Try our new research platform with insights from 80,000+ expert users

Tenable Cloud Security vs Trivy comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Tenable Cloud Security
Ranking in Container Security
24th
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th), Cloud Workload Protection Platforms (CWPP) (11th), Cloud Security Posture Management (CSPM) (17th), Cloud-Native Application Protection Platforms (CNAPP) (13th), Cloud Infrastructure Entitlement Management (CIEM) (4th)
Trivy
Ranking in Container Security
5th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Container Security category, the mindshare of Tenable Cloud Security is 1.5%, up from 1.3% compared to the previous year. The mindshare of Trivy is 6.0%, up from 2.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
Trivy6.0%
Tenable Cloud Security1.5%
Other92.5%
Container Security
 

Featured Reviews

DragosCernat - PeerSpot reviewer
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
Utsav Sharma - PeerSpot reviewer
Maintain operational efficiency by detecting misconfigurations and vulnerabilities
The vulnerability scanning feature is excellent as it supports various container capabilities like Docker and Sharma. It also offers repository scanning in the source code domain, allowing pre-push code scans. The misconfiguration detection works well for CloudFormation, Docker files, and Terraform. Its compliance support, like NIST, ensures that configurations align with standards. Trivy helps me significantly detect misconfigurations missed by the ops engineers or in Terraform by the naked eye. It ensures that my deployments are free of misconfigurations and vulnerabilities.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time."
"The product's deployment phase is easy."
"If you have multi-cloud tenancy using AWS and Azure, you can have a single dashboard where you can onboard all the cloud infrastructure and have visibility into it."
"Ermetic can provide super visibility for our cloud environment (we are using AWS)."
"The analytical and reporting capabilities are pretty straightforward and show every transaction and major attempt to attack the application in the cloud."
"The key benefit lies in having the largest and most up-to-date database. When it comes to using any Tenable product, it excels in finding vulnerabilities and providing analytics."
"The product's visibility and remediation work fine for me."
"I can see vulnerabilities in the images of any applications deployed in the Kubernetes environment or as container applications."
"Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images."
"Trivy's open source nature and wide functionality are incredibly valuable."
"The vulnerability scanning feature is excellent as it supports various container capabilities like Docker and Sharma."
"I rate Trivy a nine out of ten."
"Trivy's open source nature and wide functionality are incredibly valuable."
"It's customizable, allowing me to add any rules and format HTML templates as I wish."
"The most valuable feature of Trivy is its easy integration with the CI/CD pipeline."
 

Cons

"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
"I have faced several bug incidents with the solution"
"Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product."
"We still maintain Tenable Cloud Security but have reduced the number of licenses. We now use it occasionally to validate specific items rather than monitoring the entire surface, for which we use Element."
"The product must provide more features."
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"In my experience, Tenable Cloud Security is not very stable."
"If Tenable Cloud Security offers a complete Cnapp solution with CWP, CIEM, and Waap security, it will be able to compete with other competitors."
"One drawback I have observed with Trivy is the difficulty in building or integrating a UI, particularly for an operator in the NetSuite example."
"The main area for improvement is in differentiating between OS and application-based vulnerabilities."
"For malware detection, I need to use two tools: Trivy as my anomaly scanner and ClamAV. I am integrating these two tools into the CI pipeline. If both malware and anomaly detection could be managed by one tool, I would not need to depend on two tools."
"In our CI/CD pipelines, Trivy lacks built-in functionality for report analysis."
"Trivy generates many false positives, flagging non-existent vulnerabilities. Improvements could include better contextual analysis or granular filtering."
"Trivy is not scalable; however, I have scanned very large projects with it. It is stable but not scalable according to my experience."
"A dynamic scanning capability during runtime would be a significant advantage."
"Currently, the container image scanning is static. A dynamic scanning capability during runtime would be a significant advantage."
 

Pricing and Cost Advice

"The tool's price is good compared to other brands. The tool's subscription is for a year."
"The tool's pricing is fair."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
Information not available
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Government
11%
Financial Services Firm
10%
Manufacturing Company
8%
Computer Software Company
14%
Financial Services Firm
13%
Manufacturing Company
12%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise9
 

Questions from the Community

What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
I think Tenable Cloud Security could be improved with more clear licensing. What I would like to see improved with licensing is how they're used in the product. The calculations of what is consider...
What is your primary use case for Tenable Cloud Security?
My main use case for Tenable Cloud Security is managing our security compliance and security posture. I use Tenable Cloud Security for managing compliance and security posture, and we rely on the c...
What needs improvement with Trivy?
Trivy's marketing and awareness need improvement. Not everyone knows about it, which isn't ideal given its capabilities. There's potential to integrate AI and machine learning for enhanced function...
What is your primary use case for Trivy?
I use Trivy ( /products/trivy-reviews ) to scan code for vulnerabilities before deployment. Our projects, which are developed by different developers, involve various dependencies and third-party c...
What advice do you have for others considering Trivy?
I recommend Trivy to others due to its powerful and useful features. However, I suggest increasing its marketing to raise awareness. I rate Trivy an eight out of ten.
 

Also Known As

Ermetic, Ermetic Identity Governance for AWS
No data available
 

Overview

 

Sample Customers

Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Information Not Available
Find out what your peers are saying about Tenable Cloud Security vs. Trivy and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.