Try our new research platform with insights from 80,000+ expert users

Tenable.io Container Security vs Trend Micro Deep Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Tenable.io Container Security
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
8
Ranking in other categories
Container Security (25th)
Trend Micro Deep Security
Average Rating
8.6
Reviews Sentiment
6.4
Number of Reviews
92
Ranking in other categories
Virtualization Security (1st), Cloud and Data Center Security (5th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Tenable.io Container Security is designed for Container Security and holds a mindshare of 1.1%, down 1.2% compared to last year.
Trend Micro Deep Security, on the other hand, focuses on Virtualization Security, holds 42.6% mindshare, up 42.3% since last year.
Container Security Market Share Distribution
ProductMarket Share (%)
Tenable.io Container Security1.1%
Wiz16.2%
Prisma Cloud by Palo Alto Networks10.9%
Other71.8%
Container Security
Virtualization Security Market Share Distribution
ProductMarket Share (%)
Trend Micro Deep Security42.6%
Sophos Virtualization Security18.3%
Entrust CloudControl14.1%
Other25.0%
Virtualization Security
 

Featured Reviews

SumeshKumar - PeerSpot reviewer
A scalable tool that needs to make its setup phase easier while improving the stability it provides
The initial setup of Tenable.io Container Security is a little bit complex. If you have a bigger cluster or container environment, then the solution's deployment phase may take more than three months since you won't directly go for the solution's block mode. To start things in the solution, you will have to deploy it in SIEM mode, while the detection mode will provide you with visibility in accordance with which you need to take actions for production, which needs time. Regarding the time taken for deployment, for detection, it may not take more than a week, but in production, it may take at least three months to be completed. For the deployment process, there are some scripts available along with some YAML files that you need to run on the cluster, specifically considering the cluster you want to focus more on before creating Tenable Cloud Security Console. After creating Tenable Cloud Security Console, you can proceed with the onboarding process.
MojammelHossain - PeerSpot reviewer
Provides comprehensive multi-layer server protection and simplifies hybrid infrastructure management
In the area of policy management and overall administration, Trend Micro Deep Security could improve some settings that require attention. Their UI/UX also needs improvement to make it more user-friendly. If someone is not well-versed in Trend Micro Deep Security or lacks expertise, they can't use or utilize these tools effectively. Therefore, user experience improvement is most crucial, along with enhancements in policy management and the accuracy of the IPS, IDS features for real-time protection. It is primarily focused on the firewall policy management, and if any server is blocked through any rule, a proactive dashboard or alert would be helpful.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It helps us secure our applications from the build phase and identify the weaknesses from scratch."
"The strong security provided by the product in the container environment is its most valuable feature."
"It is a scalable solution. Scalability-wise, it is a good solution."
"Tenable.io detects misconfiguration when you deploy a Docker or Kubernetes container. It's much better to remedy these issues during deployment instead of waiting until the container is already in the production environment."
"Nessus scanner is very effective for internal penetration testing."
"The tool's most valuable feature is scanning, reporting, and troubleshooting."
"Currently, I haven't implemented the solution due to its deprecation by the site. However, I can highlight some benefits of Tenable Cloud Security, a cybersecurity solution with various features for scanning vulnerabilities in both cloud environments and on-premises container security."
"The solution shows you the exploitable vulnerabilities and helps you prioritize."
"Deep Security provides us with a lot of reassurance about security threats. You don't have to worry about a patch not being there in the software. You're confident that all the patches and vulnerabilities are taken care of."
"Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe."
"The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing."
"The initial setup was straightforward."
"We like the Smart protection and the Virtual patching."
"The initial setup was straightforward and we didn't have any problem with it."
"It has improved functions by bringing us complete security on our clients' virtual environment."
"The solution has a low footprint and does not have a lot of impact on the host."
 

Cons

"The initial setup is highly complex."
"They need to work on auto-remediation so it's easier for the security team to act quickly when certain assets or resources are deployed. The latest version has a CIS benchmark that you need to meet for containers in the cloud, but more automation is needed."
"The solution’s pricing could be improved."
"I believe integration plays a crucial role for Tenable, particularly in terms of connecting with other products and various container solutions like Docker or Kubernetes. It seems that in future updates, enhanced integration is something I would appreciate. Currently, there is integration with Docker, but when it comes to Kubernetes or other container solutions, it appears to be a challenge, especially with on-prem scanners."
"The stability and setup phase of the product are areas with shortcomings where improvements are needed."
"Tenable.io Container Security should improve integration modules. It should also improve stability."
"The support is tricky to reach, so we would like better-oriented technical support enabled."
"I feel that in certain areas this product has false positives which the company should work on. They should also try to include business logic vulnerabilities in the scanner testing. Finally, the vulnerability assessment feature should be increased to other hardware devices, apart from firewalls."
"I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved."
"The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future."
"The problem with this solution is that if you go on large sites you have to have an external database, which would increase the cost."
"What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."
"The solution's reports should include more details of events like device control, live health status of the server, and inventory management."
"As for what could be improved, I think it should come with an XDR facility without any extra cost. They're always releasing new features, but we need to pay extra for them."
"Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects."
"Sometimes, the product is not very stable, but it is something that depends on the infrastructure in which the tool is used."
 

Pricing and Cost Advice

"I rate the product’s pricing a six out of ten."
"The product does not operate on a pay-per-license model."
"It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders."
"The solution's pricing is neither cheap nor very expensive."
"I rate the tool's pricing a three out of ten."
"I rate the price a seven on a scale of one to ten, where one is low, and ten is a high price. It is a very costly tool...There are no additional payments to be made other than the normal price of the tool."
"The solution is offered at an average price point"
"We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency."
"It's more expensive than other solutions, such as Sophos and Kaspersky, as an endpoint solution."
"The price of Trend Micro Deep Security could be less expensive."
"Our company chose to procure this product via AWS Marketplace due to regulatory requirements. We mostly use it in the AWS GovCloud."
"We do pay-as-you-go pricing, which is good for us. We are working with Trend Micro's sales rep to see if we can have something similar for on-premise."
"Licensing fees are paid yearly."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
867,676 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
12%
Government
11%
Computer Software Company
6%
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
10%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business35
Midsize Enterprise24
Large Enterprise41
 

Questions from the Community

What do you like most about Tenable.io Container Security?
The tool's most valuable feature is scanning, reporting, and troubleshooting.
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is the intelligence modules feature. I also find that Crowdstrike Falcon’s dashboard...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and containers - all with a unified and comprehensive SaaS solution and without compromising ...
 

Also Known As

Tenable FlawCheck, FlawCheck
Deep Security
 

Overview

 

Sample Customers

ServiceMaster
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Palo Alto Networks, Wiz, SentinelOne and others in Container Security. Updated: August 2025.
867,676 professionals have used our research since 2012.