Try our new research platform with insights from 80,000+ expert users

SUSE NeuVector vs Tenable Cloud Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
115
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
SUSE NeuVector
Ranking in Container Security
15th
Ranking in Cloud Workload Protection Platforms (CWPP)
20th
Average Rating
7.8
Reviews Sentiment
7.3
Number of Reviews
8
Ranking in other categories
No ranking in other categories
Tenable Cloud Security
Ranking in Container Security
24th
Ranking in Cloud Workload Protection Platforms (CWPP)
11th
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th), Cloud Security Posture Management (CSPM) (17th), Cloud-Native Application Protection Platforms (CNAPP) (13th), Cloud Infrastructure Entitlement Management (CIEM) (4th)
 

Mindshare comparison

As of October 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 3.1%, up from 1.3% compared to the previous year. The mindshare of SUSE NeuVector is 2.2%, down from 2.7% compared to the previous year. The mindshare of Tenable Cloud Security is 1.5%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security3.1%
SUSE NeuVector2.2%
Tenable Cloud Security1.5%
Other93.2%
Container Security
 

Featured Reviews

Ritesh P. - PeerSpot reviewer
It's more scalable and flexible than our previous solution because we don't need to install any agents
The reporting works well, but sometimes the severity classifications are inaccurate. Sometimes, it flags an issue as high-impact, but it should be a lower severity. For example, it might highlight an exposed AWS encryption key, a critical compliance issue, but it isn't tagged as a high-risk problem. That only happens about 10 percent of the time. It shows a true positive 80-90 percent of the time.
Danie Joubert - PeerSpot reviewer
Good value for money; great for policy management
Our model of deployment for this solution is on-premises. For people looking into this solution and trying to use it for the first time, I'd say make your life easier by using the SUSE product as well on top of your community scale stack. That makes your integration points a lot easier and smoother. I would also say during your initial setup, make sure that your clusters are already in terms of the capabilities with the version required. I would rate this solution an eight, on a scale from one to 10, with one being the worst and 10 being the best. The reason for this rating is that what they offer is solid, but they could expand their service and add more features just to make more things integrated into an enterprise itself.
DragosCernat - PeerSpot reviewer
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The compliance monitoring feature of SentinelOne Singularity Cloud Security gives us a report with a compliance score to ensure we meet certain regulatory standards."
"The tool identifies issues quickly."
"The features that stand out are threat detection using advanced artificial intelligence and machine learning, helping to identify and respond to threats in real-time."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before SentinelOne Singularity Cloud Security we spent a lot of time monitoring and fixing these issues. SentinelOne Singularity Cloud Security enabled us to divert more resources to the production environment."
"The most valuable aspects of SentinelOne Singularity Cloud Security are its alerting system and the remediation guidance it provides."
"SentinelOne Singularity Cloud Security offers comprehensive security posture management."
"SentinelOne Singularity Cloud Security has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"We like SentinelOne Singularity Cloud Security's vulnerability assessment and management features, and its vulnerability databases."
"The most valuable feature of SUSE NeuVector is the performance, deployment, and cost."
"The solution includes many features, not only for container and client security but also for scanning nodes, networks, and vulnerabilities."
"The UI has a lot of features."
"The features of image scanning and anti-malware are really valuable."
"The initial setup is quite good, it's straightforward."
"When it comes to the price, we got a really good deal from the vendor instantly."
"The solution includes many features, not only for container and client security but also for scanning nodes, networks, and vulnerabilities."
"The tool's deployment is simple. Also, I am impressed with its risk capabilities."
"The analytical and reporting capabilities are pretty straightforward and show every transaction and major attempt to attack the application in the cloud."
"The solution’s vulnerability management feature has helped us identify and mitigate risks well."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
"The product's deployment phase is easy."
"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time."
"Element is precisely what we needed for close to real-time external surface monitoring, and the automatic integration capabilities, particularly with DNS, Azure, and AWS, are extremely valuable."
"Ermetic can provide super visibility for our cloud environment (we are using AWS)."
 

Cons

"Sometimes the Storyline ID is a bit wacky."
"Scanning capabilities should be added for the dark web."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"The areas with room for improvement include the cost, which is higher compared to other security platforms. The dashboard can also be laggy."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"I'd like to see better onboarding documentation."
"While it is good, I think the solution's console could be improved."
"I would like SentinelOne Singularity Cloud Security's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"We are also working with IaaS VMS, but NeuVector doesn't support virtual machines."
"The tool should offer seamless integration of other security tools while in a hybrid environment."
"However, I found that the support in Egypt was not very qualified, and there was a need to upgrade to a higher support layer to solve my issues."
"The documentation needs to improve a bit."
"Using a node port instead of a cluster IP is less ideal when implementing federation features between two clusters and could be improved."
"The image-scanning features need improvement."
"SUSE NeuVector could improve by increasing its visibility into other elements of the DevSecOps pipeline. Additionally, scanning around infrastructure would be helpful."
"SUSE NeuVector should provide more security protection rules and better container image scanning."
"Tenable needs to offer a patch-based solution since it is an area where the tool lacks a bit."
"The product must provide more features."
"We still maintain Tenable Cloud Security but have reduced the number of licenses. We now use it occasionally to validate specific items rather than monitoring the entire surface, for which we use Element."
"In my experience, Tenable Cloud Security is not very stable."
"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
"I have faced several bug incidents with the solution"
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"If Tenable Cloud Security offers a complete Cnapp solution with CWP, CIEM, and Waap security, it will be able to compete with other competitors."
 

Pricing and Cost Advice

"It is cost-effective compared to other solutions in the market."
"SentinelOne Singularity Cloud Security is on the costlier side."
"I am not involved in the pricing, but it is cost-effective."
"PingSafe is less expensive than other options."
"Its pricing was a little less than other providers."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"It was reasonable pricing for me."
"PingSafe's primary advantage is its ability to consolidate multiple tools into a single user interface, but, beyond this convenience, it may not offer significant additional benefits to justify its price."
"SUSE NeuVector is an open-source solution."
"The price of SUSE NeuVector is low. There is an additional cost for support."
"Licensing fees are paid yearly."
"The solution's pricing could be better. The cost of a subscription is calculated on the basis of work."
"The tool's price is good compared to other brands. The tool's subscription is for a year."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
"The tool's pricing is fair."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
10%
Government
5%
Computer Software Company
16%
Financial Services Firm
15%
Manufacturing Company
10%
Government
9%
Computer Software Company
13%
Government
11%
Financial Services Firm
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise20
Large Enterprise54
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise1
Large Enterprise2
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
What do you like most about NeuVector?
The most valuable feature of SUSE NeuVector is its run-time security.
What is your experience regarding pricing and costs for NeuVector?
SUSE NeuVector is an open-source solution. You have to pay for the support.
What needs improvement with NeuVector?
One area for improvement is NeuVector's ability to import CVEs from different sources. Additionally, using a node por...
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
I think Tenable Cloud Security could be improved with more clear licensing. What I would like to see improved with li...
What is your primary use case for Tenable Cloud Security?
My main use case for Tenable Cloud Security is managing our security compliance and security posture. I use Tenable C...
 

Also Known As

PingSafe
NeuVector
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Information Not Available
Figo, Clear Review, Arvato Bertelsmann, Experian, Chime
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about SUSE NeuVector vs. Tenable Cloud Security and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.