Best Container Security Tools - Page 5

Lauren Worth
LW
Researched and written by Lauren Worth

Container security tools are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discovering zero-day vulnerabilities, and simulating attacks from common threat sources.

Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

To qualify for inclusion in the Container Security category, a product must:

Integrate security with DevOps tools
Monitor and secure container networks or pipelines
Enforce access and security policies
Provide runtime protection capabilities

Best Container Security Tools At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
66 Listings in Container Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Cloud Workload Protection features and usability ratings that predict user satisfaction
    1.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines

Users
No information available
Industries
No information available
Market Segment
  • 58% Mid-Market
  • 25% Small-Business
Symantec Cloud Workload Protection features and usability ratings that predict user satisfaction
1.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,378 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sypderbat features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sypderbat
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sypderbat features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sypderbat

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatStryker builds on the ThreatMapper open source platform. ThreatStryker extends the vulnerability discovery capabilities, adding runtime attack detection, prediction and protection. Map your ap

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatStryker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    1
    Cybersecurity Protection
    1
    Detection
    1
    Security
    1
    Security Insights
    1
    Cons
    Automation Issues
    1
    Lack of Remediation
    1
    Limited Automation
    1
    Missing Features
    1
    Poor Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatStryker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Palo Alto, US
    Twitter
    @deepfence
    589 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatStryker builds on the ThreatMapper open source platform. ThreatStryker extends the vulnerability discovery capabilities, adding runtime attack detection, prediction and protection. Map your ap

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ThreatStryker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
1
Cybersecurity Protection
1
Detection
1
Security
1
Security Insights
1
Cons
Automation Issues
1
Lack of Remediation
1
Limited Automation
1
Missing Features
1
Poor Remediation
1
ThreatStryker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Palo Alto, US
Twitter
@deepfence
589 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trickest Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trickest
    HQ Location
    Dover, Delaware
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Trickest Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Trickest
HQ Location
Dover, Delaware
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veracode Container Security secures containers and infrastructure as code with a CLI tool that integrates into an existing CI/CD pipeline.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veracode Container Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VERACODE
    Year Founded
    2006
    HQ Location
    Burlington, MA
    Twitter
    @Veracode
    22,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    638 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Veracode Container Security secures containers and infrastructure as code with a CLI tool that integrates into an existing CI/CD pipeline.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Veracode Container Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
VERACODE
Year Founded
2006
HQ Location
Burlington, MA
Twitter
@Veracode
22,550 Twitter followers
LinkedIn® Page
www.linkedin.com
638 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wangsu Container Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Shangai. China
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Wangsu Container Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Shangai. China