Best Software for 2025 is now live!
|| products.size

Best Cloud Workload Protection Platforms

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud workload protection platforms help protect servers and cloud infrastructure and virtual machines (VMs) from web-based threats.

To qualify for inclusion in the Cloud Workload Protection Platforms category, a product must:

Protect cloud infrastructure and virtual machines.
Support container-based application security
Monitor and protect public, private, or hybrid-cloud environments

Best Cloud Workload Protection Platforms At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
85 Listings in Cloud Workload Protection Platforms Available
By Wiz
(697)4.7 out of 5
Optimized for quick response
3rd Easiest To Use in Cloud Workload Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    351
    Security
    315
    Visibility
    260
    Features
    249
    Cloud Management
    227
    Cons
    Improvement Needed
    121
    Missing Features
    119
    Feature Limitations
    107
    Learning Curve
    98
    Limited Features
    82
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    8.9
    Governance
    Average: 8.4
    9.0
    Ease of Admin
    Average: 9.0
    9.0
    API / Integrations
    Average: 8.5
    9.0
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    14,648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,054 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
351
Security
315
Visibility
260
Features
249
Cloud Management
227
Cons
Improvement Needed
121
Missing Features
119
Feature Limitations
107
Learning Curve
98
Limited Features
82
Wiz features and usability ratings that predict user satisfaction
8.9
Governance
Average: 8.4
9.0
Ease of Admin
Average: 9.0
9.0
API / Integrations
Average: 8.5
9.0
Security Auditing
Average: 8.5
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
14,648 Twitter followers
LinkedIn® Page
www.linkedin.com
2,054 employees on LinkedIn®
(100)4.8 out of 5
Optimized for quick response
1st Easiest To Use in Cloud Workload Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    33
    Security
    31
    Threat Detection
    26
    Detection Efficiency
    24
    Features
    24
    Cons
    Feature Limitations
    12
    Missing Features
    9
    Complexity
    8
    Resource Limitations
    7
    Feature Complexity
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.9
    Governance
    Average: 8.4
    9.3
    Ease of Admin
    Average: 9.0
    9.8
    API / Integrations
    Average: 8.5
    10.0
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,189 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    787 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

Users
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 41% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
33
Security
31
Threat Detection
26
Detection Efficiency
24
Features
24
Cons
Feature Limitations
12
Missing Features
9
Complexity
8
Resource Limitations
7
Feature Complexity
6
Sysdig Secure features and usability ratings that predict user satisfaction
9.9
Governance
Average: 8.4
9.3
Ease of Admin
Average: 9.0
9.8
API / Integrations
Average: 8.5
10.0
Security Auditing
Average: 8.5
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,189 Twitter followers
LinkedIn® Page
www.linkedin.com
787 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    184
    Comprehensive Security
    123
    Cloud Security
    110
    Ease of Use
    87
    Cloud Integration
    74
    Cons
    Complexity
    41
    Expensive
    39
    Improvement Needed
    28
    Missing Features
    27
    Delayed Detection
    26
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    8.9
    Governance
    Average: 8.4
    8.8
    Ease of Admin
    Average: 9.0
    8.5
    API / Integrations
    Average: 8.5
    8.9
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,031,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
184
Comprehensive Security
123
Cloud Security
110
Ease of Use
87
Cloud Integration
74
Cons
Complexity
41
Expensive
39
Improvement Needed
28
Missing Features
27
Delayed Detection
26
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
8.9
Governance
Average: 8.4
8.8
Ease of Admin
Average: 9.0
8.5
API / Integrations
Average: 8.5
8.9
Security Auditing
Average: 8.5
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,031,499 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
(31)4.3 out of 5
8th Easiest To Use in Cloud Workload Protection Platforms software
View top Consulting Services for VMware AppDefense
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VMware AppDefense is a data center endpoint security product that protects applications running in virtualized environments. Rather than chasing after threats, AppDefense understands an application's

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VMware AppDefense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Security
    11
    Customer Support
    7
    Features
    5
    Monitoring
    4
    Cons
    Difficult Learning
    5
    Limited Cloud Support
    5
    Complexity
    4
    Difficult Configuration
    3
    Learning Difficulty
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VMware AppDefense features and usability ratings that predict user satisfaction
    8.5
    Governance
    Average: 8.4
    9.0
    Ease of Admin
    Average: 9.0
    8.7
    API / Integrations
    Average: 8.5
    9.2
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,257 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

VMware AppDefense is a data center endpoint security product that protects applications running in virtualized environments. Rather than chasing after threats, AppDefense understands an application's

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Mid-Market
  • 29% Small-Business
VMware AppDefense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Security
11
Customer Support
7
Features
5
Monitoring
4
Cons
Difficult Learning
5
Limited Cloud Support
5
Complexity
4
Difficult Configuration
3
Learning Difficulty
2
VMware AppDefense features and usability ratings that predict user satisfaction
8.5
Governance
Average: 8.4
9.0
Ease of Admin
Average: 9.0
8.7
API / Integrations
Average: 8.5
9.2
Security Auditing
Average: 8.5
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,257 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
(122)4.5 out of 5
2nd Easiest To Use in Cloud Workload Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard Cloud Network Security, part of the CloudGuard Cloud Native Security platform (https://www.g2.com/products/cloudguard-cnapp/reviews) , provides advanced threat prevention and automated clou

    Users
    • Network Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 52% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Network Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Ease of Use
    22
    Features
    22
    Threat Detection
    20
    Network Security
    18
    Cons
    Lack of Features
    11
    Lacking Features
    9
    Missing Features
    9
    Cloud Integration
    6
    Expensive
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Network Security features and usability ratings that predict user satisfaction
    8.6
    Governance
    Average: 8.4
    8.7
    Ease of Admin
    Average: 9.0
    8.6
    API / Integrations
    Average: 8.5
    8.7
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard Cloud Network Security, part of the CloudGuard Cloud Native Security platform (https://www.g2.com/products/cloudguard-cnapp/reviews) , provides advanced threat prevention and automated clou

Users
  • Network Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 52% Enterprise
  • 28% Mid-Market
Check Point CloudGuard Network Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Ease of Use
22
Features
22
Threat Detection
20
Network Security
18
Cons
Lack of Features
11
Lacking Features
9
Missing Features
9
Cloud Integration
6
Expensive
6
Check Point CloudGuard Network Security features and usability ratings that predict user satisfaction
8.6
Governance
Average: 8.4
8.7
Ease of Admin
Average: 9.0
8.6
API / Integrations
Average: 8.5
8.7
Security Auditing
Average: 8.5
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,144 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
(209)4.6 out of 5
Optimized for quick response
7th Easiest To Use in Cloud Workload Protection Platforms software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    54
    Features
    49
    Security
    49
    Cloud Security
    36
    Vulnerability Detection
    35
    Cons
    Improvement Needed
    25
    Missing Features
    18
    Feature Limitations
    17
    Improvements Needed
    14
    Ineffective Alerts
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    8.4
    Governance
    Average: 8.4
    9.0
    Ease of Admin
    Average: 9.0
    8.8
    API / Integrations
    Average: 8.5
    8.8
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,847 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    442 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 36% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
54
Features
49
Security
49
Cloud Security
36
Vulnerability Detection
35
Cons
Improvement Needed
25
Missing Features
18
Feature Limitations
17
Improvements Needed
14
Ineffective Alerts
14
Orca Security features and usability ratings that predict user satisfaction
8.4
Governance
Average: 8.4
9.0
Ease of Admin
Average: 9.0
8.8
API / Integrations
Average: 8.5
8.8
Security Auditing
Average: 8.5
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,847 Twitter followers
LinkedIn® Page
www.linkedin.com
442 employees on LinkedIn®
(107)4.9 out of 5
4th Easiest To Use in Cloud Workload Protection Platforms software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    37
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.9
    Governance
    Average: 8.4
    9.7
    Ease of Admin
    Average: 9.0
    9.9
    API / Integrations
    Average: 8.5
    9.9
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    54,520 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,802 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
37
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.9
Governance
Average: 8.4
9.7
Ease of Admin
Average: 9.0
9.9
API / Integrations
Average: 8.5
9.9
Security Auditing
Average: 8.5
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,520 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
(155)4.5 out of 5
5th Easiest To Use in Cloud Workload Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard CNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    31
    Cloud Security
    26
    Cloud Services
    22
    Detection
    22
    Features
    22
    Cons
    Improvement Needed
    11
    Poor Support Services
    8
    Missing Features
    7
    Poor Customer Support
    7
    Improvements Needed
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
    8.5
    Governance
    Average: 8.4
    8.8
    Ease of Admin
    Average: 9.0
    8.4
    API / Integrations
    Average: 8.5
    8.8
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Check Point CloudGuard CNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
31
Cloud Security
26
Cloud Services
22
Detection
22
Features
22
Cons
Improvement Needed
11
Poor Support Services
8
Missing Features
7
Poor Customer Support
7
Improvements Needed
6
Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
8.5
Governance
Average: 8.4
8.8
Ease of Admin
Average: 9.0
8.4
API / Integrations
Average: 8.5
8.8
Security Auditing
Average: 8.5
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,144 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
(381)4.3 out of 5
Optimized for quick response
10th Easiest To Use in Cloud Workload Protection Platforms software
View top Consulting Services for Lacework
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lacework Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Security
    50
    Vulnerability Detection
    35
    Easy Setup
    28
    Integrations
    27
    Cons
    Missing Features
    22
    Improvement Needed
    21
    Insufficient Information
    19
    Feature Limitations
    18
    Improvements Needed
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lacework features and usability ratings that predict user satisfaction
    8.5
    Governance
    Average: 8.4
    8.6
    Ease of Admin
    Average: 9.0
    8.1
    API / Integrations
    Average: 8.5
    8.9
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,064 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
Lacework Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Security
50
Vulnerability Detection
35
Easy Setup
28
Integrations
27
Cons
Missing Features
22
Improvement Needed
21
Insufficient Information
19
Feature Limitations
18
Improvements Needed
17
Lacework features and usability ratings that predict user satisfaction
8.5
Governance
Average: 8.4
8.6
Ease of Admin
Average: 9.0
8.1
API / Integrations
Average: 8.5
8.9
Security Auditing
Average: 8.5
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,064 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
(69)4.6 out of 5
View top Consulting Services for CrowdStrike Falcon Cloud Security
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Unified cloud security, from endpoint to cloud. Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    32
    Cloud Security
    25
    Detection Efficiency
    22
    Vulnerability Detection
    20
    Ease of Use
    18
    Cons
    Expensive
    10
    Improvements Needed
    10
    Improvement Needed
    8
    Insufficient Information
    6
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Cloud Security features and usability ratings that predict user satisfaction
    8.9
    Governance
    Average: 8.4
    8.8
    Ease of Admin
    Average: 9.0
    9.0
    API / Integrations
    Average: 8.5
    9.2
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

Unified cloud security, from endpoint to cloud. Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 41% Mid-Market
CrowdStrike Falcon Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
32
Cloud Security
25
Detection Efficiency
22
Vulnerability Detection
20
Ease of Use
18
Cons
Expensive
10
Improvements Needed
10
Improvement Needed
8
Insufficient Information
6
Learning Curve
5
CrowdStrike Falcon Cloud Security features and usability ratings that predict user satisfaction
8.9
Governance
Average: 8.4
8.8
Ease of Admin
Average: 9.0
9.0
API / Integrations
Average: 8.5
9.2
Security Auditing
Average: 8.5
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,406 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
Ownership
NASDAQ: CRWD
By APC
(17)4.6 out of 5
9th Easiest To Use in Cloud Workload Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    APC's next-generation Connected Smart-UPS * is a time-saving, resource-saving innovation, making it easier to deploy, maintain, and monitor your power infrastructure - so you can focus on your busines

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Smart UPS Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Features
    2
    Installation Ease
    2
    Customer Support
    1
    Integrations
    1
    Cons
    Expensive
    6
    Bug Issues
    1
    Licensing Costs
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smart UPS features and usability ratings that predict user satisfaction
    6.5
    Governance
    Average: 8.4
    9.0
    Ease of Admin
    Average: 9.0
    6.4
    API / Integrations
    Average: 8.5
    7.2
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    APC
    Year Founded
    1981
    HQ Location
    Rueil-Malmaison, Île-de-France
    Twitter
    @APCbySchneider
    14,288 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,226 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

APC's next-generation Connected Smart-UPS * is a time-saving, resource-saving innovation, making it easier to deploy, maintain, and monitor your power infrastructure - so you can focus on your busines

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
Smart UPS Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Features
2
Installation Ease
2
Customer Support
1
Integrations
1
Cons
Expensive
6
Bug Issues
1
Licensing Costs
1
Limited Features
1
Smart UPS features and usability ratings that predict user satisfaction
6.5
Governance
Average: 8.4
9.0
Ease of Admin
Average: 9.0
6.4
API / Integrations
Average: 8.5
7.2
Security Auditing
Average: 8.5
Seller Details
Seller
APC
Year Founded
1981
HQ Location
Rueil-Malmaison, Île-de-France
Twitter
@APCbySchneider
14,288 Twitter followers
LinkedIn® Page
www.linkedin.com
4,226 employees on LinkedIn®
(75)4.0 out of 5
View top Consulting Services for Google Cloud Platform Security Overview
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Platform Security Overview allows users to deploy on an infrastructure protected by top experts in information, application, and network security.

    Users
    • Android Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 49% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Platform Security Overview features and usability ratings that predict user satisfaction
    7.3
    Governance
    Average: 8.4
    9.2
    Ease of Admin
    Average: 9.0
    7.8
    API / Integrations
    Average: 8.5
    7.8
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,520,271 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Platform Security Overview allows users to deploy on an infrastructure protected by top experts in information, application, and network security.

Users
  • Android Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 49% Small-Business
Google Cloud Platform Security Overview features and usability ratings that predict user satisfaction
7.3
Governance
Average: 8.4
9.2
Ease of Admin
Average: 9.0
7.8
API / Integrations
Average: 8.5
7.8
Security Auditing
Average: 8.5
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,520,271 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(175)4.5 out of 5
15th Easiest To Use in Cloud Workload Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Cloud Integration
    10
    Ease of Use
    9
    Cloud Services
    8
    Threat Detection
    8
    Cons
    Complexity
    5
    Complex Setup
    5
    Difficult Setup
    4
    Expensive
    4
    Improvement Needed
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    8.6
    Governance
    Average: 8.4
    8.6
    Ease of Admin
    Average: 9.0
    8.3
    API / Integrations
    Average: 8.5
    8.7
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 35% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Cloud Integration
10
Ease of Use
9
Cloud Services
8
Threat Detection
8
Cons
Complexity
5
Complex Setup
5
Difficult Setup
4
Expensive
4
Improvement Needed
4
Hybrid Cloud Security features and usability ratings that predict user satisfaction
8.6
Governance
Average: 8.4
8.6
Ease of Admin
Average: 9.0
8.3
API / Integrations
Average: 8.5
8.7
Security Auditing
Average: 8.5
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,698 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Control Tower automates the set-up of a baseline environment, or landing zone, that is a secure, well-architected multi-account AWS environment. The configuration of the landing zone is based on b

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Control Tower Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    3
    Customer Support
    3
    Ease of Use
    3
    Control Management
    2
    Security
    2
    Cons
    Difficult Learning
    2
    Feature Complexity
    2
    Limited Cloud Support
    2
    Cloud Integration
    1
    Difficult Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Control Tower features and usability ratings that predict user satisfaction
    9.7
    Governance
    Average: 8.4
    7.5
    Ease of Admin
    Average: 9.0
    9.7
    API / Integrations
    Average: 8.5
    9.3
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,230,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Control Tower automates the set-up of a baseline environment, or landing zone, that is a secure, well-architected multi-account AWS environment. The configuration of the landing zone is based on b

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 40% Mid-Market
AWS Control Tower Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
3
Customer Support
3
Ease of Use
3
Control Management
2
Security
2
Cons
Difficult Learning
2
Feature Complexity
2
Limited Cloud Support
2
Cloud Integration
1
Difficult Configuration
1
AWS Control Tower features and usability ratings that predict user satisfaction
9.7
Governance
Average: 8.4
7.5
Ease of Admin
Average: 9.0
9.7
API / Integrations
Average: 8.5
9.3
Security Auditing
Average: 8.5
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,230,610 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armor is a global cloud security company. We make cybersecurity and compliance simple, achievable, and manageable for managed service providers (MSPs) and their customers across endpoint, network, ser

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armor Anywhere features and usability ratings that predict user satisfaction
    10.0
    Governance
    Average: 8.4
    9.8
    Ease of Admin
    Average: 9.0
    10.0
    API / Integrations
    Average: 8.5
    10.0
    Security Auditing
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Armor
    Year Founded
    2009
    HQ Location
    Plano, Texas
    Twitter
    @Armor
    10,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    203 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armor is a global cloud security company. We make cybersecurity and compliance simple, achievable, and manageable for managed service providers (MSPs) and their customers across endpoint, network, ser

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
Armor Anywhere features and usability ratings that predict user satisfaction
10.0
Governance
Average: 8.4
9.8
Ease of Admin
Average: 9.0
10.0
API / Integrations
Average: 8.5
10.0
Security Auditing
Average: 8.5
Seller Details
Seller
Armor
Year Founded
2009
HQ Location
Plano, Texas
Twitter
@Armor
10,032 Twitter followers
LinkedIn® Page
www.linkedin.com
203 employees on LinkedIn®

Learn More About Cloud Workload Protection Platforms

What are Cloud Workload Protection Platforms?

Cloud workload protection is not a very intuitive term and likely sounds alien to people who do not operate cloud infrastructure. However, individuals that work frequently with cloud infrastructure are probably somewhat familiar with cloud workload protection. For context, cloud workload protection is typically described as a family of workload-centric security solutions designed to secure on-premises, physical, and virtual servers along with a range of infrastructure as a service (IaaS) providers and applications. Cloud workload protection platforms are an evolution of endpoint protection solutions designed specifically for server workloads.

Cloud workload protection solutions provide users with automated discovery and broad visibility of workloads deployed across cloud service providers. In addition to providing visibility, these tools protect individual workloads with malware protection, vulnerability scanning, access control, and anomaly detection features. Malware and vulnerability scanning are often paired with automated remediation or patching features to simplify and scale workload management. The platforms also provide access control through privilege management and micro-segmentation. However, their most interesting feature might be behavior monitoring powered by machine learning that discovers errors or unexpected changes. This makes it harder for threat actors and nefarious insiders to alter workloads, policies, or privileges. Once detected, access can be automatically restricted and reverted to its previous state.

Key Benefits of Cloud Workload Protection Platforms

  • Complete visibility of workloads in the cloud
  • Automated threat detection and response
  • Custom protection for unique servers and workloads
  • Workload, application, and infrastructure hardening

Why Use Cloud Workload Protection Platforms?

Cloud workload protection platforms provide numerous benefits, the most important being automated scaling, workload hardening, cross-cloud security management, anomaly detection, and response functionality.

Automation and efficiency — Cloud workload protection platforms automate a number of security operations related to the cloud. The first is discovery; after workloads are discovered, these platforms scale to protect large numbers of workloads and identify their unique security requirements. These platforms automatically detect new workloads and scan them for vulnerabilities. They can also automate the detection and response of security incidents.

Automation can save significant time for security teams, especially those that are tasked with protecting DevOps pipelines. These environments are constantly changing and need adaptable security solutions to protect them no matter their state. Some automation features may only be available through APIs and other integrations, but nonetheless simplify numerous tasks for IT professionals, engineers, and security teams.

Multicloud management — No two multicloud environments are alike. Multicloud architectures are complex, intricate environments that span across on-premises servers and cloud providers to deliver powerful, scalable, and secure infrastructure. Still, their inherent complexity can present challenges to security teams. Each workload has its own requirements and cloud workload protection platforms provide a single pane of glass and automated discovery to ensure no workload goes unprotected or unnoticed.

Different workloads may run on different operating systems or possess different compliance requirements. Regardless of the countless variations in security needs, these platforms can adapt to changes and enable highly customizable policy enforcement to protect a wide range of workloads.

Monitoring and detection — Workload discovery is not the only monitoring feature provided by cloud workload protection platforms. Their most important monitoring capability is behavioral monitoring used to detect changes, misuse, and other anomalies automatically. These platforms can harden workloads by detecting exploits, scanning for vulnerabilities, and providing next-generation firewalls. Still, prevention is only the first phase of cybersecurity. Once protection is in place, baselines must be measured and privileges must be distributed.

Any activity deviating from the established baselines should be detected and administrators should be alerted. Depending on the nature of the threat, various response workflows can be established to remedy the issue. Servers might require endpoint detection and response while applications require processes to be blocked. Regardless of the issue, threats should be modeled and workflows should be designed accordingly.

What are the Common Features of Cloud Workload Protection Platforms?

Cloud workload protection platforms can provide a wide range of features, but here are a few of the most common found in the market.

Cloud gap analytics — This feature analyzes data associated with denied entries and policy enforcement, giving information for better authentication and security protocols.

Cloud registry — Cloud registries detail the range of cloud service providers a product can integrate with and provide security for.

Asset discovery — Asset discovery features unveil applications in use and trends associated with traffic, access, and usage.

Governance — User provisioning and governance features allow users to create, edit, and relinquish user access privileges.

Logging and reporting — Log documentation and reporting provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

Data securityData protection and security features help users manage policies for user data access and data encryption.

Data loss prevention (DLP)DLP stores data securely either on-premise or in an adjacent cloud database to prevent loss of data.

Security auditing — Auditing helps users analyze data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

Anomaly detection — Anomaly detection is conducted by constantly monitoring activity related to user behavior and compares activity to benchmarked patterns.

Workload diversity — Diverse workload support would imply a cloud security solution that supports a range of instance types from any number of cloud service providers.

Analytics and machine learningAnalytics and machine learning improve security and protection across workloads by automating network segmentation, malware protection, and incident response.