Best Container Security Tools for for Small Business

Lauren Worth
LW
Researched and written by Lauren Worth

Products classified in the overall Container Security category are similar in many regards and help companies of all sizes solve their business problems. However, small business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Small Business Container Security to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Small Business Container Security category.

In addition to qualifying for inclusion in the Container Security Tools category, to qualify for inclusion in the Small Business Container Security Tools category, a product must have at least 10 reviews left by a reviewer from a small business.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

9 Listings in Small Business Container Security Available

(105)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 47% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    33
    Security
    31
    Threat Detection
    26
    Detection Efficiency
    24
    Features
    24
    Cons
    Feature Limitations
    12
    Missing Features
    9
    Complexity
    8
    Resource Limitations
    7
    Feature Complexity
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Security Auditing
    Average: 8.2
    9.1
    Network Segmentation
    Average: 7.9
    9.4
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    787 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

Users
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 47% Enterprise
  • 40% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
33
Security
31
Threat Detection
26
Detection Efficiency
24
Features
24
Cons
Feature Limitations
12
Missing Features
9
Complexity
8
Resource Limitations
7
Feature Complexity
6
Sysdig Secure features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.9
9.6
Security Auditing
Average: 8.2
9.1
Network Segmentation
Average: 7.9
9.4
Workload Protection
Average: 8.0
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,183 Twitter followers
LinkedIn® Page
www.linkedin.com
787 employees on LinkedIn®
(31)4.9 out of 5
Optimized for quick response
5th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Chainguard Images is a type of container image that helps users deploy minimalist, continuously updated, and verifiably hardened container images for cloud-native applications with low to no CVEs.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 42% Enterprise
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Chainguard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Security
    15
    Container Security
    10
    Customer Support
    10
    Vulnerability Scanning
    7
    Cons
    Pricing Issues
    4
    Authentication Issues
    2
    Difficult Learning
    2
    Integration Issues
    2
    Missing Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chainguard features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.0
    Security Auditing
    Average: 8.2
    7.0
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    Kirkland, WA
    Twitter
    @chainguard_dev
    5,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    249 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Chainguard Images is a type of container image that helps users deploy minimalist, continuously updated, and verifiably hardened container images for cloud-native applications with low to no CVEs.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 42% Enterprise
  • 39% Small-Business
Chainguard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Security
15
Container Security
10
Customer Support
10
Vulnerability Scanning
7
Cons
Pricing Issues
4
Authentication Issues
2
Difficult Learning
2
Integration Issues
2
Missing Features
2
Chainguard features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.0
Security Auditing
Average: 8.2
7.0
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2021
HQ Location
Kirkland, WA
Twitter
@chainguard_dev
5,816 Twitter followers
LinkedIn® Page
www.linkedin.com
249 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(42)4.7 out of 5
Optimized for quick response
7th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 76% Small-Business
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aikido Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Security
    25
    Easy Integrations
    19
    Easy Setup
    17
    Customer Support
    15
    Cons
    Missing Features
    8
    Improvement Needed
    6
    Lacking Features
    6
    Lack of Information
    6
    Limited Features
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.0
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.9
    10.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    1,112 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 76% Small-Business
  • 24% Mid-Market
Aikido Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Security
25
Easy Integrations
19
Easy Setup
17
Customer Support
15
Cons
Missing Features
8
Improvement Needed
6
Lacking Features
6
Lack of Information
6
Limited Features
6
Aikido Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.0
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.9
10.0
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
1,112 Twitter followers
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
By Wiz
(698)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    351
    Security
    315
    Visibility
    260
    Features
    249
    Cloud Management
    227
    Cons
    Improvement Needed
    121
    Missing Features
    119
    Feature Limitations
    107
    Learning Curve
    98
    Limited Features
    82
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Security Auditing
    Average: 8.2
    7.7
    Network Segmentation
    Average: 7.9
    8.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    14,755 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,054 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
351
Security
315
Visibility
260
Features
249
Cloud Management
227
Cons
Improvement Needed
121
Missing Features
119
Feature Limitations
107
Learning Curve
98
Limited Features
82
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
9.1
Security Auditing
Average: 8.2
7.7
Network Segmentation
Average: 7.9
8.0
Workload Protection
Average: 8.0
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
14,755 Twitter followers
LinkedIn® Page
www.linkedin.com
2,054 employees on LinkedIn®
By Snyk
(122)4.5 out of 5
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snyk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    6
    Integration Support
    4
    Ease of Use
    3
    Git Integration
    3
    Integrations
    3
    Cons
    False Positives
    3
    Pricing Issues
    3
    Complex Configuration
    2
    Dashboard Issues
    2
    Expensive
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snyk features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    7.9
    Security Auditing
    Average: 8.2
    6.9
    Network Segmentation
    Average: 7.9
    7.4
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    19,690 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,284 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 38% Small-Business
Snyk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
6
Integration Support
4
Ease of Use
3
Git Integration
3
Integrations
3
Cons
False Positives
3
Pricing Issues
3
Complex Configuration
2
Dashboard Issues
2
Expensive
2
Snyk features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
7.9
Security Auditing
Average: 8.2
6.9
Network Segmentation
Average: 7.9
7.4
Workload Protection
Average: 8.0
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
19,690 Twitter followers
LinkedIn® Page
www.linkedin.com
1,284 employees on LinkedIn®
(381)4.3 out of 5
Optimized for quick response
6th Easiest To Use in Container Security software
View top Consulting Services for Lacework
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lacework Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Security
    50
    Vulnerability Detection
    35
    Easy Setup
    28
    Integrations
    27
    Cons
    Missing Features
    22
    Improvement Needed
    21
    Insufficient Information
    19
    Feature Limitations
    18
    Improvements Needed
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lacework features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Security Auditing
    Average: 8.2
    7.9
    Network Segmentation
    Average: 7.9
    8.5
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
Lacework Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Security
50
Vulnerability Detection
35
Easy Setup
28
Integrations
27
Cons
Missing Features
22
Improvement Needed
21
Insufficient Information
19
Feature Limitations
18
Improvements Needed
17
Lacework features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
8.7
Security Auditing
Average: 8.2
7.9
Network Segmentation
Average: 7.9
8.5
Workload Protection
Average: 8.0
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,032 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
By ARMO
(37)4.6 out of 5
15th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 65% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ARMO Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Security
    19
    Features
    14
    Insights
    14
    Comprehensive Security
    13
    Cons
    Learning Curve
    9
    Difficult Learning
    6
    Expensive
    5
    Integration Issues
    5
    Complex Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    9.1
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Company Website
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
Market Segment
  • 65% Small-Business
  • 30% Mid-Market
ARMO Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Security
19
Features
14
Insights
14
Comprehensive Security
13
Cons
Learning Curve
9
Difficult Learning
6
Expensive
5
Integration Issues
5
Complex Setup
4
ARMO Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
9.1
Workload Protection
Average: 8.0
Seller Details
Seller
ARMO
Company Website
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,128 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
By Mend
(112)4.3 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mend.io, formerly WhiteSource, effortlessly secures what developers create. Mend.io uniquely removes the burden of application security, allowing development teams to deliver quality, secure code fast

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mend.io Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Scanning Efficiency
    5
    Customer Support
    4
    Easy Integrations
    4
    Integration Support
    4
    Cons
    False Positives
    2
    Integration Issues
    2
    Poor Documentation
    2
    Complex Implementation
    1
    Inefficient Scanning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mend.io features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mend
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts
    Twitter
    @Mend_io
    11,583 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    303 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mend.io, formerly WhiteSource, effortlessly secures what developers create. Mend.io uniquely removes the burden of application security, allowing development teams to deliver quality, secure code fast

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Mend.io Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Scanning Efficiency
5
Customer Support
4
Easy Integrations
4
Integration Support
4
Cons
False Positives
2
Integration Issues
2
Poor Documentation
2
Complex Implementation
1
Inefficient Scanning
1
Mend.io features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
9.1
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.0
Seller Details
Seller
Mend
Company Website
Year Founded
2011
HQ Location
Boston, Massachusetts
Twitter
@Mend_io
11,583 Twitter followers
LinkedIn® Page
www.linkedin.com
303 employees on LinkedIn®
(87)4.7 out of 5
13th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    Security Auditing
    Average: 8.2
    8.5
    Network Segmentation
    Average: 7.9
    7.9
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,828 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
0.0
Security Auditing
Average: 8.2
8.5
Network Segmentation
Average: 7.9
7.9
Workload Protection
Average: 8.0
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,828 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®