Best Container Security Tools - Page 3

Lauren Worth
LW
Researched and written by Lauren Worth

Container security tools are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discovering zero-day vulnerabilities, and simulating attacks from common threat sources.

Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

To qualify for inclusion in the Container Security category, a product must:

Integrate security with DevOps tools
Monitor and secure container networks or pipelines
Enforce access and security policies
Provide runtime protection capabilities

Best Container Security Tools At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
66 Listings in Container Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AccuKnox Zero Trust CNAPP cloud security protects public and private clouds, Kubernetes and VMs. AccuKnox is a AI-powered Zero Trust Cloud Native Security Platform that helps organizations comply with

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AccuKnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    3
    Comprehensive Security
    3
    Integrations
    3
    Security
    3
    Compliance Management
    2
    Cons
    Difficult Learning
    3
    Complex Setup
    2
    Complexity
    1
    Difficult Configuration
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AccuKnox features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Security Auditing
    Average: 8.2
    9.0
    Network Segmentation
    Average: 7.9
    9.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Accuknox
    Year Founded
    2020
    HQ Location
    California, USA
    Twitter
    @AccuKnox
    321 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

AccuKnox Zero Trust CNAPP cloud security protects public and private clouds, Kubernetes and VMs. AccuKnox is a AI-powered Zero Trust Cloud Native Security Platform that helps organizations comply with

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 30% Small-Business
AccuKnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
3
Comprehensive Security
3
Integrations
3
Security
3
Compliance Management
2
Cons
Difficult Learning
3
Complex Setup
2
Complexity
1
Difficult Configuration
1
Expensive
1
AccuKnox features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
8.7
Security Auditing
Average: 8.2
9.0
Network Segmentation
Average: 7.9
9.0
Workload Protection
Average: 8.0
Seller Details
Seller
Accuknox
Year Founded
2020
HQ Location
California, USA
Twitter
@AccuKnox
321 Twitter followers
LinkedIn® Page
www.linkedin.com
By SOOS
(40)4.6 out of 5
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOOS is the complete application security posture management platform. Scan your software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate an

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 50% Mid-Market
    • 45% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SOOS Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Vulnerability Detection
    12
    Easy Integrations
    10
    Easy Setup
    10
    Integrations
    10
    Cons
    Inadequate Reporting
    6
    Lacking Features
    5
    Poor Reporting
    5
    Dashboard Issues
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOOS features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOOS
    Company Website
    Year Founded
    2019
    HQ Location
    Winooski, US
    Twitter
    @soostech
    49 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOOS is the complete application security posture management platform. Scan your software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate an

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 50% Mid-Market
  • 45% Small-Business
SOOS Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Vulnerability Detection
12
Easy Integrations
10
Easy Setup
10
Integrations
10
Cons
Inadequate Reporting
6
Lacking Features
5
Poor Reporting
5
Dashboard Issues
3
Improvement Needed
3
SOOS features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.0
Seller Details
Seller
SOOS
Company Website
Year Founded
2019
HQ Location
Winooski, US
Twitter
@soostech
49 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Anchore, Inc., based in Santa Barbara, CA, was founded in 2016 by Saïd Ziouani and Daniel Nurmi to help organizations implement secure container-based workflows without compromising velocity. Anchore

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Anchore Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Container Security
    1
    Customization
    1
    Ease of Use
    1
    Reporting Features
    1
    Cons
    Complex Setup
    1
    Learning Curve
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Anchore features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Santa Barbara, CA
    Twitter
    @anchore
    2,797 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Anchore, Inc., based in Santa Barbara, CA, was founded in 2016 by Saïd Ziouani and Daniel Nurmi to help organizations implement secure container-based workflows without compromising velocity. Anchore

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Anchore Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Container Security
1
Customization
1
Ease of Use
1
Reporting Features
1
Cons
Complex Setup
1
Learning Curve
1
Poor Documentation
1
Anchore features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.3
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.0
Seller Details
Year Founded
2016
HQ Location
Santa Barbara, CA
Twitter
@anchore
2,797 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Security Smart Check – Container Image Security Protect your container images sooner with automated scanning for advanced security within your CI/CD pipeline

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Deep Security Smart Check Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Management Ease
    1
    Cons
    Delayed Detection
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Security Smart Check features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Security Auditing
    Average: 8.2
    6.7
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Security Smart Check – Container Image Security Protect your container images sooner with automated scanning for advanced security within your CI/CD pipeline

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Deep Security Smart Check Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Management Ease
1
Cons
Delayed Detection
1
Deep Security Smart Check features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
7.5
Security Auditing
Average: 8.2
6.7
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.0
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,677 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styra are the creators and maintainers of Open Policy Agent and leaders in cloud-native authorization. Our mission at Styra is to provide unified authorization and policy across the cloud-native stack

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Styra features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Security Auditing
    Average: 8.2
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Styra Inc
    HQ Location
    Redwood City, CA
    Twitter
    @styrainc
    3,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styra are the creators and maintainers of Open Policy Agent and leaders in cloud-native authorization. Our mission at Styra is to provide unified authorization and policy across the cloud-native stack

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Styra features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
6.7
Security Auditing
Average: 8.2
0.0
No information available
0.0
No information available
Seller Details
Seller
Styra Inc
HQ Location
Redwood City, CA
Twitter
@styrainc
3,462 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Open-source container vulnerability analysis service.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CoreOS Clair features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Hat
    Year Founded
    1993
    HQ Location
    Raleigh, NC
    Twitter
    @RedHat
    294,341 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19,863 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Open-source container vulnerability analysis service.

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Small-Business
CoreOS Clair features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Red Hat
Year Founded
1993
HQ Location
Raleigh, NC
Twitter
@RedHat
294,341 Twitter followers
LinkedIn® Page
www.linkedin.com
19,863 employees on LinkedIn®
(3)4.0 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Define what activity is considered normal for your containerized applications & be notified when an application deviates.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falco Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    2
    Security
    2
    Container Security
    1
    Customer Support
    1
    Customization
    1
    Cons
    Alert Overload
    1
    Complexity
    1
    Complex Setup
    1
    Difficult Learning
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falco features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    787 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Define what activity is considered normal for your containerized applications & be notified when an application deviates.

Users
No information available
Industries
No information available
Market Segment
  • 33% Mid-Market
  • 33% Enterprise
Falco Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
2
Security
2
Container Security
1
Customer Support
1
Customization
1
Cons
Alert Overload
1
Complexity
1
Complex Setup
1
Difficult Learning
1
False Positives
1
Falco features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 8.9
7.5
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.0
Seller Details
Seller
Sysdig
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,183 Twitter followers
LinkedIn® Page
www.linkedin.com
787 employees on LinkedIn®
(4)4.2 out of 5
View top Consulting Services for Sonatype Lifecycle
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sonatype Lifecycle features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sonatype
    Year Founded
    2008
    HQ Location
    Fulton, US
    Twitter
    @sonatype
    10,898 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    534 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when s

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Sonatype Lifecycle features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sonatype
Year Founded
2008
HQ Location
Fulton, US
Twitter
@sonatype
10,898 Twitter followers
LinkedIn® Page
www.linkedin.com
534 employees on LinkedIn®
(13)4.4 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Uptycs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Computing
    1
    Cloud Security
    1
    Cloud Technology
    1
    Compliance
    1
    Compliance Management
    1
    Cons
    Expensive
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uptycs features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    3.3
    Security Auditing
    Average: 8.2
    5.0
    Network Segmentation
    Average: 7.9
    5.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Company Website
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,498 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    215 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Uptycs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Computing
1
Cloud Security
1
Cloud Technology
1
Compliance
1
Compliance Management
1
Cons
Expensive
1
Pricing Issues
1
Uptycs features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
3.3
Security Auditing
Average: 8.2
5.0
Network Segmentation
Average: 7.9
5.0
Workload Protection
Average: 8.0
Seller Details
Seller
Uptycs
Company Website
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,498 Twitter followers
LinkedIn® Page
www.linkedin.com
215 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Araali Network Security Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    API Integration
    1
    Detection Efficiency
    1
    Integrations
    1
    Onboarding
    1
    Cons
    Complex Coding
    1
    Delayed Detection
    1
    Ineffective Alerts
    1
    Inefficient Alert System
    1
    Network Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pro features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Araali Network Security Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
API Integration
1
Detection Efficiency
1
Integrations
1
Onboarding
1
Cons
Complex Coding
1
Delayed Detection
1
Ineffective Alerts
1
Inefficient Alert System
1
Network Issues
1
Araali Network Security Pro features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Detection
    4
    User Interface
    4
    Detection Efficiency
    3
    Threat Detection
    3
    Cons
    Complexity
    3
    Missing Features
    3
    Complex Coding
    2
    Difficult Learning
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,221 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Detection
4
User Interface
4
Detection Efficiency
3
Threat Detection
3
Cons
Complexity
3
Missing Features
3
Complex Coding
2
Difficult Learning
2
Learning Curve
2
Corelight features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
8.3
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.0
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,221 Twitter followers
LinkedIn® Page
www.linkedin.com
325 employees on LinkedIn®
(3)4.0 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cycode is the only end-to-end software supply chain (SSC) security solution to provide visibility, security, and integrity across all phases of the SDLC. Cycode integrates with all of your software de

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cycode Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Onboarding
    1
    Risk Management
    1
    Cons
    Integration Issues
    1
    Limited Cloud Integration
    1
    Limited Integrations
    1
    Security Vulnerabilities
    1
    Vulnerability Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cycode features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cycode
    Year Founded
    2019
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    135 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cycode is the only end-to-end software supply chain (SSC) security solution to provide visibility, security, and integrity across all phases of the SDLC. Cycode integrates with all of your software de

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Cycode Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Integrations
1
Features
1
Onboarding
1
Risk Management
1
Cons
Integration Issues
1
Limited Cloud Integration
1
Limited Integrations
1
Security Vulnerabilities
1
Vulnerability Management
1
Cycode features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.0
Seller Details
Seller
Cycode
Year Founded
2019
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
135 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Data Theorem Cloud Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Security
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Vulnerability Management
    2
    Cons
    Expensive
    2
    Improvement Needed
    1
    Performance Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Data Theorem Cloud Secure features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    6.7
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Data Theorem Cloud Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Security
2
Vulnerability Detection
2
Vulnerability Identification
2
Vulnerability Management
2
Cons
Expensive
2
Improvement Needed
1
Performance Issues
1
Slow Performance
1
Data Theorem Cloud Secure features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
6.7
Workload Protection
Average: 8.0
Seller Details
Year Founded
2013
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted b

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 52% Small-Business
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GuardRails Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    9
    Security
    7
    Error Reduction
    6
    Quality Improvement
    6
    Threat Detection
    5
    Cons
    Time Management
    3
    Bug Issues
    2
    Learning Curve
    2
    Limited Features
    2
    Limited Private Repositories
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GuardRails features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Security Auditing
    Average: 8.2
    0.0
    No information available
    10.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Singapore, Singapore
    Twitter
    @guardrailsio
    1,587 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted b

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 52% Small-Business
  • 48% Mid-Market
GuardRails Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
9
Security
7
Error Reduction
6
Quality Improvement
6
Threat Detection
5
Cons
Time Management
3
Bug Issues
2
Learning Curve
2
Limited Features
2
Limited Private Repositories
2
GuardRails features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
10.0
Security Auditing
Average: 8.2
0.0
No information available
10.0
Workload Protection
Average: 8.0
Seller Details
Year Founded
2017
HQ Location
Singapore, Singapore
Twitter
@guardrailsio
1,587 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Portshift is a Kubernetes security leader, our innovative digital identity-based solution creates a unique, signed identity for each workload at the CI/CD pipeline stage, that is then used to enforce

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Portshift Containers Security Operator features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Portshift
Product Description
How are these determined?Information
This description is provided by the seller.

Portshift is a Kubernetes security leader, our innovative digital identity-based solution creates a unique, signed identity for each workload at the CI/CD pipeline stage, that is then used to enforce

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Portshift Containers Security Operator features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Portshift