No more typing reviews! Try our Samantha, our new voice AI agent.

Red Hat Advanced Cluster Security for Kubernetes vs Tenable Security Center comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Red Hat Advanced Cluster Se...
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
Container Security (19th)
Tenable Security Center
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
56
Ranking in other categories
Vulnerability Management (6th), Cloud Security Posture Management (CSPM) (14th), Risk-Based Vulnerability Management (3rd)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Red Hat Advanced Cluster Security for Kubernetes is designed for Container Security and holds a mindshare of 2.0%, down 2.2% compared to last year.
Tenable Security Center, on the other hand, focuses on Risk-Based Vulnerability Management, holds 8.9% mindshare, down 16.5% since last year.
Container Security Mindshare Distribution
ProductMindshare (%)
Red Hat Advanced Cluster Security for Kubernetes2.0%
Wiz11.9%
Prisma Cloud by Palo Alto Networks8.8%
Other77.3%
Container Security
Risk-Based Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Tenable Security Center8.9%
Qualys VMDR12.1%
Rapid7 InsightVM10.5%
Other68.5%
Risk-Based Vulnerability Management
 

Featured Reviews

Daniel Stevens - PeerSpot reviewer
Software Engineer at Galley
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.
reviewer1534134 - PeerSpot reviewer
Head of Information Security at a consultancy with 1,001-5,000 employees
Centralized analytics have strengthened patch visibility and support efficient regulatory reporting
From my experience, I assess the product's analytics capabilities as successful. It helped us significantly with patching and managing the risk of the patching process across all our environments, including network devices with Windows and Unix systems. The product covered several environments and gave us exactly what we needed in our environment. Tenable Security Center's centralized platform helped with risk assessment and management across our IT environments. It covered the patching process, and we previously faced many issues regarding how to patch different environments, how to monitor the patching process, and whether it was successful or not. We obtained good reports showing when patches were closed and the details of each patch, including who executed it and everything related to the patching process until it was closed. This gave us good details about the process which helped us significantly in our reporting and even in audits, whether internal or external. We learned how to close audit issues safely and successfully. We used the dashboards for real-time threat insights and extracted several dashboards from Tenable Security Center. We use these dashboards in our cybersecurity dashboard and committees that we have. These dashboards are part of our committees, especially the cybersecurity committee and other committees that we attend.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Segmentation is the most powerful feature."
"It is easy to install and manage."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"The most valuable feature is the ability to share resources."
"The most valuable feature is the ability to share resources."
"Scalability-wise, I rate the solution a nine out of ten."
"Offers easy management with authentication and authorization features"
"Compliance and vulnerability scans are most valuable; compliance scan helps in validating how our teams are complying, and vulnerability scan helps in future-proofing, and its vulnerability detection is accurate."
"The solution is very intuitive as are the dashboards, and it provides good visibility to the vulnerabilities in the company."
"Tenable SC is good for reporting and alerting. The filtering feature is also very valuable. Its integration with multiple vendors is quite good. It can be integrated with SIEM solutions and PAM solutions such as Thycotic, which is very helpful."
"The tool's dashboard and reporting capabilities match our company's needs since we are able to modify the basic view to create a new dashboard, and it works out very well for our needs."
"The most valuable features of Tenable SC are scanning, reporting, dashboards, and automation."
"Tenable's most valuable features are the credential scan, vulnerability reports, and vulnerability ratings (VPR)."
"We really love the Security Center dashboard. It basically performs vulnerability scanning and then outputs a vulnerability data."
"Tenable Security Center's centralized platform helped with risk assessment and management across our IT environments, covering the patching process and providing detailed reports that significantly supported our reporting and audits and helped us close audit issues safely and successfully."
 

Cons

"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The solution's visibility and vulnerability prevention should be improved."
"The testing process could be improved."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"Red Hat is somewhat expensive."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"We would like to see the inclusion of external IPs and simplified reporting that's easier to deal with"
"The pricing is reasonable, but this could be brought down more aggressively, such as we see with Rapid7, Tenable SC's main competitor."
"The reporting side can be improved. The dashboards are nice, but exporting things out for reports for management was a little tough."
"A good plugin editor would be a good additional option for the Security Center."
"The reporting needs a lot of work on the template."
"The integration is very good, although it still needs to improve."
"The price of Tenable SC is expensive, we pay approximately €70,000 for the license annually."
"The solution is expensive."
 

Pricing and Cost Advice

"The pricing model is moderate, meaning it is not very expensive."
"It's a costly solution"
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"We purchase a yearly basis license for the solution."
"The tool provides competitive pricing."
"Tenable is open-source."
"The pricing depends upon the number of IPs."
"Tenable.sc is more expensive than its competitors."
"I rate the solution's price as seven on a scale of one to ten, where one is cheap and ten is expensive. The tool is quite expensive."
"Tenable SC is priced per asset, with the basic solution starting around US$12,000 for 500 assets."
"I use a local license to perform penetration testing and I'm pretty happy with everything when it comes to pricing and licensing."
"The pricing is more than Nexpose."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
885,667 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
28%
Computer Software Company
8%
Government
8%
Manufacturing Company
7%
Financial Services Firm
11%
Manufacturing Company
10%
Government
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business22
Midsize Enterprise10
Large Enterprise27
 

Questions from the Community

What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for the prevention part, but currently, we need to do it manually. I hear that Palo Al...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling, and everything else.
What advice do you have for others considering Red Hat Advanced Cluster Security for Kubernetes?
The tool's policy management supports our company's compliance efforts since any corporate entity or enterprise must follow specific regulations, which include periodic analysis and configuration r...
What do you like most about Tenable SC?
The tool's dashboard and reporting capabilities match our company's needs since we are able to modify the basic view to create a new dashboard, and it works out very well for our needs.
What is your experience regarding pricing and costs for Tenable SC?
The price of Tenable Security Center is not so high; it's relatively a cheaper solution.
What needs improvement with Tenable SC?
We did conduct a long implementation which relates to what I think can be improved about Tenable Security Center. In some cases, we needed to refer back to Tenable itself, and in other cases, we ne...
 

Also Known As

StackRox
Tenable.sc, Tenable Unified Security, Tenable SecurityCenter
 

Overview

 

Sample Customers

City National Bank, U.S. Department of Homeland Security
IBM, Sempra Energy, Microsoft, Apple, Adidas, Union Pacific
Find out what your peers are saying about Wiz, Palo Alto Networks, SentinelOne and others in Container Security. Updated: March 2026.
885,667 professionals have used our research since 2012.