International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 73 | Issue 5 | Year 2025 | Article Id. IJCTT-V73I5P115 | DOI : https://doi.org/10.14445/22312803/IJCTT-V73I5P115

Comparative Performance Evaluation of Modern Container Security Agents: Red Hat ACS, Wiz, SentinelOne, and Tenable


Harikishore Allu Balan, Bikash Agarwal

Received Revised Accepted Published
29 Mar 2025 02 May 2025 16 May 2025 30 May 2025

Citation :

Harikishore Allu Balan, Bikash Agarwal, "Comparative Performance Evaluation of Modern Container Security Agents: Red Hat ACS, Wiz, SentinelOne, and Tenable," International Journal of Computer Trends and Technology (IJCTT), vol. 73, no. 5, pp. 113-124, 2025. Crossref, https://doi.org/10.14445/22312803/IJCTT-V73I5P115

Abstract

Containerized microservice applications have become the central design entity for how modern development and operations teams build and deploy software. Robust, configurable, and adaptable security agents are important in securing the applications. This article offers a closely monitored study with a detailed examination of four widely implemented container security platforms—Red Hat Advanced Cluster Security (ACS), Wiz, SentinelOne, and Tenable. Unlike off-shelf comparisons by third-party agents, our analysis is grounded in the practical development and deployment of the agents with realistic user traffic environments. The evaluation of each security agent's capabilities in handling vulnerabilities like threat detection, runtime defence, policy enforcement, and deployment pipeline integration are continually measured and compared. While the security agents met all basic security expectations for our study, we had to consider voice applications and how they balance operational efficiency, deployment complexity, and overall protection strategy. This comparative insight will help organizations like ours select a solution aligned with their specific cloud-native architecture and security posture.

Keywords

Container Security, Kubernetes, Red Hat ACS, Wiz, SentinelOne, Tenable, DevSecOps.

References

[1] Kubernetes, Production-Grade Container Orchestration. [Online]. Available: https://kubernetes.io/
[2] Red Hat, Advanced Cluster Security for Kubernetes. [Online]. Available: https://www.redhat.com/en/technologies/cloud computing/openshift/advanced-cluster-security-kubernetes
[3] Wiz, Protect Everything you Build and Run in the Cloud. [Online]. Available: https://www.wiz.io/
[4] SentinelOne: Autonomous Endpoint Protection, Sentinelone. [Online]. Available: https://www.sentinelone.com/resources/sentinelone autonomous-endpoint-protection/
[5] Tenable. [Online]. Available: https://www.tenable.com/
[6] The Sun. [Online]. Available: https://www.thesun.co.uk/tech/34784827/number-cyber-attacks-met-office-revealed/
[7] U.S. DHS, Einstein Intrusion Detection System. [Online]. Available: https://en.wikipedia.org/wiki/Einstein_(US-CERT_program)
[8] Center for Internet Security, MS-ISAC Albert Network Monitoring. [Online]. Available: https://www.cisecurity.org/ms-isac
[9] MITRE, ATT&CK® Matrix for Containers. [Online]. Available: https://attack.mitre.org/matrices/enterprise/containers/
[10] Cloud Native Computing Foundation (CNCF), Cloud Native Security Whitepaper. [Online]. Available: https://www.cncf.io/reports/cloud-native-security-whitepaper/
[11] CSE-CIC-IDS2018 Dataset, Canadian Institute for Cybersecurity. [Online]. Available: https://www.unb.ca/cic/datasets/ids-2018.html
[12] CIC-IDS2017 Dataset, Canadian Institute for Cybersecurity. [Online]. Available: https://www.unb.ca/cic/datasets/ids-2017.html
[13] National Vulnerability Database, NIST. [Online]. Available: https://nvd.nist.gov/