Best Cloud Security Posture Management (CSPM) Software

LW
Researched and written by Lauren Worth

Cloud security posture management (CSPM) is an emerging market of vulnerability management and security compliance technologies designed to ensure protection for complex, modern hybrid computing environments. CSPM tools monitor cloud applications, services, containers, and infrastructure to detect and remediate misconfigurations, or incorrectly enforced policies. Cloud security posture management vendors create solutions that will typically remediate issues automatically when triggered by an anomaly or other misconfiguration based on rules set by the administrator.

Companies use these tools because it is very difficult to map out and consistently visualize all the components of a complex cloud computing environment. New tools have been developed to enable AI-based, automated management of identities, networks, infrastructure, etc. However, only CSPM software has emerged to provide continuous monitoring and visibility of a company’s security posture, and pair it with automated detection and remediation for issues as they emerge across disparate computing environments.

These tools are part of the emerging secure access service edge (SASE) technology market that also includes software defined perimeter (SDP) software, cloud access security brokers (CASB) software, secure web gateways, and zero trust networking software. Together, these tools are delivered virtually through SD-WAN software to provide an all-encompassing security solution for all components in any cloud environment.

To qualify for inclusion in the Cloud Security Posture Management (CSPM) category, a product must:

Facilitate the automated detection and remediation of cloud misconfigurations
Monitor security policies and configurations across infrastructure, applications, and other cloud environments
Visualize cloud infrastructure in a single-pane-of-glass view
Monitor for other issues relating to cloud compliance, infrastructure as code, and other potential security gaps

Best Cloud Security Posture Management (CSPM) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
85 Listings in Cloud Security Posture Management (CSPM) Available
(701)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • Security Engineer
    • CISO
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    100
    Features
    91
    Security
    87
    Easy Setup
    68
    Visibility
    67
    Cons
    Improvement Needed
    29
    Feature Limitations
    28
    Improvements Needed
    26
    Missing Features
    25
    Learning Curve
    24
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.7
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,103 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,054 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • Security Engineer
  • CISO
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
100
Features
91
Security
87
Easy Setup
68
Visibility
67
Cons
Improvement Needed
29
Feature Limitations
28
Improvements Needed
26
Missing Features
25
Learning Curve
24
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.7
9.1
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,103 Twitter followers
LinkedIn® Page
www.linkedin.com
2,054 employees on LinkedIn®
(1,108)4.9 out of 5
Optimized for quick response
1st Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for Scrut Automation
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes com

    Users
    • CTO
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Small-Business
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Scrut Automation Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    407
    Helpful
    315
    Customer Support
    300
    Compliance
    288
    Compliance Management
    285
    Cons
    Improvement Needed
    100
    Technical Issues
    75
    Improvements Needed
    74
    Software Bugs
    61
    Slow Loading
    54
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Scrut Automation features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.4
    Configuration Monitoring
    Average: 8.7
    9.4
    Vulnerability Scanning
    Average: 8.9
    9.2
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Palo Alto, US
    Twitter
    @scrutsocial
    107 Twitter followers
    LinkedIn® Page
    in.linkedin.com
    188 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes com

Users
  • CTO
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Small-Business
  • 49% Mid-Market
Scrut Automation Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
407
Helpful
315
Customer Support
300
Compliance
288
Compliance Management
285
Cons
Improvement Needed
100
Technical Issues
75
Improvements Needed
74
Software Bugs
61
Slow Loading
54
Scrut Automation features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
9.4
Configuration Monitoring
Average: 8.7
9.4
Vulnerability Scanning
Average: 8.9
9.2
Threat Hunting
Average: 8.6
Seller Details
Company Website
Year Founded
2022
HQ Location
Palo Alto, US
Twitter
@scrutsocial
107 Twitter followers
LinkedIn® Page
in.linkedin.com
188 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(218)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    57
    Security
    52
    Features
    51
    Cloud Security
    37
    Vulnerability Detection
    36
    Cons
    Improvement Needed
    25
    Feature Limitations
    19
    Missing Features
    18
    Improvements Needed
    16
    Ineffective Alerts
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.5
    Configuration Monitoring
    Average: 8.7
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.4
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,826 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    442 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
57
Security
52
Features
51
Cloud Security
37
Vulnerability Detection
36
Cons
Improvement Needed
25
Feature Limitations
19
Missing Features
18
Improvements Needed
16
Ineffective Alerts
15
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.5
Configuration Monitoring
Average: 8.7
9.1
Vulnerability Scanning
Average: 8.9
8.4
Threat Hunting
Average: 8.6
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,826 Twitter followers
LinkedIn® Page
www.linkedin.com
442 employees on LinkedIn®
(107)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 47% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    35
    Security
    34
    Threat Detection
    28
    Detection Efficiency
    27
    Features
    25
    Cons
    Feature Limitations
    12
    Missing Features
    9
    Complexity
    8
    Resource Limitations
    7
    Feature Complexity
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    9.4
    Configuration Monitoring
    Average: 8.7
    9.6
    Vulnerability Scanning
    Average: 8.9
    9.7
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,167 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    787 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

Users
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 47% Enterprise
  • 40% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
35
Security
34
Threat Detection
28
Detection Efficiency
27
Features
25
Cons
Feature Limitations
12
Missing Features
9
Complexity
8
Resource Limitations
7
Feature Complexity
6
Sysdig Secure features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
9.4
Configuration Monitoring
Average: 8.7
9.6
Vulnerability Scanning
Average: 8.9
9.7
Threat Hunting
Average: 8.6
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,167 Twitter followers
LinkedIn® Page
www.linkedin.com
787 employees on LinkedIn®
(156)4.5 out of 5
7th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard CNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    32
    Cloud Security
    27
    Cloud Services
    23
    Features
    23
    Cloud Integration
    22
    Cons
    Improvement Needed
    11
    Poor Support Services
    8
    Missing Features
    7
    Poor Customer Support
    7
    Improvements Needed
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Configuration Monitoring
    Average: 8.7
    9.4
    Vulnerability Scanning
    Average: 8.9
    9.2
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,380 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Check Point CloudGuard CNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
32
Cloud Security
27
Cloud Services
23
Features
23
Cloud Integration
22
Cons
Improvement Needed
11
Poor Support Services
8
Missing Features
7
Poor Customer Support
7
Improvements Needed
6
Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.3
8.6
Configuration Monitoring
Average: 8.7
9.4
Vulnerability Scanning
Average: 8.9
9.2
Threat Hunting
Average: 8.6
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,380 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
(107)4.9 out of 5
8th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    37
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.8
    Configuration Monitoring
    Average: 8.7
    9.9
    Vulnerability Scanning
    Average: 8.9
    9.9
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    54,966 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,802 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
37
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
9.8
Configuration Monitoring
Average: 8.7
9.9
Vulnerability Scanning
Average: 8.9
9.9
Threat Hunting
Average: 8.6
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,966 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
(69)4.6 out of 5
View top Consulting Services for CrowdStrike Falcon Cloud Security
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Unified cloud security, from endpoint to cloud. Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    28
    Cloud Security
    23
    Detection Efficiency
    19
    Threat Detection
    17
    Vulnerability Detection
    16
    Cons
    Expensive
    9
    Improvements Needed
    9
    Improvement Needed
    7
    Insufficient Information
    5
    Learning Curve
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Cloud Security features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Configuration Monitoring
    Average: 8.7
    8.4
    Vulnerability Scanning
    Average: 8.9
    8.9
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,733 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

Unified cloud security, from endpoint to cloud. Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 41% Mid-Market
CrowdStrike Falcon Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
28
Cloud Security
23
Detection Efficiency
19
Threat Detection
17
Vulnerability Detection
16
Cons
Expensive
9
Improvements Needed
9
Improvement Needed
7
Insufficient Information
5
Learning Curve
4
CrowdStrike Falcon Cloud Security features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
8.9
Configuration Monitoring
Average: 8.7
8.4
Vulnerability Scanning
Average: 8.9
8.9
Threat Hunting
Average: 8.6
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,733 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
Ownership
NASDAQ: CRWD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    179
    Comprehensive Security
    119
    Cloud Security
    107
    Ease of Use
    85
    Cloud Services
    72
    Cons
    Complexity
    41
    Expensive
    38
    Improvement Needed
    28
    Missing Features
    27
    Delayed Detection
    26
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.7
    8.9
    Vulnerability Scanning
    Average: 8.9
    8.6
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,060,258 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
179
Comprehensive Security
119
Cloud Security
107
Ease of Use
85
Cloud Services
72
Cons
Complexity
41
Expensive
38
Improvement Needed
28
Missing Features
27
Delayed Detection
26
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.7
8.9
Vulnerability Scanning
Average: 8.9
8.6
Threat Hunting
Average: 8.6
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,060,258 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
(381)4.4 out of 5
Optimized for quick response
12th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for Lacework
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lacework Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    47
    Security
    36
    Vulnerability Detection
    28
    Integrations
    22
    Cloud Integration
    21
    Cons
    Missing Features
    19
    Improvement Needed
    17
    Feature Limitations
    15
    Insufficient Information
    15
    Improvements Needed
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lacework features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.7
    Configuration Monitoring
    Average: 8.7
    8.9
    Vulnerability Scanning
    Average: 8.9
    8.2
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,964 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
Lacework Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
47
Security
36
Vulnerability Detection
28
Integrations
22
Cloud Integration
21
Cons
Missing Features
19
Improvement Needed
17
Feature Limitations
15
Insufficient Information
15
Improvements Needed
14
Lacework features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
8.7
Configuration Monitoring
Average: 8.7
8.9
Vulnerability Scanning
Average: 8.9
8.2
Threat Hunting
Average: 8.6
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,964 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Cloud Integration
    10
    Ease of Use
    9
    Cloud Services
    8
    Threat Detection
    8
    Cons
    Complexity
    5
    Complex Setup
    5
    Difficult Setup
    4
    Expensive
    4
    Improvement Needed
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    9.1
    Configuration Monitoring
    Average: 8.7
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.9
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,579 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 34% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Cloud Integration
10
Ease of Use
9
Cloud Services
8
Threat Detection
8
Cons
Complexity
5
Complex Setup
5
Difficult Setup
4
Expensive
4
Improvement Needed
4
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
9.1
Configuration Monitoring
Average: 8.7
9.1
Vulnerability Scanning
Average: 8.9
8.9
Threat Hunting
Average: 8.6
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,579 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
(56)4.6 out of 5
15th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Zscaler for Workloads, you can reduce your costs by 30% or more and eliminate security policies by up to 90% with its innovative zero trust architecture.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 77% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Cloud Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Cloud Protection features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Configuration Monitoring
    Average: 8.7
    8.5
    Vulnerability Scanning
    Average: 8.9
    8.5
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,474 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,427 employees on LinkedIn®
    Ownership
    NASDAQ:ZS
Product Description
How are these determined?Information
This description is provided by the seller.

With Zscaler for Workloads, you can reduce your costs by 30% or more and eliminate security policies by up to 90% with its innovative zero trust architecture.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 77% Enterprise
  • 20% Mid-Market
Zscaler Cloud Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
This product has not yet received any negative sentiments.
Zscaler Cloud Protection features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.3
8.6
Configuration Monitoring
Average: 8.7
8.5
Vulnerability Scanning
Average: 8.9
8.5
Threat Hunting
Average: 8.6
Seller Details
Seller
Zscaler
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,474 Twitter followers
LinkedIn® Page
www.linkedin.com
8,427 employees on LinkedIn®
Ownership
NASDAQ:ZS
(130)4.9 out of 5
Optimized for quick response
6th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

    Users
    • Security Engineer
    • Cyber Security Engineer
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 55% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cymulate: Security Validation and Exposure Management Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    62
    Features
    38
    Security
    36
    Customer Support
    32
    Vulnerability Identification
    29
    Cons
    Improvement Needed
    10
    Integration Issues
    8
    Lack of Integration
    6
    Inefficient Alert System
    5
    Complexity
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cymulate: Security Validation and Exposure Management Platform features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.3
    5.0
    Configuration Monitoring
    Average: 8.7
    5.0
    Vulnerability Scanning
    Average: 8.9
    4.2
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cymulate
    Company Website
    Year Founded
    2016
    HQ Location
    Holon, Israel
    Twitter
    @CymulateLtd
    1,082 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    234 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

Users
  • Security Engineer
  • Cyber Security Engineer
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 55% Enterprise
  • 43% Mid-Market
Cymulate: Security Validation and Exposure Management Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
62
Features
38
Security
36
Customer Support
32
Vulnerability Identification
29
Cons
Improvement Needed
10
Integration Issues
8
Lack of Integration
6
Inefficient Alert System
5
Complexity
4
Cymulate: Security Validation and Exposure Management Platform features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.3
5.0
Configuration Monitoring
Average: 8.7
5.0
Vulnerability Scanning
Average: 8.9
4.2
Threat Hunting
Average: 8.6
Seller Details
Seller
Cymulate
Company Website
Year Founded
2016
HQ Location
Holon, Israel
Twitter
@CymulateLtd
1,082 Twitter followers
LinkedIn® Page
www.linkedin.com
234 employees on LinkedIn®
(54)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aikido Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    29
    Security
    26
    Easy Integrations
    23
    Easy Setup
    21
    Features
    20
    Cons
    Missing Features
    8
    False Positives
    7
    Limited Features
    7
    Improvement Needed
    6
    Lack of Information
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    7.8
    Configuration Monitoring
    Average: 8.7
    8.9
    Vulnerability Scanning
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    1,331 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
Aikido Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
29
Security
26
Easy Integrations
23
Easy Setup
21
Features
20
Cons
Missing Features
8
False Positives
7
Limited Features
7
Improvement Needed
6
Lack of Information
6
Aikido Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
7.8
Configuration Monitoring
Average: 8.7
8.9
Vulnerability Scanning
Average: 8.9
0.0
No information available
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
1,331 Twitter followers
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
(30)4.7 out of 5
14th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for Tenable Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 50% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Cloud Management
    7
    Customer Support
    7
    Insights
    7
    Monitoring
    6
    Cons
    Limited Features
    5
    Feature Limitations
    3
    Improvement Needed
    3
    Lack of Features
    3
    Missing Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Configuration Monitoring
    Average: 8.7
    9.4
    Vulnerability Scanning
    Average: 8.9
    9.2
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,127 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 50% Mid-Market
  • 43% Enterprise
Tenable Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Cloud Management
7
Customer Support
7
Insights
7
Monitoring
6
Cons
Limited Features
5
Feature Limitations
3
Improvement Needed
3
Lack of Features
3
Missing Features
3
Tenable Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
9.2
Configuration Monitoring
Average: 8.7
9.4
Vulnerability Scanning
Average: 8.9
9.2
Threat Hunting
Average: 8.6
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,127 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(124)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when respondi

    Users
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 75% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SafeBase Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    24
    Security
    12
    Security Management
    10
    Intuitive
    9
    Integrations
    6
    Cons
    Access Management
    6
    Document Management
    3
    Improvement Needed
    2
    Insufficient Information
    2
    Integration Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SafeBase features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Configuration Monitoring
    Average: 8.7
    8.3
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SafeBase
    Company Website
    Year Founded
    2020
    HQ Location
    San Francisco, California
    Twitter
    @getsafebase
    265 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when respondi

Users
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 75% Mid-Market
  • 17% Enterprise
SafeBase Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
24
Security
12
Security Management
10
Intuitive
9
Integrations
6
Cons
Access Management
6
Document Management
3
Improvement Needed
2
Insufficient Information
2
Integration Issues
2
SafeBase features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
8.3
Configuration Monitoring
Average: 8.7
8.3
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Seller Details
Seller
SafeBase
Company Website
Year Founded
2020
HQ Location
San Francisco, California
Twitter
@getsafebase
265 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®