
"The solution shows you the exploitable vulnerabilities and helps you prioritize."
"By using Nessus, we are able to finish testing with assured results, in half the time."
"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"Nessus scanner is very effective for internal penetration testing."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"The strong security provided by the product in the container environment is its most valuable feature."
 

Cons

"They need to work on the Amazon plugins on the Kubernetes cluster."
"We have not automated patches to be applied for the Amazon EKS cluster because it will resolve live production services."
"Improvement is needed in reducing the complexity of using EKS."
"I find the pricing for Amazon EKS to be quite expensive. The EKS service itself is free, but you will incur costs for the VMs used as nodes in that cluster."
"The product’s pricing needs improvement."
"They should enhance the Jira integration."
"There is room for improvement in the interface of Amazon EKS."
"They should include some essential configuration features to it."
"The initial setup is highly complex."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"However, my challenge at this time is that I am using all these solutions with GitLab Ultimate, and it does not support integration, so I am doing some alternate arrangements which are giving me operational complexity because I need to introduce something else instead of GitLab Ultimate."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The initial setup is highly complex."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"The solution’s pricing could be improved."
 

Pricing and Cost Advice

"The product is available at such a huge scale in the market since the resources that are offered under the tool are competitively priced and available at a much cheaper rate compared to other solutions."
"Pricing is dependent upon instance type."
"The solution's pricing is fair enough and a little less costly."
"Amazon EKS is not a cheap solution."
"The price can be a problem for small-sized businesses."
"The solution is cheaper than one of its competitors."
"My company paid for the license."
"Amazon EKS has fair pricing. It's better in terms of pricing than other platforms."
"The product does not operate on a pay-per-license model."
"I rate the tool's pricing a three out of ten."
"It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders."
"I rate the product’s pricing a six out of ten."
"The solution's pricing is neither cheap nor very expensive."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
11%
Government
7%
Manufacturing Company
6%
Financial Services Firm
15%
Manufacturing Company
11%
Government
8%
Retailer
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business33
Midsize Enterprise21
Large Enterprise48
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise3
Large Enterprise4
 

Questions from the Community

What do you like most about Amazon EKS?
The product's most valuable features are scalability, observability, and performance.
What is your experience regarding pricing and costs for Amazon EKS?
Pricing for Amazon EKS is quite good, because you can choose the instances which are running under the hood. If you wanted to use smaller machine types, you can control your cost quite well. You ar...
What needs improvement with Amazon EKS?
One limitation I have found with using Amazon EKS is that there is a very big learning curve. It is very complicated to use the tool. I have used Google's GKE which offers an easier framework becau...
What needs improvement with Tenable.io Container Security?
Several things need improvement about Tenable.io Container Security. First, they should support GitLab Ultimate. Second, Docker-based installation would be required because not everybody has proper...
What is your primary use case for Tenable.io Container Security?
I have been dealing with Tenable.io Container Security for almost four to six months.
 

Also Known As

Amazon Elastic Kubernetes Service
Tenable FlawCheck, FlawCheck
 

Overview

 

Sample Customers

GoDaddy, Pearson, FICO, Intuit, Verizon, Honeywell, Logicworks, RetailMeNot, LogMeIn, Conde Nast, mercari, Trainline, Axway
ServiceMaster
Find out what your peers are saying about Amazon EKS vs. Tenable.io Container Security and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.