Tenable Cloud Security vs Trend Vision One - Cloud Security comparison


Comparison Buyer's Guide

Executive Summary

Categories and Ranking

SentinelOne Singularity Clo...
Ranking in Cloud Workload Protection Platforms (CWPP)
Ranking in Cloud Security Posture Management (CSPM)
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
Average Rating
Number of Reviews
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (5th), Container Security (5th), Compliance Management (5th)
Tenable Cloud Security
Ranking in Cloud Workload Protection Platforms (CWPP)
Ranking in Cloud Security Posture Management (CSPM)
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
Average Rating
Number of Reviews
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (13th), Cloud Infrastructure Entitlement Management (CIEM) (5th)
Trend Vision One - Cloud Se...
Ranking in Cloud Workload Protection Platforms (CWPP)
Ranking in Cloud Security Posture Management (CSPM)
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
Average Rating
Number of Reviews
Ranking in other categories
Application Security Tools (12th), GRC (3rd), Container Security (10th)

Mindshare comparison

As of July 2024, in the Cloud Security Posture Management (CSPM) category, the mindshare of SentinelOne Singularity Cloud Security is 1.6%, up from 1.6% compared to the previous year. The mindshare of Tenable Cloud Security is 2.2%, down from 2.4% compared to the previous year. The mindshare of Trend Vision One - Cloud Security is 0.9%, down from 1.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Security Posture Management (CSPM)
Unique Categories:
Vulnerability Management
Cloud and Data Center Security
Identity and Access Management as a Service (IDaaS) (IAMaaS)
Cloud Workload Protection Platforms (CWPP)
Application Security Tools

Featured Reviews

May 31, 2024
Gives us better visibility into our resources and enables faster resolution
The detection time could be better. It takes a long time to scan. I'm not sure how long other tools take for the same amount of scanning, so I cannot compare it with other tools, but it takes us half a day to a full day to complete the scan. I want to get the reports faster so we can start fixing the problems. The proof of exploitability is another area for improvement. While I have all the information to troubleshoot the problem, it isn't detailed enough for an administrator. It has sufficient information for a general user, but an administrator would like to know all the ins and outs of the vulnerabilities that have been reported. I would like to see the map feature improve. It's good, but it isn't fully developed. It lets us use custom resources and policies but does not allow us to perform some actions. I would also like more custom integration and runtime security for Kubernetes.
reviewer2020860 - PeerSpot reviewer
Nov 10, 2022
Simple dashboard, good remediation, and helpful training
We wanted to secure our cloud platform. We needed to see visibility in our platform. We wanted a tool to show us when an issue occurred, which part it happened, and how to remediate it accordingly. Also, we wanted to know how to create a ticket and track the ticket. We wanted a support team to help…
Troy Riegsecker - PeerSpot reviewer
Jan 30, 2024
Improves our traffic visibility, saves us time, and identifies blind spots
The biggest problem was that I couldn't see our East-West network traffic between our endpoints. However, I could see North-South traffic, meaning anything that went up to the firewall and back. This meant if, for example, a coworker and I were sending something malicious to each other, I wouldn't be able to see it or tell where it was coming from. I might get an alert saying suspicious activity was detected, but wouldn't have specific details. Implementing an XDR system changed this. Now, I can see all East-West traffic and set up rules for specific actions if certain events occur. I can also filter the information to focus on what's most important. Every day, I review XDR alerts, investigate them, and determine if they're suspicious or not. We use Trend Vision One - Cloud Security across all our endpoints, including PCs, laptops, and servers. The coverage it provides is extremely important. We leverage Trend Vision's XDR capabilities for enhanced threat detection and response. Additionally, we utilize the Trend Vision One - Cloud Security app security solution. We have Trend Vision One - Cloud Security as a service, and I also manage TippingPoint. Our cybersecurity posture is significantly stronger than it was four years ago. Back then, we were hit by a ransomware attack, which exposed vulnerabilities in our security measures. We were only spending around eight thousand dollars annually on cybersecurity, and as the company grew rapidly, investments in cybersecurity weren't prioritized. While achieving absolute security is impossible, we are demonstrably more secure than ever before. Trend Vision One - Cloud Security provides centralized visibility. Every day, I log into Vision One and the first thing I check is my risk score. Based on my score, I take action. For example, if my score jumps from 36 to 50, I investigate the change in Vision One. Vision One tells me what caused the increase and offers specific recommendations. I can then easily see what actions will reduce my risk. For example, I might see that fixing a specific vulnerability will lower my score by six points, but another fix won't help. Trend Vision One - Cloud Security is a powerful tool, and that's just a glimpse of its capabilities. It shows me my OS vulnerabilities, application vulnerabilities, and even critical business exposures. For example, it might alert me to an Adobe CBE and tell me which devices are affected. This allows me to quickly identify and patch vulnerable devices. Furthermore, I can directly initiate patching from Vision One. Additionally, I can use integrated products like Container Security for AWS to gain comprehensive security insights across different environments, all within the same platform. Every day, I start by logging into the Executive Dashboard. It's the first thing I check, as it provides me with my risk index and a summary of potential issues. Furthermore, I can view information about our devices, risk levels, and other relevant data points. After reviewing the Executive Dashboard, I transition to the Operations Dashboard for a more granular look at individual devices and their associated risks. Before XDR, I could spend hours trying to track down the issue behind an alert. Now, everything is at my fingertips within Vision One. I simply click on the link, and it gives me all the information I need: who the user is, the PC name, and relevant context depending on the alert type e.g., a suspicious email. So, instead of spending hours figuring out the source of the alert, I can now resolve it in just a couple of minutes. With the managed XDR service, I have peace of mind knowing that if they find something suspicious, they will alert me immediately. They can even call me and say, "Hey, we found some unusual activity and stopped it. Do you want us to continue investigating or revert to the previous state?" I can then confidently say yes and trust that they are handling the situation effectively. I've received calls in the past late at night about suspicious activity, and I'm grateful that I don't have to be the one monitoring everything 24/7. Now, I have a team of experts who do it for me, providing a significant advantage over-relying on a single person. They only alert me when something serious arises, allowing me to focus on other matters. The managed XDR service has freed up our team's time by eliminating the need for 24/7 on-call duty with Vision One. This allows us to focus on other tasks instead of spending hours diagnosing potential issues. Now, we're able to resolve concerns in minutes, freeing up additional time for projects and other responsibilities. While I find the Attack Surface Risk Management module to be a valuable addition to the executive dashboard, I don't utilize the Attack Surface Discovery feature as frequently, maybe once a week. This is primarily because I rely on the XDR management system to monitor for potential threats and alert me to anything critical. Manually reviewing the detailed discovery overview doesn't add significant value at present, as I trust the XDR system to flag any urgent issues. The Attack Surface Risk Management module helps to identify blind spots in our environment, especially where assets are highly exposed. It presents explainable CDZs and provides a rich asset score for each PC or device. This allows me to easily identify high-risk devices and investigate further. For example, when I saw a server with a suspicious file flagged as a 96 high-risk alert, I could investigate and find that it was an Excel file with a macro, explaining the risk. I can then determine if it's a false positive and communicate this appropriately. The module's continuous learning ensures improved accuracy over time. Implementing the managed XDR has significantly reduced our time to detect and respond to threats. Previously, I received security alerts via email, which could be delayed. Additionally, I often needed to manually review logs and scan results, which was time-consuming and inefficient. Now, the managed XDR provides timely alerts directly in the platform, streamlining my workflow and keeping me informed promptly. This has saved me one to two hours per day. Implementing a managed XDR solution has significantly reduced the number of false positives I encounter. This allows me to identify and address real issues much faster. Instead of spending 45 minutes tracking down potential threats, I can now simply click a link and determine if an alert is legitimate within three minutes. We use playbooks that have certain rules and are set up to automatically take action when they find something suspicious. This way, I don't have to sit there and make judgment calls every single day. If a certain event occurs, or if we discover something unexpected, I can create a playbook to automatically start looking for it everywhere on the network.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:


"The visibility is the best part of the solution."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"The tool identifies issues quickly."
"Our organization is growing steadily, so our infrastructure is expanding, and we're managing more technical resources. Singularity Cloud Security helps us track our resources so that we don't get lost in the overwhelming volume of things and ensures we follow best practices. The solution gives us better visibility into our resources and enables faster resolution."
"PingSafe offers an intuitive user interface that lets us navigate quickly and easily."
"We noted immediate benefits from using the solution."
"The product's visibility and remediation work fine for me."
"The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time."
"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"The solution’s vulnerability management feature has helped us identify and mitigate risks well."
"Ermetic can provide super visibility for our cloud environment (we are using AWS)."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
"The key benefit lies in having the largest and most up-to-date database. When it comes to using any Tenable product, it excels in finding vulnerabilities and providing analytics."
"If you have multi-cloud tenancy using AWS and Azure, you can have a single dashboard where you can onboard all the cloud infrastructure and have visibility into it."
"The most valuable part of Trend Vision One - Cloud Security is its dashboard, as it's simple. It's easy to manage, and you can better control the solution."
"The perfect package for all security platforms, providing more than any other endpoint solution."
"The the most valuable feature is the scanning engine. It does not impact server performance. It's very lightweight."
"It has the best EDR functionality for cloud and typical endpoints."
"I really like Trend Vision One - Cloud Security's dashboard."
"Trend Vision One - Cloud Security does not utilize a lot of resources which allows our users to keep working even during a scan."
"The most valuable features are intrusion prevention and anti-malware capabilities."
"Vision One is versatile and can be integrated with many SIEMs. You're not limited to only one SIEM, such as Microsoft Sentinel. The API integrations are seamless, and we have all the documentation needed to integrate Vision One via API."


"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"While PingSafe offers real-time response, there is room for improvement in alert accuracy."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"We use PingSafe and also SentinelOne. If PingSafe integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"If Tenable Cloud Security offers a complete Cnapp solution with CWP, CIEM, and Waap security, it will be able to compete with other competitors."
"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
"The product must provide more features."
"Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product."
"I have faced several bug incidents with the solution"
"I didn't find anything that wasn't useful or needed to be added."
"There is a need for the support team to improve their response time since it is one of the areas where the product's technical team has certain shortcomings."
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"The initial setup is easy for someone who operates container platforms on a daily basis. However, it could be difficult for those coming purely from informational security or another field of an IT."
"The pricing can get high."
"The tool should improve integration with trend products."
"Trend Vision One - Cloud Security could improve connections with different types of authentication and user groups concerning cloud services."
"Documentation on cloud architecture and job architecture would be helpful."
"They should provide a way for users to see violations for specific compliance."
"Trend Vision One - Cloud Security seems to have a preference for AWS Cloud over Azure and would be improved by focusing equally on both."
"While it provides some data protection within its security framework, it doesn't allow users to customize policies or create their own for specific needs."

Pricing and Cost Advice

"The pricing for PingSafe in India was more reasonable than other competitors."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"Their pricing appears to be based simply on the number of accounts we have, which is common for cloud-based products."
"I understand that SentinelOne is a market leader, but the bill we received was astronomical."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"It was reasonable pricing for me."
"PingSafe is not very expensive compared to Prisma Cloud, but it's also not that cheap. However, because of its features, it makes sense to us as a company. It's fairly priced."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
"The tool's pricing is fair."
"The pricing for Cloud One is reasonable because my costs scale up and down based on my infrastructure usage."
"One year ago, Trend transitioned to a credit system for licensing, which has confused users."
"I rate the solution's pricing a six out of ten."
"While Trend Vision One - Cloud Security was a cost-effective solution for us in 2021, we've noticed a recent price increase that makes it less affordable."
"Pricing for Trend Micro Cloud One Container Security in the corporate market is okay."
"It's a slightly expensive product."
"With everything I deal with, Trend Micro Cloud One's pricing is somewhere in the middle."
"The price could be lower. That is a bit of a consideration."
Use our free recommendation engine to learn which Cloud Security Posture Management (CSPM) solutions are best for your needs.
792,483 professionals have used our research since 2012.

Top Industries

By visitors reading reviews
Computer Software Company
Financial Services Firm
Manufacturing Company
Insurance Company
Computer Software Company
Financial Services Firm
Manufacturing Company
Healthcare Company
Educational Organization
Computer Software Company
Financial Services Firm
Manufacturing Company

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Singularity Cloud Security by SentinelOne is cost-efficient.
What needs improvement with PingSafe?
A recurring issue caused frustration: a vulnerability alert would appear, and we'd fix it, but then the same alert wo...
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
I have faced several bug incidents with the solution. Tenable Cloud Security's operational speed also needs to be imp...
What is your primary use case for Tenable Cloud Security?
Tenable Cloud Security is used for scanning purposes, including vulnerabilities and remediation. The graphs provided ...
What do you like most about Trend Micro Cloud One Workload Security?
The the most valuable feature is the scanning engine. It does not impact server performance. It's very lightweight.
What is your experience regarding pricing and costs for Trend Micro Cloud One Workload Security?
The is price is 25% cheaper than it was a couple of years ago, which is good.
What needs improvement with Trend Micro Cloud One Workload Security?
The local agent should be able to show more logs. At present, the logs are only available from the web console and no...

Also Known As

Ermetic, Ermetic Identity Governance for AWS
Trend Micro Cloud One , Cloud One Workload Security, Trend Micro Cloud One Container Security, Trend Micro Cloud One Application Security, Cloud One File Storage Security, Cloud One Network Security, Cloud One Conformity



Sample Customers

Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about Tenable Cloud Security vs. Trend Vision One - Cloud Security and other solutions. Updated: June 2024.
792,483 professionals have used our research since 2012.