Best Container Security Tools - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Container security tools are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discovering zero-day vulnerabilities, and simulating attacks from common threat sources.

Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

To qualify for inclusion in the Container Security category, a product must:

Integrate security with DevOps tools
Monitor and secure container networks or pipelines
Enforce access and security policies
Provide runtime protection capabilities

Best Container Security Tools At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
66 Listings in Container Security Available
(10)4.9 out of 5
9th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudanix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    5
    Ease of Use
    5
    Features
    5
    Cloud Technology
    4
    Customer Support
    4
    Cons
    Lack of Customization
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudanix features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Security Auditing
    Average: 8.2
    8.1
    Network Segmentation
    Average: 7.9
    9.6
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cloudanix
    Year Founded
    2020
    HQ Location
    Sunnyvale, CA
    Twitter
    @cloudanix
    88 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Small-Business
Cloudanix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
5
Ease of Use
5
Features
5
Cloud Technology
4
Customer Support
4
Cons
Lack of Customization
1
Limited Customization
1
Cloudanix features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 8.9
9.3
Security Auditing
Average: 8.2
8.1
Network Segmentation
Average: 7.9
9.6
Workload Protection
Average: 8.0
Seller Details
Seller
Cloudanix
Year Founded
2020
HQ Location
Sunnyvale, CA
Twitter
@cloudanix
88 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
By ARMO
(37)4.6 out of 5
15th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 65% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ARMO Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Security
    19
    Features
    14
    Insights
    14
    Comprehensive Security
    13
    Cons
    Learning Curve
    9
    Difficult Learning
    6
    Expensive
    5
    Integration Issues
    5
    Complex Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    9.1
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Company Website
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
Market Segment
  • 65% Small-Business
  • 30% Mid-Market
ARMO Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Security
19
Features
14
Insights
14
Comprehensive Security
13
Cons
Learning Curve
9
Difficult Learning
6
Expensive
5
Integration Issues
5
Complex Setup
4
ARMO Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
9.1
Workload Protection
Average: 8.0
Seller Details
Seller
ARMO
Company Website
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,128 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security integrated into DevOps. Protect containers in development and operations.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Small-Business
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Container Security features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 8.9
    9.0
    Security Auditing
    Average: 8.2
    8.8
    Network Segmentation
    Average: 7.9
    9.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,069 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Security integrated into DevOps. Protect containers in development and operations.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Small-Business
  • 40% Mid-Market
Tenable Container Security features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 8.9
9.0
Security Auditing
Average: 8.2
8.8
Network Segmentation
Average: 7.9
9.3
Workload Protection
Average: 8.0
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,069 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(61)4.1 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 43% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cortex Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    25
    Cloud Management
    18
    Cloud Security
    18
    Cloud Services
    16
    Ease of Use
    16
    Cons
    Expensive
    15
    Learning Curve
    12
    Pricing Issues
    12
    Not User-Friendly
    10
    Poor User Interface
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 8.9
    7.6
    Security Auditing
    Average: 8.2
    6.9
    Network Segmentation
    Average: 7.9
    7.6
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,187 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 43% Enterprise
  • 31% Mid-Market
Cortex Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
25
Cloud Management
18
Cloud Security
18
Cloud Services
16
Ease of Use
16
Cons
Expensive
15
Learning Curve
12
Pricing Issues
12
Not User-Friendly
10
Poor User Interface
10
Cortex Cloud features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 8.9
7.6
Security Auditing
Average: 8.2
6.9
Network Segmentation
Average: 7.9
7.6
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,187 Twitter followers
LinkedIn® Page
www.linkedin.com
16,690 employees on LinkedIn®
(95)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

    Users
    • CEO
    • CTO
    Industries
    • Mechanical or Industrial Engineering
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 42% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wallarm API Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Security
    3
    Threat Detection
    3
    Cloud Integration
    2
    Comprehensive Security
    2
    Cons
    API Issues
    1
    Complexity
    1
    Expensive
    1
    Learning Curve
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wallarm API Security Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.7
    Security Auditing
    Average: 8.2
    9.6
    Network Segmentation
    Average: 7.9
    10.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wallarm
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, California
    Twitter
    @wallarm
    3,177 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

Users
  • CEO
  • CTO
Industries
  • Mechanical or Industrial Engineering
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 42% Small-Business
Wallarm API Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Security
3
Threat Detection
3
Cloud Integration
2
Comprehensive Security
2
Cons
API Issues
1
Complexity
1
Expensive
1
Learning Curve
1
Limited Features
1
Wallarm API Security Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.7
Security Auditing
Average: 8.2
9.6
Network Segmentation
Average: 7.9
10.0
Workload Protection
Average: 8.0
Seller Details
Seller
Wallarm
Company Website
Year Founded
2016
HQ Location
San Francisco, California
Twitter
@wallarm
3,177 Twitter followers
LinkedIn® Page
www.linkedin.com
143 employees on LinkedIn®
By Mend
(112)4.3 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mend.io, formerly WhiteSource, effortlessly secures what developers create. Mend.io uniquely removes the burden of application security, allowing development teams to deliver quality, secure code fast

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mend.io Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Scanning Efficiency
    5
    Customer Support
    4
    Easy Integrations
    4
    Integration Support
    4
    Cons
    False Positives
    2
    Integration Issues
    2
    Poor Documentation
    2
    Complex Implementation
    1
    Inefficient Scanning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mend.io features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mend
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts
    Twitter
    @Mend_io
    11,583 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    303 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mend.io, formerly WhiteSource, effortlessly secures what developers create. Mend.io uniquely removes the burden of application security, allowing development teams to deliver quality, secure code fast

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Mend.io Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Scanning Efficiency
5
Customer Support
4
Easy Integrations
4
Integration Support
4
Cons
False Positives
2
Integration Issues
2
Poor Documentation
2
Complex Implementation
1
Inefficient Scanning
1
Mend.io features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
9.1
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.0
Seller Details
Seller
Mend
Company Website
Year Founded
2011
HQ Location
Boston, Massachusetts
Twitter
@Mend_io
11,583 Twitter followers
LinkedIn® Page
www.linkedin.com
303 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 63% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetScaler Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Features
    1
    Latency Reduction
    1
    Load Balancing
    1
    Performance
    1
    Cons
    Connection Issues
    1
    Connectivity Issues
    1
    Expensive
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetScaler features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @cloudsoftware
    103 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,289 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 63% Enterprise
  • 29% Mid-Market
NetScaler Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Features
1
Latency Reduction
1
Load Balancing
1
Performance
1
Cons
Connection Issues
1
Connectivity Issues
1
Expensive
1
Slow Performance
1
NetScaler features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Fort Lauderdale, FL
Twitter
@cloudsoftware
103 Twitter followers
LinkedIn® Page
www.linkedin.com
11,289 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Distributed Cloud AIP, formerly known as Threat Stack, is the leader in cloud security and compliance for application infrastructures, helping companies securely leverage the business benefits of the

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 70% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 Distributed Cloud App Infrastructure Protection (AIP) features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    6.7
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,450 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Distributed Cloud AIP, formerly known as Threat Stack, is the leader in cloud security and compliance for application infrastructures, helping companies securely leverage the business benefits of the

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 70% Mid-Market
  • 20% Small-Business
F5 Distributed Cloud App Infrastructure Protection (AIP) features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
7.5
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
6.7
Workload Protection
Average: 8.0
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,450 Twitter followers
LinkedIn® Page
www.linkedin.com
6,292 employees on LinkedIn®
(87)4.7 out of 5
13th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    Security Auditing
    Average: 8.2
    8.5
    Network Segmentation
    Average: 7.9
    7.9
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,828 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
0.0
Security Auditing
Average: 8.2
8.5
Network Segmentation
Average: 7.9
7.9
Workload Protection
Average: 8.0
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,828 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

    Users
    • Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VMDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    6
    Vulnerability Scanning
    5
    Vulnerability Identification
    4
    Automated Scanning
    3
    Deployment Ease
    3
    Cons
    Complexity
    3
    Connectivity Issues
    3
    Poor Interface
    3
    Poor Reporting
    3
    Poor User Interface
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VMDR features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,310 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,846 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

Users
  • Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 28% Mid-Market
Qualys VMDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
6
Vulnerability Scanning
5
Vulnerability Identification
4
Automated Scanning
3
Deployment Ease
3
Cons
Complexity
3
Connectivity Issues
3
Poor Interface
3
Poor Reporting
3
Poor User Interface
3
Qualys VMDR features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.9
8.3
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.0
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,310 Twitter followers
LinkedIn® Page
www.linkedin.com
2,846 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Conjur Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    1
    Cloud Services
    1
    Security
    1
    Useful
    1
    Cons
    Improvements Needed
    1
    Inadequate Tracking
    1
    Inefficiency
    1
    User Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Conjur features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Security Auditing
    Average: 8.2
    10.0
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,248 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,824 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Enterprise
  • 29% Mid-Market
CyberArk Conjur Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
1
Cloud Services
1
Security
1
Useful
1
Cons
Improvements Needed
1
Inadequate Tracking
1
Inefficiency
1
User Difficulty
1
CyberArk Conjur features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.3
Security Auditing
Average: 8.2
10.0
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.0
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,248 Twitter followers
LinkedIn® Page
www.linkedin.com
3,824 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more tha

    Users
    • Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 46% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlgoSec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Security
    39
    Policy Management
    34
    Risk Management
    29
    Features
    24
    Cons
    Improvement Needed
    20
    Improvements Needed
    20
    Missing Features
    13
    Integration Issues
    10
    Limited Features
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlgoSec features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Security Auditing
    Average: 8.2
    7.1
    Network Segmentation
    Average: 7.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AlgoSec
    Year Founded
    2004
    HQ Location
    Ridgefield Park, New Jersey
    Twitter
    @AlgoSec
    2,484 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    554 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more tha

Users
  • Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 46% Enterprise
  • 31% Mid-Market
AlgoSec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Security
39
Policy Management
34
Risk Management
29
Features
24
Cons
Improvement Needed
20
Improvements Needed
20
Missing Features
13
Integration Issues
10
Limited Features
10
AlgoSec features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 8.9
7.5
Security Auditing
Average: 8.2
7.1
Network Segmentation
Average: 7.9
0.0
No information available
Seller Details
Seller
AlgoSec
Year Founded
2004
HQ Location
Ridgefield Park, New Jersey
Twitter
@AlgoSec
2,484 Twitter followers
LinkedIn® Page
www.linkedin.com
554 employees on LinkedIn®
Entry Level Price:$5.04 HOUR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 70% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ExtraHop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Insightful Analysis
    7
    Visibility
    7
    Monitoring
    6
    Reliability
    6
    Cons
    False Positives
    3
    Alert Issues
    2
    Configuration Issues
    2
    Customization Issues
    2
    Expensive
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    11,010 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    725 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 70% Enterprise
  • 25% Mid-Market
ExtraHop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Insightful Analysis
7
Visibility
7
Monitoring
6
Reliability
6
Cons
False Positives
3
Alert Issues
2
Configuration Issues
2
Customization Issues
2
Expensive
2
ExtraHop features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
11,010 Twitter followers
LinkedIn® Page
www.linkedin.com
725 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWorx features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    5.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    LOS GATOS, US
    Twitter
    @threatwatch
    103 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
ThreatWorx features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
5.0
Workload Protection
Average: 8.0
Seller Details
Year Founded
2016
HQ Location
LOS GATOS, US
Twitter
@threatwatch
103 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NeuVector, the leader in full lifecycle container security, empowers global organizations to comprehensively secure their container infrastructures without compromising business velocity. For security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NeuVector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Container Security
    2
    Dashboard Usability
    1
    Ease of Use
    1
    Management Ease
    1
    Risk Management
    1
    Cons
    Cloud Dependency
    1
    Complexity
    1
    Complex Setup
    1
    Customization Difficulty
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NeuVector features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Security Auditing
    Average: 8.2
    9.2
    Network Segmentation
    Average: 7.9
    7.8
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    San Jose, California
    Twitter
    @NeuVector
    712 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NeuVector, the leader in full lifecycle container security, empowers global organizations to comprehensively secure their container infrastructures without compromising business velocity. For security

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 17% Enterprise
NeuVector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Container Security
2
Dashboard Usability
1
Ease of Use
1
Management Ease
1
Risk Management
1
Cons
Cloud Dependency
1
Complexity
1
Complex Setup
1
Customization Difficulty
1
Difficult Learning
1
NeuVector features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
6.7
Security Auditing
Average: 8.2
9.2
Network Segmentation
Average: 7.9
7.8
Workload Protection
Average: 8.0
Seller Details
Year Founded
2015
HQ Location
San Jose, California
Twitter
@NeuVector
712 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®