Try our new research platform with insights from 80,000+ expert users

CrowdStrike Falcon Cloud Security vs Tenable Cloud Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Ranking in Cloud Security Posture Management (CSPM)
3rd
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Compliance Management (1st)
CrowdStrike Falcon Cloud Se...
Ranking in Container Security
4th
Ranking in Cloud Workload Protection Platforms (CWPP)
6th
Ranking in Cloud Security Posture Management (CSPM)
8th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
7th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
28
Ranking in other categories
Application Security Tools (12th), Cloud Infrastructure Entitlement Management (CIEM) (2nd), Application Security Posture Management (ASPM) (3rd)
Tenable Cloud Security
Ranking in Container Security
24th
Ranking in Cloud Workload Protection Platforms (CWPP)
12th
Ranking in Cloud Security Posture Management (CSPM)
19th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
14th
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
11
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (11th), Cloud Infrastructure Entitlement Management (CIEM) (4th)
 

Mindshare comparison

As of September 2025, in the Cloud-Native Application Protection Platforms (CNAPP) category, the mindshare of SentinelOne Singularity Cloud Security is 4.5%, up from 1.7% compared to the previous year. The mindshare of CrowdStrike Falcon Cloud Security is 5.6%, up from 5.2% compared to the previous year. The mindshare of Tenable Cloud Security is 2.8%, up from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud-Native Application Protection Platforms (CNAPP) Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security4.5%
CrowdStrike Falcon Cloud Security5.6%
Tenable Cloud Security2.8%
Other87.1%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

Mike Bulyk - PeerSpot reviewer
Custom correlation searches enhance threat detection efficiency
Singularity Cloud Security significantly reduced our organization's threat detection time by providing immediate data visibility. This allows our team to analyze telemetry in real-time, query it, and identify anomalies or potential threats using the Singularity platform. We can create rules that automatically trigger alerts based on this real-time data, enabling immediate response. This instant threat detection and response capability is a major improvement over our previous reliance on multiple tools with delayed data flows. Singularity Cloud Security eliminates those delays, saving valuable time in incident response scenarios. MTTR and MTTD are critical metrics for incident response processes. They measure the time it takes to fully address an incident, from initial detection to complete remediation. Minimizing these times is crucial to limit damage, as attackers can quickly exploit vulnerabilities and compromise additional systems. Rapid detection and response are essential to disrupt attackers and prevent further progression within the attack chain. Singularity Cloud helps reduce false positives by allowing engineers direct access to data. This access enables querying, validation, and the creation of correlation searches for improved data analysis. Instead of a black box approach, Singularity provides full visibility into the code and syntax used, increasing confidence in the results. Ultimately, Singularity offers greater control over correlation searches, detection rules, and response scenarios due to the enhanced engagement and control it provides. Singularity's ability to create custom correlation searches significantly reduces noise by avoiding reliance on generic, pre-built searches that often lead to false positives in diverse organizational environments. This targeted approach results in a high positive rate and efficacy, allowing for focused detection and response. By designing and running custom searches, Singularity minimizes the need to sift through irrelevant alerts, unlike systems using default rules that inundate analysts with noise. This translates to a very low noise-to-efficacy ratio, enabling efficient and accurate incident response. Singularity Cloud offers valuable data and capabilities extending beyond security, benefiting various business units. For example, it helped troubleshoot a newly introduced service with limited telemetry. My team created custom correlation searches to track specific event types, confirming the software's functionality. This success garnered positive feedback throughout the company, reaching even the CIO and CSR, as it enabled the business to showcase the software's effectiveness in a way that was previously impossible. SentinelOne improves our regulatory compliance by fulfilling the endpoint detection and response requirements of various frameworks. Many federal regulations require businesses to meet specific security standards, including those related to endpoint, identity, and cloud security. SentinelOne enables us to meet these requirements and assure potential partners that we have a robust security posture. This strengthens our partnerships and streamlines procurement processes, demonstrating how SentinelOne contributes to our compliance efforts. SentinelOne's evidence-based reporting, particularly the CNS reports, fosters trust due to the transparency of the data source and the ability to understand the underlying mechanisms. Knowing the search criteria, data types, and information gathering process, especially when customized for detection engineering, creates confidence in the product and the relationship with SentinelOne. This transparency and customization allow users to delve into the mechanics of the reporting, understand its functionality, and ultimately trust the evidence provided. AI is a crucial consideration for security strategies. While some view AI as a potential replacement for human analysts, others see it as a powerful tool to enhance their capabilities. The latter approach emphasizes AI's ability to accelerate incident response, improve threat detection, and provide valuable insights to analysts. This perspective suggests that AI should be used to augment human expertise, enabling analysts to make faster and more informed decisions, particularly in prioritizing threats and developing a sixth sense for identifying malicious activity. By integrating AI as an enabler, organizations can empower their security teams to become more efficient and effective, ultimately strengthening their overall security posture.
Saif Ullah Khan - PeerSpot reviewer
Boosts security by automatically blocking applications or activities, but query responses have been slower recently
For the past six months, we have been facing some issues. Because it is a cloud-based infrastructure, it has been getting slower. There are no bugs because they release updates continuously. We highly appreciate that, but during hunting or running a query on different logs, the time frame has increased in the past six months. It takes longer to give us the results. Another issue is the lack of proper documentation. During investigations, there is no proper documentation available. This is a problem because many people are saying there should be proper documentation explaining what CrowdStrike captures from the machine and the meaning of it.
Antonio Scola - PeerSpot reviewer
Offers reliable security support and encourages a safe migration to cloud environments while there is room for better reseller collaboration
I really don't know to tell the truth because we sell many solutions and don't sell exclusively Tenable, so I'm not in a condition to give a precise definition of what could be improved. My perception is this: when customer A needs Tenable Cloud Security, we introduce and demonstrate it. They POC, they appreciate it. The solution serves in such use cases ABC. I am very pragmatic and straightforward - as long as they use or want the solution, I am interested. If they don't, my question is what are the main objections? They may discuss pricing, or they may say they thought the solution had certain technical capabilities that they could not find.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We liked the search bar in SentinelOne Singularity Cloud Security. It is a global search. We were able to get some insights from there."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"SentinelOne Singularity Cloud Security offers security solutions for both Kubernetes and CI/CD pipelines."
"Cloud Native Security offers attack path analysis."
"The user-friendliness is the most valuable feature."
"Singularity Cloud Workload Security provides us with better security detection and more visibility. It is another resource that we can use to detect vulnerabilities in our company's systems. For example, it can help us detect new file processes that we are not familiar with, which could be used by attackers to exploit our systems. Singularity Cloud Workload Security can also help us diagnose and analyze data to determine whether it is malicious or not. Singularity Cloud Workload Security is like another pair of eyes that can help us protect our systems from cyberattacks."
"SentinelOne Singularity Cloud Security's graph explorer is a valuable tool that lets us visualize all connected services."
"The dashboard is intuitive in terms of design and functionality. Additionally, it gives me an email for all the findings that are open."
"The most valuable feature of CrowdStrike Falcon Cloud Security is its lightweight sensor, taking minimal space and not impacting server performance."
"The most valuable features are the real-time response, which allows me to log into a machine to pull files and check signatures for malicious activities, and the ability to restrict USB block storage usage on endpoints by policy."
"We like the solution's management and monitoring tools for our network. We use it to monitor our network between workstations and outside our organization. The AI provides useful visualizations of our network on a dashboard."
"The alerts are clearer, and the capabilities are much better than the others."
"The RTR feature stands out as particularly valuable to me due to its capability to log into machines."
"Cloud security posture management (CSPM) is most valuable."
"The most valuable feature of Falcon Cloud Security is its comprehensive threat-hunting ability."
"Falcon is a cloud-based technology, so its resource usage is light. You deploy the agents to your endpoints, but the processing is done on the cloud, so you're CPU utilization is only about 2 percent. Some others solutions use between 30 to 60 percent."
"The product's visibility and remediation work fine for me."
"The solution’s vulnerability management feature has helped us identify and mitigate risks well."
"If you have multi-cloud tenancy using AWS and Azure, you can have a single dashboard where you can onboard all the cloud infrastructure and have visibility into it."
"The product's deployment phase is easy."
"The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time."
"Ermetic can provide super visibility for our cloud environment (we are using AWS)."
"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
 

Cons

"I would like to see the map feature improve. It's good, but it isn't fully developed. It lets us use custom resources and policies but does not allow us to perform some actions. I would also like more custom integration and runtime security for Kubernetes."
"The documentation that I use for the initial setup can be more detailed or written in a more user-friendly language to avoid troubles."
"While SentinelOne offers robust security features, its higher cost may present a challenge for budget-conscious organizations."
"We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating."
"SentinelOne Singularity Cloud Security filtering has some areas that cause problems, and to achieve single sign-on functionality, a break-glass feature, which is currently unavailable, is necessary."
"The Automation tab is an add-on that doesn’t work properly. They provide a list of scripts that don’t work and I have asked support to assist but they won’t help. When running on various endpoints the script doesn’t work and if it does, it’s only a couple. There are a lot of useful scripts that would be beneficial to run forensics, event logs, and process lists running on the endpoint."
"The Singularity Cloud Security console is experiencing delays in clearing resolved issues, which can take over an hour to be removed from the display."
"SentinelOne Singularity Cloud Security could be improved with easier integrations to the Singularity Data Lake, particularly for various vendors."
"There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage."
"For the past six months, we have been facing some issues. Because it is a cloud-based infrastructure, it has been getting slower."
"There were some integration issues with this product."
"Customers would benefit it CrowdStrike adopted some of SentinelOne's technologies."
"There are no bugs because they release updates continuously. We highly appreciate that, but during hunting or running a query on different logs, the time frame has increased in the past six months. It takes longer to give us the results."
"The user interface needs improvement as it's sometimes difficult to locate specific dashboards or reports."
"The threat intelligence and user behavioral analysis could be more comprehensive."
"The tool could give us more templates so that people who are not updated with the platform can easily get acquainted with how to secure and utilize the product more."
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
"The product must provide more features."
"I have faced several bug incidents with the solution"
"In my experience, Tenable Cloud Security is not very stable."
"If Tenable Cloud Security offers a complete Cnapp solution with CWP, CIEM, and Waap security, it will be able to compete with other competitors."
"There is a need for the support team to improve their response time since it is one of the areas where the product's technical team has certain shortcomings."
"I didn't find anything that wasn't useful or needed to be added."
 

Pricing and Cost Advice

"PingSafe is priced reasonably for our workload."
"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"We found it to be fine for us. Its price was competitive. It was something we were happy with. We are not a Fortune 500 company, so I do not know how pricing scales at the top end, but for our cloud environment, it works very well."
"PingSafe is affordable."
"SentinelOne Singularity Cloud Security is costly."
"I understand that SentinelOne is a market leader, but the bill we received was astronomical."
"The tool is cost-effective."
"CrowdStrike Falcon Cloud Security is pricy."
"It's an expensive product"
"I am not the one who handled the pricing. A different team worked on it, but it is pretty expensive."
"It is expensive, but it adds value."
"The price is not too high, it is okay."
"CrowdStrike Falcon Cloud Security is very expensive for us. Last month, we had a big issue that took much time and money to resolve. It slowed down our business and required our management team to get involved. We had a problem similar to the "Blue Screen of Death" issue many US companies faced. This incident used up many of our IT resources in just a few months. That's why we're looking for a replacement tool now."
"The pricing is fair for what you get. I'd rate them a solid nine out of ten in terms of pricing."
"CrowdStrike Falcon is very expensive."
"The tool's price is good compared to other brands. The tool's subscription is for a year."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
"The tool's pricing is fair."
report
Use our free recommendation engine to learn which Cloud-Native Application Protection Platforms (CNAPP) solutions are best for your needs.
867,349 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
9%
Government
6%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
8%
Retailer
5%
Computer Software Company
14%
Government
10%
Financial Services Firm
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business43
Midsize Enterprise21
Large Enterprise53
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise6
Large Enterprise11
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise4
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
What do you like most about CrowdStrike Falcon Cloud Security?
It's easy to gather insights and conduct analysis about existing threats.
What is your experience regarding pricing and costs for CrowdStrike Falcon Cloud Security?
It's an expensive product. The solution costs around $60 for a single user on a yearly basis. I would rate the pricin...
What needs improvement with CrowdStrike Falcon Cloud Security?
I am not part of the current monitoring team, so I do not know how they feel about the tool. I am sharing information...
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
I think Tenable Cloud Security could be improved with more clear licensing. What I would like to see improved with li...
What is your primary use case for Tenable Cloud Security?
My main use case for Tenable Cloud Security is managing our security compliance and security posture. I use Tenable C...
 

Also Known As

PingSafe
CrowdStrike Falcon ASPM
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about CrowdStrike Falcon Cloud Security vs. Tenable Cloud Security and other solutions. Updated: August 2025.
867,349 professionals have used our research since 2012.