

Tenable Vulnerability Management and SentinelOne Singularity Cloud Security compete in the cybersecurity market, focusing on vulnerability management and endpoint security, respectively. SentinelOne seems to have the upper hand with its advanced real-time threat detection and automated remediation features enhancing endpoint security more effectively.
Features: Tenable offers comprehensive vulnerability scanning, robust visibility across environments, and integration capabilities with continuous monitoring for both cloud and on-premises settings. SentinelOne provides advanced real-time threat detection, automated remediation, and seamless third-party integrations, effectively identifying and neutralizing threats rapidly.
Room for Improvement: Tenable needs enhancements in user-friendliness, reporting customization, and flexible pricing to appeal to SMBs. Users face slow technical support and desire better third-party integration. SentinelOne could improve resource efficiency, reduce false positives, and enhance the search function and support for large-scale deployments. Better documentation and comprehensive integration options are also needed.
Ease of Deployment and Customer Service: Tenable offers hybrid deployment for both on-premises and cloud environments but experiences in technical support vary, with challenges in response times and resolution efficiency. SentinelOne, cloud-centric in nature, is noted for swift deployment in public cloud infrastructures, with customer support receiving generally positive feedback, although alert accuracy and technical guidance could improve.
Pricing and ROI: Tenable is considered costly but provides substantial ROI through its thorough vulnerability management, suiting larger enterprises, although smaller businesses find the pricing prohibitive. SentinelOne is competitively priced, offering flexible licensing options appealing to diverse organizations. Users value its cost-to-benefit ratio compared to other cloud security solutions, but some suggest enhancements in subscription flexibility.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
It needs improvement in response time and addressing feature requests promptly.
The technical support of Tenable Vulnerability Management is available 24/7, and whenever we require support, we can get it within five minutes.
We had used Tenable's expert support services in order to make sure that we run Tenable Vulnerability Management on a continuous basis and are able to utilize their services.
I would rate the scalability of PingSafe 10 out of 10.
The SentinelOne Singularity Cloud exhibits high scalability.
We've automated in our MDM so any device that we start in our MDM automatically installs SentinelOne.
They can seamlessly scale the number of endpoints from 100 to 1,000,000 in a day.
Tenable Vulnerability Management is highly scalable.
With the growing needs of our company, Tenable Vulnerability Management is able to safely adapt.
SentinelOne Singularity Cloud is incredibly reliable.
I would rate it a ten out of ten for stability.
As a security tool, our primary focus is on the results it delivers, rather than the aesthetics of the dashboards themselves.
I have faced no stability issues with Tenable.
The stability is commendable, and I would rate Tenable ten out of ten.
The stability of Tenable Vulnerability Management is highly reliable.
I would also like to see Cloud Native Security offer APIs that allow us to directly build dashboards within the platform.
Detection should be in near real-time.
If notifications are available, then it will be more helpful, easy, and time-saving.
They should also accelerate the process of implementing new features upon request.
I would suggest HP WebInspect as a better option than Tenable.io.
Tenable Vulnerability Management is not very effective for real-time risk prioritization for our organization's security strategy.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
I recall Cloud Native Security charging a slightly higher premium previously.
This would have been a poor return on investment, especially considering Wiz's high cost.
Tenable charges around $40 per device, while Rapid7 costs $10 to $15 per device.
I would not say very expensive for Tenable Vulnerability Management; it is not prohibitive, but at the same time, there are some other tools in the marketplace which are offering the same kind of services that Tenable offers, the same kind of features that Tenable has offered at a lesser cost.
Cloud Native Security's cloud SIEM feature has been essential in preventing our most critical security incidents.
The cloud misconfiguration feature gave us almost zero false positives.
PingSafe proactively detects and alerts us to such accidental exposures of sensitive information, including SaaS credentials.
Tenable enables vulnerability management through potential AI integration that consolidates efforts and resolves multiple vulnerabilities simultaneously.
The main benefit of integration with Tenable Vulnerability Management is that there will be no lack of missing vulnerabilities when it comes to the patching environment.
The best features of Tenable Vulnerability Management are flexibility, breadth and scope, and the fact that their current vulnerabilities come out, and they have tests for them within a day or two.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Cloud Security | 2.4% |
| Tenable Vulnerability Management | 3.1% |
| Other | 94.5% |

| Company Size | Count |
|---|---|
| Small Business | 49 |
| Midsize Enterprise | 22 |
| Large Enterprise | 55 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 3 |
| Large Enterprise | 21 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?
What benefits should users expect from SentinelOne Singularity Cloud Security?
SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management (formerly Tenable.io) provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.