Tenable Security Center and Datadog compete in the cybersecurity and monitoring category. Tenable holds an edge in deep security features, particularly in vulnerability scanning, making it a preferred choice for comprehensive security assessments. Datadog, with its strong monitoring capabilities and cloud application flexibility, is more suitable for environments requiring robust integrations and log management.
Features: Tenable Security Center excels in vulnerability scanning, offering comprehensive assessments and the creation of custom audit files. It is known for its depth in security features. Datadog stands out for its monitoring and log management capabilities, providing extensive integrations and alerting options, which are beneficial for cloud applications.
Room for Improvement: Tenable Security Center could enhance its integration with other reporting tools and provide more flexible queries and reporting features. It also needs better web application scanning and configuration management. Datadog requires improvements in its user interface and a more transparent pricing model. Users seek better support for high cardinality data and improved cost control features.
Ease of Deployment and Customer Service: Tenable Security Center is mainly deployed on-premises, appealing to organizations with private data centers, with reliable technical support despite mixed responsiveness reviews. Datadog, being cloud-based, offers greater deployment flexibility across hybrid and public cloud environments, with positive customer service feedback for its proactive approach.
Pricing and ROI: Tenable Security Center, while effective, is more costly than some competitors like Rapid7, potentially deterring smaller enterprises. Datadog, priced fairly, can become expensive with new features. Both solutions offer substantial ROI through security posture improvements, though the exact value depends on organizational needs and infrastructure size.
If we cannot adjust how to operate the solution, then it becomes very difficult, so hearing and initial tuning are very important.
Through the use of Tenable Security Center, my clients achieve more efficient patching and gain visibility and understanding of security operations, leading to improved resilience and infrastructure insight.
Longer response times and less thorough assistance.
I can scale it extensively with the use of agents, allowing scanning in restrictive environments and loosely connected devices.
Scalability is a bit limited with Tenable Security Center.
The stability of the solution is outstanding.
In future updates, I would like to see AI features included in Datadog for monitoring AI spend and usage to make the product more versatile and appealing for the customer.
The documentation is adequate, but team members coming into a project could benefit from more guided, interactive tutorials, ideally leveraging real-world data.
There should be a clearer view of the expenses.
It's important for Tenable to catch up on testing capabilities that are present in solutions like Qualys.
Translating reports into European languages is especially relevant in Central Eastern Europe, where clients often require reports in local languages.
The reports and plugins for reports and scans could benefit from enhancements.
The setup cost for Datadog is more than $100.
Tenable Security Center is quite expensive, particularly for the CEE region, causing us to lose cases due to its pricing.
The price of Tenable Security Center is not so high; it's relatively a cheaper solution.
The product is somewhat pricey, reflecting its valuable features and status as a high-quality solution in the vulnerability management market.
Our architecture is written in several languages, and one area where Datadog particularly shines is in providing first-class support for a multitude of programming languages.
The technology itself is generally very useful.
The most valuable features of Tenable Security Center for my clients are Vulnerability Priority Rating (VPR) and Asset Criticality Scoring.
The most effective feature of Tenable Security Center for detecting vulnerabilities is its capability for critical mapping.
Tenable Security Center is a relatively very good solution, and I don't think it needs improvement; it's a perfect solution.
Datadog is a comprehensive cloud monitoring platform designed to track performance, availability, and log aggregation for cloud resources like AWS, ECS, and Kubernetes. It offers robust tools for creating dashboards, observing user behavior, alerting, telemetry, security monitoring, and synthetic testing.
Datadog supports full observability across cloud providers and environments, enabling troubleshooting, error detection, and performance analysis to maintain system reliability. It offers detailed visualization of servers, integrates seamlessly with cloud providers like AWS, and provides powerful out-of-the-box dashboards and log analytics. Despite its strengths, users often note the need for better integration with other solutions and improved application-level insights. Common challenges include a complex pricing model, setup difficulties, and navigation issues. Users frequently mention the need for clearer documentation, faster loading times, enhanced error traceability, and better log management.
What are the key features of Datadog?
What benefits and ROI should users look for in reviews?
Datadog is implemented across different industries, from tech companies monitoring cloud applications to finance sectors ensuring transactional systems' performance. E-commerce platforms use Datadog to track and visualize user behavior and system health, while healthcare organizations utilize it for maintaining secure, compliant environments. Every implementation assists teams in customizing monitoring solutions specific to their industry's requirements.
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
Managed on-premises and powered by Nessus technology, the Tenable Security Center (formerly Tenable.sc) suite of products provides the industry’s most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.