Best Container Security Tools

Lauren Worth
LW
Researched and written by Lauren Worth

Container security tools are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discovering zero-day vulnerabilities, and simulating attacks from common threat sources.

Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

To qualify for inclusion in the Container Security category, a product must:

Integrate security with DevOps tools
Monitor and secure container networks or pipelines
Enforce access and security policies
Provide runtime protection capabilities

Best Container Security Tools At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
66 Listings in Container Security Available
By Wiz
(698)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • Security Engineer
    • CISO
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    351
    Security
    315
    Visibility
    260
    Features
    249
    Cloud Management
    227
    Cons
    Improvement Needed
    121
    Missing Features
    119
    Feature Limitations
    107
    Learning Curve
    98
    Limited Features
    82
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Security Auditing
    Average: 8.2
    7.7
    Network Segmentation
    Average: 7.9
    8.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    14,715 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,054 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • Security Engineer
  • CISO
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
351
Security
315
Visibility
260
Features
249
Cloud Management
227
Cons
Improvement Needed
121
Missing Features
119
Feature Limitations
107
Learning Curve
98
Limited Features
82
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
9.1
Security Auditing
Average: 8.2
7.7
Network Segmentation
Average: 7.9
8.0
Workload Protection
Average: 8.0
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
14,715 Twitter followers
LinkedIn® Page
www.linkedin.com
2,054 employees on LinkedIn®
(105)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 47% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    33
    Security
    31
    Threat Detection
    26
    Detection Efficiency
    24
    Features
    24
    Cons
    Feature Limitations
    12
    Missing Features
    9
    Complexity
    8
    Resource Limitations
    7
    Feature Complexity
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Security Auditing
    Average: 8.2
    9.1
    Network Segmentation
    Average: 7.9
    9.4
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    787 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

Users
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 47% Enterprise
  • 40% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
33
Security
31
Threat Detection
26
Detection Efficiency
24
Features
24
Cons
Feature Limitations
12
Missing Features
9
Complexity
8
Resource Limitations
7
Feature Complexity
6
Sysdig Secure features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.9
9.6
Security Auditing
Average: 8.2
9.1
Network Segmentation
Average: 7.9
9.4
Workload Protection
Average: 8.0
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,183 Twitter followers
LinkedIn® Page
www.linkedin.com
787 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(218)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    54
    Features
    49
    Security
    49
    Cloud Security
    36
    Vulnerability Detection
    35
    Cons
    Improvement Needed
    25
    Missing Features
    18
    Feature Limitations
    17
    Improvements Needed
    14
    Ineffective Alerts
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Security Auditing
    Average: 8.2
    7.7
    Network Segmentation
    Average: 7.9
    7.8
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,837 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    442 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
54
Features
49
Security
49
Cloud Security
36
Vulnerability Detection
35
Cons
Improvement Needed
25
Missing Features
18
Feature Limitations
17
Improvements Needed
14
Ineffective Alerts
14
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
8.9
Security Auditing
Average: 8.2
7.7
Network Segmentation
Average: 7.9
7.8
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,837 Twitter followers
LinkedIn® Page
www.linkedin.com
442 employees on LinkedIn®
(381)4.3 out of 5
Optimized for quick response
6th Easiest To Use in Container Security software
View top Consulting Services for Lacework
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lacework Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Security
    50
    Vulnerability Detection
    35
    Easy Setup
    28
    Integrations
    27
    Cons
    Missing Features
    22
    Improvement Needed
    21
    Insufficient Information
    19
    Feature Limitations
    18
    Improvements Needed
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lacework features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Security Auditing
    Average: 8.2
    7.9
    Network Segmentation
    Average: 7.9
    8.5
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
Lacework Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Security
50
Vulnerability Detection
35
Easy Setup
28
Integrations
27
Cons
Missing Features
22
Improvement Needed
21
Insufficient Information
19
Feature Limitations
18
Improvements Needed
17
Lacework features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
8.7
Security Auditing
Average: 8.2
7.9
Network Segmentation
Average: 7.9
8.5
Workload Protection
Average: 8.0
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,032 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
(31)4.9 out of 5
Optimized for quick response
4th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Chainguard Images is a type of container image that helps users deploy minimalist, continuously updated, and verifiably hardened container images for cloud-native applications with low to no CVEs.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 42% Enterprise
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Chainguard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Security
    15
    Container Security
    10
    Customer Support
    10
    Vulnerability Scanning
    7
    Cons
    Pricing Issues
    4
    Authentication Issues
    2
    Difficult Learning
    2
    Integration Issues
    2
    Missing Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chainguard features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.0
    Security Auditing
    Average: 8.2
    7.0
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    Kirkland, WA
    Twitter
    @chainguard_dev
    5,805 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    249 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Chainguard Images is a type of container image that helps users deploy minimalist, continuously updated, and verifiably hardened container images for cloud-native applications with low to no CVEs.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 42% Enterprise
  • 39% Small-Business
Chainguard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Security
15
Container Security
10
Customer Support
10
Vulnerability Scanning
7
Cons
Pricing Issues
4
Authentication Issues
2
Difficult Learning
2
Integration Issues
2
Missing Features
2
Chainguard features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.0
Security Auditing
Average: 8.2
7.0
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2021
HQ Location
Kirkland, WA
Twitter
@chainguard_dev
5,805 Twitter followers
LinkedIn® Page
www.linkedin.com
249 employees on LinkedIn®
(107)4.9 out of 5
3rd Easiest To Use in Container Security software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    37
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 8.9
    9.9
    Security Auditing
    Average: 8.2
    9.9
    Network Segmentation
    Average: 7.9
    9.9
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    54,641 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,802 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
37
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 8.9
9.9
Security Auditing
Average: 8.2
9.9
Network Segmentation
Average: 7.9
9.9
Workload Protection
Average: 8.0
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,641 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
(301)4.4 out of 5
11th Easiest To Use in Container Security software
View top Consulting Services for Microsoft Defender for Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    184
    Comprehensive Security
    123
    Cloud Security
    110
    Ease of Use
    87
    Cloud Integration
    74
    Cons
    Complexity
    41
    Expensive
    39
    Improvement Needed
    28
    Missing Features
    27
    Delayed Detection
    26
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Security Auditing
    Average: 8.2
    9.4
    Network Segmentation
    Average: 7.9
    9.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,046,186 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 35% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
184
Comprehensive Security
123
Cloud Security
110
Ease of Use
87
Cloud Integration
74
Cons
Complexity
41
Expensive
39
Improvement Needed
28
Missing Features
27
Delayed Detection
26
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 8.9
9.1
Security Auditing
Average: 8.2
9.4
Network Segmentation
Average: 7.9
9.3
Workload Protection
Average: 8.0
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,046,186 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Container Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Container Security
    4
    Security
    4
    Scanning Technology
    3
    Cloud Integration
    2
    Comprehensive Security
    2
    Cons
    Complexity
    2
    Complex Setup
    2
    Learning Curve
    2
    Difficult Learning
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Container Security features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Security Auditing
    Average: 8.2
    9.5
    Network Segmentation
    Average: 7.9
    8.7
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,581,844 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale.

Users
No information available
Industries
No information available
Market Segment
  • 54% Small-Business
  • 23% Mid-Market
Google Container Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Container Security
4
Security
4
Scanning Technology
3
Cloud Integration
2
Comprehensive Security
2
Cons
Complexity
2
Complex Setup
2
Learning Curve
2
Difficult Learning
1
Expensive
1
Google Container Security features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.1
Security Auditing
Average: 8.2
9.5
Network Segmentation
Average: 7.9
8.7
Workload Protection
Average: 8.0
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,581,844 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(12)5.0 out of 5
8th Easiest To Use in Container Security software
View top Consulting Services for Red Hat Advanced Cluster Security for Kubernetes
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Red Hat Advanced Cluster Security for Kubernetes features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Hat
    Year Founded
    1993
    HQ Location
    Raleigh, NC
    Twitter
    @RedHat
    294,341 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19,863 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 42% Mid-Market
  • 33% Small-Business
Red Hat Advanced Cluster Security for Kubernetes features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Red Hat
Year Founded
1993
HQ Location
Raleigh, NC
Twitter
@RedHat
294,341 Twitter followers
LinkedIn® Page
www.linkedin.com
19,863 employees on LinkedIn®
(57)4.2 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 56% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aqua Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    24
    Security
    21
    Vulnerability Identification
    13
    Features
    12
    User Interface
    12
    Cons
    Missing Features
    14
    Lack of Features
    9
    Improvement Needed
    7
    Limited Features
    7
    Poor Interface
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aqua Security features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 8.9
    8.0
    Security Auditing
    Average: 8.2
    7.2
    Network Segmentation
    Average: 7.9
    8.6
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Burlington, US
    Twitter
    @AquaSecTeam
    7,597 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    650 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 56% Enterprise
  • 39% Mid-Market
Aqua Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
24
Security
21
Vulnerability Identification
13
Features
12
User Interface
12
Cons
Missing Features
14
Lack of Features
9
Improvement Needed
7
Limited Features
7
Poor Interface
5
Aqua Security features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 8.9
8.0
Security Auditing
Average: 8.2
7.2
Network Segmentation
Average: 7.9
8.6
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2015
HQ Location
Burlington, US
Twitter
@AquaSecTeam
7,597 Twitter followers
LinkedIn® Page
www.linkedin.com
650 employees on LinkedIn®
(42)4.7 out of 5
Optimized for quick response
7th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 76% Small-Business
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aikido Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Security
    25
    Easy Integrations
    19
    Easy Setup
    17
    Customer Support
    15
    Cons
    Missing Features
    8
    Improvement Needed
    6
    Lacking Features
    6
    Lack of Information
    6
    Limited Features
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.0
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.9
    10.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    1,112 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 76% Small-Business
  • 24% Mid-Market
Aikido Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Security
25
Easy Integrations
19
Easy Setup
17
Customer Support
15
Cons
Missing Features
8
Improvement Needed
6
Lacking Features
6
Lack of Information
6
Limited Features
6
Aikido Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.0
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.9
10.0
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
1,112 Twitter followers
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
(175)4.5 out of 5
12th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Cloud Integration
    10
    Ease of Use
    9
    Cloud Services
    8
    Threat Detection
    8
    Cons
    Complexity
    5
    Complex Setup
    5
    Difficult Setup
    4
    Expensive
    4
    Improvement Needed
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security Auditing
    Average: 8.2
    6.7
    Network Segmentation
    Average: 7.9
    9.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,678 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 35% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Cloud Integration
10
Ease of Use
9
Cloud Services
8
Threat Detection
8
Cons
Complexity
5
Complex Setup
5
Difficult Setup
4
Expensive
4
Improvement Needed
4
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security Auditing
Average: 8.2
6.7
Network Segmentation
Average: 7.9
9.3
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,678 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
By Snyk
(122)4.5 out of 5
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snyk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    6
    Integration Support
    4
    Ease of Use
    3
    Git Integration
    3
    Integrations
    3
    Cons
    False Positives
    3
    Pricing Issues
    3
    Complex Configuration
    2
    Dashboard Issues
    2
    Expensive
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snyk features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    7.9
    Security Auditing
    Average: 8.2
    6.9
    Network Segmentation
    Average: 7.9
    7.4
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    19,690 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,284 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 38% Small-Business
Snyk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
6
Integration Support
4
Ease of Use
3
Git Integration
3
Integrations
3
Cons
False Positives
3
Pricing Issues
3
Complex Configuration
2
Dashboard Issues
2
Expensive
2
Snyk features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
7.9
Security Auditing
Average: 8.2
6.9
Network Segmentation
Average: 7.9
7.4
Workload Protection
Average: 8.0
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
19,690 Twitter followers
LinkedIn® Page
www.linkedin.com
1,284 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard CNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    31
    Cloud Security
    26
    Cloud Services
    22
    Detection
    22
    Features
    22
    Cons
    Improvement Needed
    11
    Poor Support Services
    8
    Missing Features
    7
    Poor Customer Support
    7
    Improvements Needed
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 8.9
    7.7
    Security Auditing
    Average: 8.2
    8.1
    Network Segmentation
    Average: 7.9
    8.8
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,170 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Check Point CloudGuard CNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
31
Cloud Security
26
Cloud Services
22
Detection
22
Features
22
Cons
Improvement Needed
11
Poor Support Services
8
Missing Features
7
Poor Customer Support
7
Improvements Needed
6
Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 8.9
7.7
Security Auditing
Average: 8.2
8.1
Network Segmentation
Average: 7.9
8.8
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,170 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
(25)4.4 out of 5
Optimized for quick response
14th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Calico security platform provides secure networking and comprehensive protection for containers and Kubernetes to prevent, detect, and mitigate security breaches. Calico Cloud is built on Calico Open

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Calico Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Customer Support
    13
    Security
    12
    Features
    10
    Visibility
    9
    Cons
    Complex Setup
    6
    Complexity
    5
    Configuration Difficulties
    5
    Difficult Configuration
    5
    Difficult Setup
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Calico Cloud features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    8.6
    Security Auditing
    Average: 8.2
    9.4
    Network Segmentation
    Average: 7.9
    8.8
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tigera
    Company Website
    Year Founded
    2016
    HQ Location
    San Jose, CA
    Twitter
    @tigeraio
    1,956 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    131 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Calico security platform provides secure networking and comprehensive protection for containers and Kubernetes to prevent, detect, and mitigate security breaches. Calico Cloud is built on Calico Open

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Enterprise
  • 32% Mid-Market
Calico Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Customer Support
13
Security
12
Features
10
Visibility
9
Cons
Complex Setup
6
Complexity
5
Configuration Difficulties
5
Difficult Configuration
5
Difficult Setup
5
Calico Cloud features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
8.6
Security Auditing
Average: 8.2
9.4
Network Segmentation
Average: 7.9
8.8
Workload Protection
Average: 8.0
Seller Details
Seller
Tigera
Company Website
Year Founded
2016
HQ Location
San Jose, CA
Twitter
@tigeraio
1,956 Twitter followers
LinkedIn® Page
www.linkedin.com
131 employees on LinkedIn®