Try our new research platform with insights from 80,000+ expert users

Tenable Cloud Security vs Threat Stack Cloud Security Platform [EOL] comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on May 4, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (1st)
Tenable Cloud Security
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
10
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th), Cloud Workload Protection Platforms (CWPP) (12th), Cloud Security Posture Management (CSPM) (19th), Cloud-Native Application Protection Platforms (CNAPP) (14th), Cloud Infrastructure Entitlement Management (CIEM) (5th)
Threat Stack Cloud Security...
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Antonio Scola - PeerSpot reviewer
Offers reliable security support and encourages a safe migration to cloud environments while there is room for better reseller collaboration
I really don't know to tell the truth because we sell many solutions and don't sell exclusively Tenable, so I'm not in a condition to give a precise definition of what could be improved. My perception is this: when customer A needs Tenable Cloud Security, we introduce and demonstrate it. They POC, they appreciate it. The solution serves in such use cases ABC. I am very pragmatic and straightforward - as long as they use or want the solution, I am interested. If they don't, my question is what are the main objections? They may discuss pricing, or they may say they thought the solution had certain technical capabilities that they could not find.
VR
Pivotal for SOX and Sarbanes-Oxley compliance as well as security in AWS, but needs work on the application layer side
It certainly has a lot of capabilities and we're not using much of what it can do. That's something that, as we mature as an organization, we'll expand into. The one thing that we know they're working on, but we don't have through the tool, is the application layer. As we move to a serverless environment, with AWS Fargate or direct Lambda, that's where Threat Stack does not have the capacity to provide feed. Those are areas that it's blind to now, so that's the biggest area for improvement. They're currently looking at changing that with an acquisition, but as it stands right now, that's the only spot that I consider weak.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool identifies issues quickly."
"The visibility is the best part of the solution."
"SentinelOne Singularity Cloud Security released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. SentinelOne Singularity Cloud Security's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"It is advantageous in terms of time-saving and cost reduction."
"The most valuable feature of SentinelOne Singularity Cloud Security is its advanced AI and machine learning capabilities, which allow it to identify and respond to threats in real time."
"I recommend SentinelOne due to its high-security capabilities, which are essential to safeguard data and systems from potential threats."
"Its performance impact on the systems is low, which means there is a minimal impact on system performance compared to traditional antivirus solutions."
"SentinelOne Singularity Cloud Security is better than other vendors because we get all the cloud-related, data center-related information."
"The product's deployment phase is easy."
"If you have multi-cloud tenancy using AWS and Azure, you can have a single dashboard where you can onboard all the cloud infrastructure and have visibility into it."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
"The analytical and reporting capabilities are pretty straightforward and show every transaction and major attempt to attack the application in the cloud."
"The key benefit lies in having the largest and most up-to-date database. When it comes to using any Tenable product, it excels in finding vulnerabilities and providing analytics."
"The solution’s vulnerability management feature has helped us identify and mitigate risks well."
"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"Ermetic can provide super visibility for our cloud environment (we are using AWS)."
"Every other security tool we've looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."
"The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production... We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."
"It has been quite helpful to have the daily alerts coming to my email, as well as the Sev 1 Alerts... We just went through a SOX audit and those were pivotal."
"It is scalable. It deploys easily with curl and yum."
"Threat Stack has connectivity."
"There has been a measurable decrease in the meantime to remediation... because we have so many different tech verticals already collated in one place, our ability to respond is drastically different than it used to be."
"We like the ability of the host security module to monitor the processes running on our servers to help us monitor activity."
"The rules are really great. They give us more visibility and control over what's being triggered. There's a large set of rules that come out-of-the-box. We can customize them and we can create our own rules based on the traffic patterns that we see."
 

Cons

"When we request any changes, they must be reflected in the next update."
"In the Analytics section, there is a tab for showing the severity of open issues by day. There are three options: by week, by month, and for more than thirty days. However, despite being aware of many issues open for more than thirty days, it shows no data available."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"When you find a vulnerability and resolve it, the same issue will not occur again. I want SentinelOne Singularity Cloud Security to block the same vulnerability from appearing again. I want something like a playbook where the steps that we take to resolve an issue are repeated when that issue happens again."
"While SentinelOne Singularity Cloud Security offers robust protection, its cost could be a barrier for some users."
"SentinelOne Singularity Cloud Security is on the costlier side."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product."
"There is a need for the support team to improve their response time since it is one of the areas where the product's technical team has certain shortcomings."
"Tenable needs to offer a patch-based solution since it is an area where the tool lacks a bit."
"I have faced several bug incidents with the solution"
"I didn't find anything that wasn't useful or needed to be added."
"The product must provide more features."
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
"I would like further support of Windows endpoint agents or the introduction of support for Windows endpoint agents."
"It shoots back a lot of alerts."
"The API - which has grown quite a bit, so we're still learning it and I can't say whether it still needs improvement - was an area that had been needing it."
"The compliance and governance need improvement."
"The reports aren't very good. We've automated the report generation via the API and replaced almost all the reports that they generate for us using API calls instead."
"The user interface can be a little bit clunky at times... There's a lot of information that needs to be waded through, and the UI just isn't great."
"They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter."
"The one thing that we know they're working on, but we don't have through the tool, is the application layer. As we move to a serverless environment, with AWS Fargate or direct Lambda, that's where Threat Stack does not have the capacity to provide feed. Those are areas that it's blind to now..."
 

Pricing and Cost Advice

"PingSafe's pricing is good because it provides us with a solution."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"The cost for PingSafe is average when compared to other CSPM tools."
"PingSafe falls somewhere in the middle price range, neither particularly cheap nor expensive."
"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"As a partner, we receive a discount on the licenses."
"It's a fair price for what you get. We are happy with the price as it stands."
"SentinelOne offers excellent pricing and licensing options."
"The tool's price is good compared to other brands. The tool's subscription is for a year."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
"The tool's pricing is fair."
"I'm happy with the amount that we spend for the product that we get and the overall service that we get. It's not cheap, but I'm still happy with the spend."
"It is very expensive compared to some other products. The pricing is definitely high."
"What we're paying now is somewhere around $15 to $20 per agent per month, if I recall correctly. The other cost we have is SecOps."
"We find the licensing and pricing very easy to understand and a good value for the services provided."
"Pricing seems to be in line with the market structure. It's fine."
"It came in cheaper than Trend Micro when we purchased it a few years ago."
"It is a cost-effective choice versus other solutions on the market."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
861,390 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
Computer Software Company
15%
Government
11%
Financial Services Firm
10%
Manufacturing Company
8%
Computer Software Company
18%
Real Estate/Law Firm
13%
Manufacturing Company
8%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
I really don't know to tell the truth because we sell many solutions and don't sell exclusively Tenable, so I'm not i...
What is your primary use case for Tenable Cloud Security?
They are looking to promote a deeper security strategy with Tenable Cloud Security. Companies are migrating from on-p...
Ask a question
Earn 20 points
 

Also Known As

PingSafe
Ermetic, Ermetic Identity Governance for AWS
Threat Stack, CSP,
 

Overview

 

Sample Customers

Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
StatusPage.io, Walkbase, Spanning, DNAnexus, Jobcase, Nextcapital, Smartling, Veracode, 6sense
Find out what your peers are saying about Wiz, Microsoft, Amazon Web Services (AWS) and others in Cloud Workload Protection Platforms (CWPP). Updated: June 2025.
861,390 professionals have used our research since 2012.