# Sysdig Secure Reviews
**Vendor:** Sysdig  
**Category:** [Container Security Tools](https://www.g2.com/categories/container-security-tools)  
**Average Rating:** 4.8/5.0  
**Total Reviews:** 112
## About Sysdig Secure
Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig uniquely delivers runtime-powered visibility and agentic AI to stop cloud attacks instantly, not after the damage is done. With Sysdig, you can: - Stop threats in 2 seconds and respond in minutes - Cut vulnerability noise by 95% with runtime prioritization - Detect real risk instantly across workloads, identities, and misconfigurations - Close permissions gaps in under 2 minutes Sysdig Secure consolidates CSPM, CWPP, CIEM, vulnerability management, and threat detection into a single open, real-time platform. Unlike other CNAPPs, Sysdig connects signals across runtime, identity, and posture to eliminate blind spots, reduce tool sprawl, and accelerate innovation without compromise. No guesswork. No black boxes. Just cloud security, the right way. Learn more at https://sysdig.com



## Sysdig Secure Pros & Cons
**What users like:**

- Users value the **real-time threat detection** of Sysdig Secure, enhancing security in cloud-native environments effectively. (33 reviews)
- Users appreciate the **real-time vulnerability detection** in Sysdig Secure, effectively identifying and prioritizing security risks. (32 reviews)
- Users value the **real-time threat detection** in Sysdig Secure, enhancing security for cloud-native applications and environments. (31 reviews)
- Users value the **high detection efficiency** of Sysdig Secure, ensuring robust security in cloud-native environments. (30 reviews)
- Users highlight the **impressive UI and comprehensive security features** of Sysdig Secure, enhancing compliance and risk management. (23 reviews)
- Users value the **comprehensive visibility** of Sysdig Secure, enhancing their understanding of cloud and container security. (23 reviews)
- Detection (21 reviews)
- Integrations (19 reviews)
- Security Insights (18 reviews)
- Cloud Security (17 reviews)

**What users dislike:**

- Users note **feature limitations** with Sysdig Secure, citing outdated documentation and challenges in integration and monitoring. (10 reviews)
- Users find the **complexity during initial setup** of Sysdig Secure can hinder efficient implementation and usability. (9 reviews)
- Users express concern over **missing features** like runtime detection and inadequate documentation, affecting integration and observability. (8 reviews)
- Users find the **difficult learning** curve challenging, especially for those new to DevSecOps and complex configurations. (7 reviews)
- Users find the **initial setup complexity** of Sysdig Secure to be a significant barrier to effective use. (7 reviews)
- Users find the **steep learning curve** of Sysdig Secure to be challenging, especially for newcomers to its complex interface. (7 reviews)
- Complex Setup (5 reviews)
- Users highlight the need for **improvements in custom rule writing** and more granular grouping/filtering options in Sysdig Secure. (5 reviews)
- Limited Features (5 reviews)
- Poor Documentation (5 reviews)

## Sysdig Secure Reviews
  ### 1. Excellent Product and Service

**Rating:** 5.0/5.0 stars

**Reviewed by:** Rajesh K. | Senior Engineer, Enterprise (> 1000 emp.)

**Reviewed Date:** July 08, 2022

**What do you like best about Sysdig Secure?**

Its out of box FALCO rules and evaluation against various governance frameworks make Sysdig Secure one of the most outstanding products in the market.

**What do you dislike about Sysdig Secure?**

Nothing much other than bring on prem version closed to the SaaS offering in less timeframe.

**What problems is Sysdig Secure solving and how is that benefiting you?**

Provides in depth information around vulnerabilities as well as container runtime monitoring to detect anomolies in realtime.

  ### 2. All the functionality of the product are amazing, like the support!

**Rating:** 5.0/5.0 stars

**Reviewed by:** Emanuele F. | Business Unit Cybersecurity, Mid-Market (51-1000 emp.)

**Reviewed Date:** July 28, 2022

**What do you like best about Sysdig Secure?**

In the jungle of cyber security, Sysdig help us to makes security management more simple and affidable.

**What do you dislike about Sysdig Secure?**

Operationally speaking, for now, nothing: maybe just the GUI for eventually case management.

**What problems is Sysdig Secure solving and how is that benefiting you?**

Sysdig help us to manage and improve the security in AWS accounts and in Kubernetes infrastructure.

  ### 3. Our cloud will be more secure

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Computer Software | Mid-Market (51-1000 emp.)

**Reviewed Date:** July 29, 2022

**What do you like best about Sysdig Secure?**

Vulnerabilities scanning, policies tuning, events monitoring

**What do you dislike about Sysdig Secure?**

I have recently started using the tool and have not yet found anything that I do not like

**What problems is Sysdig Secure solving and how is that benefiting you?**

It helps us to monitor cloud security and improve the security level of our products

  ### 4. Solid product and professional service

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Banking | Enterprise (> 1000 emp.)

**Reviewed Date:** July 07, 2022

**What do you like best about Sysdig Secure?**

Sysdig secure provides well-rounded vulnerablity management and in-depth insights for security personal, software developer, adminstrator and managers to grash secure posture at all times.

**What do you dislike about Sysdig Secure?**

Not really found any.  It does provides what we're look for and fully covers entire SDLC , range from  software development pipeline on developers side,  to operating envionments.

**What problems is Sysdig Secure solving and how is that benefiting you?**

It scans and reports vulnerabilities in application software, OS, containers and linux hosts.  With insights provided, I obtain a clear view of  securtiy posture as needed.

  ### 5. great tool to secure you AKS workloads

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Retail | Enterprise (> 1000 emp.)

**Reviewed Date:** November 25, 2021

**What do you like best about Sysdig Secure?**

Proactively scan your images and its flexible policy enforcement. Also, The deep visibility and assurance that using syscall monitoring gives us in our runtime environment for security issues.  Ability to forward security events to Microsoft Sentinel  with  seamless integration. Out Of Box runtime security rules and policies  covering common security events. 
Deep understanding of command execution within your containers providing  forensic like events
Azure DevOps extension to inject a task into the pipeline for image scanning during you CI/CD

**What do you dislike about Sysdig Secure?**

It generates a lot of events OOB so you have to invest some time fine-tuning your policies to remove unnecessary events. Service Account  token generation is not currently available. We hope to see seamless integration with the Azure platform in regards to Regulatory Compliance as it is already available for AWS

**Recommendations to others considering Sysdig Secure:**

Sysdig it's a SaaS Product that provides easy setup and you can start with a free trial to check its benefits.

**What problems is Sysdig Secure solving and how is that benefiting you?**

We used to have issues with another image scanning engine as it had inflexible policies, this caused issues with our development teams. The Sysdig image scanning policies are much more flexible, allowing us to strike a better balance between security and usability.

Before Sysdig we had no visibility into what was being executed in our AKS environment; we now have deep visibility into all actions taken regardless of whether they are in containers or hosts.

  ### 6. I'd not to much experience with it, but I think there're not to much more features to Sysdig Monitor

**Rating:** 4.0/5.0 stars

**Reviewed by:** Verified User in Financial Services | Small-Business (50 or fewer emp.)

**Reviewed Date:** August 17, 2022

**What do you like best about Sysdig Secure?**

Image scanning is very interesting for us

**What do you dislike about Sysdig Secure?**

There is nothing wich is least helpful, all the points and features of Sysdig Secure are important related to the use cases

**What problems is Sysdig Secure solving and how is that benefiting you?**

Currently we don't use Sysdig Secure, but it can solve our image scanning process

  ### 7. I am using Sysdig secure for vulnerability management and container security.

**Rating:** 4.5/5.0 stars

**Reviewed by:** Verified User in Computer & Network Security | Enterprise (> 1000 emp.)

**Reviewed Date:** July 27, 2022

**What do you like best about Sysdig Secure?**

It has a good feature to find build time and runtime vulnerability. It is very easy to integrate with ongoing CI/CD pipeline.

**What do you dislike about Sysdig Secure?**

Now they have removed the host scanning feature from their new scanning engine.

**What problems is Sysdig Secure solving and how is that benefiting you?**

Sysdig Secure is giving a good dashboard to visualize all your infra from a central place. This increases productivity.

  ### 8. Good experience, lots of features, but feels half built with how many new features they modify

**Rating:** 4.0/5.0 stars

**Reviewed by:** Verified User in Chemicals | Enterprise (> 1000 emp.)

**Reviewed Date:** August 03, 2022

**What do you like best about Sysdig Secure?**

Seeing all commands and history in a container, and being able to scan containers.

**What do you dislike about Sysdig Secure?**

There is quite a bit of setup required with how many different deployments, along with the number of resources required.

**What problems is Sysdig Secure solving and how is that benefiting you?**

Giving us a look into what could be improved in our environment.

  ### 9. Good software, better team behind the software

**Rating:** 4.0/5.0 stars

**Reviewed by:** Verified User in Financial Services | Mid-Market (51-1000 emp.)

**Reviewed Date:** August 11, 2022

**What do you like best about Sysdig Secure?**

Communication in general
Team behind the software

**What do you dislike about Sysdig Secure?**

Software update process
In rare moments a little bit longer response time

**What problems is Sysdig Secure solving and how is that benefiting you?**

Monitoring of a cluster and image scanning

  ### 10. Sysdig Secure on OpenShift

**Rating:** 3.5/5.0 stars

**Reviewed by:** Verified User in E-Learning | Mid-Market (51-1000 emp.)

**Reviewed Date:** July 11, 2022

**What do you like best about Sysdig Secure?**

The capture feature is really interesting

**What do you dislike about Sysdig Secure?**

The price is calculated by the number of agents. The cost is rising quickly while using virtual workers.

**What problems is Sysdig Secure solving and how is that benefiting you?**

Find vulnerable applications

  ### 11. And intuitive operations tool that supports multiple teams

**Rating:** 4.0/5.0 stars

**Reviewed by:** Shea S. | Small-Business (50 or fewer emp.)

**Reviewed Date:** November 17, 2020

**What do you like best about Sysdig Secure?**

The ease of deployment, multi-team management, and combination of ops and security visibility is powerful. The dynamic dashboard creation and existing templates help end-users get up and running quickly.The prometheus integration is also really useful but still in the early days for some of our intended uses.

**What do you dislike about Sysdig Secure?**

A swagger API should be more accessible and the separation of "host" and "container" resources needs to be blended in a simpler way.
Other vendors are combing log and metric management, which while difficult, can be useful for application teams.
Additional integrations with infrastructure components would be helpful, and more thorough documentation on how configure prometheus monitoring would be an asset to users.

**Recommendations to others considering Sysdig Secure:**

Spend time with your account team to describe the key items that you want to monitor and have them walk you through the best approach, including sharing of dashboards, etc with other teams. They often have great recommendations that can save some time.

**What problems is Sysdig Secure solving and how is that benefiting you?**

Multi-cluster operational alerting with the ability to provide teams access to see their own scoped applications. All within the same solution.
We also provide runtime protection and vulnerability scanning within the solution.

  ### 12. Great features, awesome company

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Computer & Network Security | Mid-Market (51-1000 emp.)

**Reviewed Date:** November 25, 2020

**What do you like best about Sysdig Secure?**

The combination of container insight, container security policies, and container scanning with more and more robust reporting to compliance standards.

**What do you dislike about Sysdig Secure?**

The complexity of the underlying application is very large, requiring a lot of components. There's a SaaS option which alleviates that, but it doesn't fall under many compliance scopes yet.

**What problems is Sysdig Secure solving and how is that benefiting you?**

Our problems are a few-fold, but primarily revolve around container security policy and scanning, especially compliance-based scans. The compliance-based scan results are an active work item with the very-responsive company and have come a long way in a short amount of time. Otherwise we love the visibility we get into our container infrastructure.


## Sysdig Secure Discussions
  - [Types of data collected](https://www.g2.com/discussions/types-of-data-collected) - 1 comment, 1 upvote
  - [Multi-cluster, multi-cloud](https://www.g2.com/discussions/multi-cluster-multi-cloud) - 1 comment, 1 upvote
  - [Uniqueness](https://www.g2.com/discussions/uniqueness-4ddd1852-d47b-47e7-bd8a-6d6294441b84) - 1 comment, 1 upvote
  - [Buying Platform vs. Products](https://www.g2.com/discussions/buying-platform-vs-products) - 1 comment, 1 upvote
  - [Technical Advantages](https://www.g2.com/discussions/technical-advantages) - 1 comment, 1 upvote

- [View Sysdig Secure pricing details and edition comparison](https://www.g2.com/products/sysdig-sysdig-secure/reviews?page=3&qs=pros-and-cons&section=pricing&secure%5Bexpires_at%5D=2026-05-18+22%3A58%3A37+-0500&secure%5Bsession_id%5D=c9437239-8685-4e7e-ab2f-7dd951a034bd&secure%5Btoken%5D=f8e5186bc9584502dd0a654270df2d21ad85ac484bb18c74cf45f74ce8c25f18&format=llm_user)
## Sysdig Secure Integrations
  - [Atlassian](https://www.g2.com/products/atlassian-2025-01-31/reviews)
  - [AWS and Cloud Services](https://www.g2.com/products/aws-and-cloud-services/reviews)
  - [Blink](https://www.g2.com/products/blink/reviews)
  - [Chainguard](https://www.g2.com/products/chainguard/reviews)
  - [Checkmarx](https://www.g2.com/products/checkmarx/reviews)
  - [CircleCI](https://www.g2.com/products/circleci/reviews)
  - [CloudBees](https://www.g2.com/products/cloudbees/reviews)
  - [Cloudsmith](https://www.g2.com/products/cloudsmith/reviews)
  - [Cortex](https://www.g2.com/products/cortex-automation-inc-cortex/reviews)
  - [Cribl](https://www.g2.com/products/cribl-suite/reviews)
  - [Cybereason Defense Platform](https://www.g2.com/products/cybereason-defense-platform/reviews)
  - [Cycode](https://www.g2.com/products/cycode/reviews)
  - [Elasticsearch](https://www.g2.com/products/elastic-elasticsearch/reviews)
  - [GitLab](https://www.g2.com/products/gitlab/reviews)
  - [Google Cloud](https://www.g2.com/products/google-cloud/reviews)
  - [Google Security Operations](https://www.g2.com/products/google-security-operations/reviews)
  - [HashiCorp Consul](https://www.g2.com/products/hashicorp-consul/reviews)
  - [HashiCorp Nomad](https://www.g2.com/products/hashicorp-hashicorp-nomad/reviews)
  - [IBM QRadar Suite](https://www.g2.com/products/ibm-qradar-suite/reviews)
  - [IBM Terraform (formerly HashiCorp Terraform)](https://www.g2.com/products/ibm-terraform-formerly-hashicorp-terraform/reviews)
  - [JFrog](https://www.g2.com/products/jfrog-2024-03-28/reviews)
  - [Mend.io](https://www.g2.com/products/mend-io/reviews)
  - [Microsoft Azure](https://www.g2.com/products/microsoft-microsoft-azure/reviews)
  - [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  - [Microsoft Sentinel](https://www.g2.com/products/microsoft-sentinel/reviews)
  - [Mirantis Kubernetes Engine (formerly Docker Enterprise)](https://www.g2.com/products/mirantis-kubernetes-engine-formerly-docker-enterprise/reviews)
  - [n8n](https://www.g2.com/products/n8n/reviews)
  - [Netskope](https://www.g2.com/products/netskope-activity-feeds-for-microsoft-onedrive-netskope/reviews)
  - [Okta](https://www.g2.com/products/okta/reviews)
  - [Oracle Cloud Infrastructure](https://www.g2.com/products/oracle-oracle-cloud-infrastructure/reviews)
  - [OX Security](https://www.g2.com/products/ox-security/reviews)
  - [PagerDuty](https://www.g2.com/products/pagerduty/reviews)
  - [Panther](https://www.g2.com/products/panther/reviews)
  - [Portworx Enterprise](https://www.g2.com/products/portworx-enterprise/reviews)
  - [Rafay Platform](https://www.g2.com/products/rafay-platform/reviews)
  - [Red Hat OpenShift](https://www.g2.com/products/red-hat-red-hat-openshift/reviews)
  - [Semgrep](https://www.g2.com/products/semgrep/reviews)
  - [Slack](https://www.g2.com/products/slack/reviews)
  - [Splunk](https://www.g2.com/products/splunk-2025-01-30/reviews)
  - [Sumo Logic](https://www.g2.com/products/sumo-logic/reviews)
  - [Tines](https://www.g2.com/products/tines/reviews)
  - [Torq AI SOC Platform](https://www.g2.com/products/torq-ai-soc-platform/reviews)
  - [VMware Tanzu CloudHealth](https://www.g2.com/products/vmware-tanzu-cloudhealth/reviews)

## Sysdig Secure Features
**Management**
- Dashboards and Reports
- Workflow Management
- Administration Console

**Administration**
- Risk Scoring
- Secrets Management
- Security Auditing
- Configuration Management

**Security**
- Compliance Monitoring
- Anomoly Detection
- Cloud Gap Analytics

**Performance**
- Issue Tracking
- Detection Rate
- False Positives
- Automated Scans

**Configuration**
- Configuration Monitoring
- Unified Policy Management
- Adaptive Access Control

**Access control - Cloud Infrastructure Entitlement Management (CIEM)**
- Policy Management
- Fine-Grained Access Control
- Role-Based Access Control (RBAC)

**Security - Cloud-Native Application Protection Platform (CNAPP)**
- Workload and container security
- Threat detection and response
- DevSecOps Integrations
- Unified Visibility

**Cloud Visibility**
- Data Discovery
- Cloud Registry
- Cloud Gap Analytics

**Operations**
- Governance
- Logging and Reporting
- API / Integrations

**Monitoring**
- Continuous Image Assurance
- Behavior Monitoring
- Observability

**Compliance**
- Governance
- Data Governance
- Sensitive Data Compliance

**Network**
- Compliance Testing
- Perimeter Scanning
- Configuration Monitoring

**Security**
- Compliance Monitoring
- Risk Analysis
- Reporting

**Visibility**
- Multicloud Visibility
- Asset Discovery

**Monitoring - Cloud Infrastructure Entitlement Management (CIEM)**
- Monitoring

**Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)**
- Intelligent remediations and suggestions
- Risk prioritization
- Anomaly detection using machine learning

**Security**
- Data Security
- Security Auditing

**Security Controls **
- Anomaly Detection
- Security Auditing
- Cloud Gap Analytics

**Protection**
- Dynamic Image Scanning
- Runtime Protection
- Workload Protection
- Network Segmentation

**Administration**
- Policy Enforcement
- Auditing
- Workflow Management

**Application**
- Manual Application Testing
- Static Code Analysis
- Black Box Testing

**Administration**
- Security Automation
- Security Integration
- Multicloud Visibility

**Vulnerability Management**
- Threat Hunting
- Vulnerability Scanning
- Vulnerability Intelligence
- Risk-Prioritization

**Auditing - Cloud Infrastructure Entitlement Management (CIEM)**
- Visibility
- Compliance Reporting

**Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)**
- Multi-cloud visibility
- Cloud Security Posture Management (CSPM)

**Identity**
- SSO
- Governance
- User Analytics

**Agentic AI - Vulnerability Scanner**
- Autonomous Task Execution
- Proactive Assistance

**Agentic AI - Cloud Security Monitoring and Analytics**
- Autonomous Task Execution
- Proactive Assistance
- Decision Making

**Agentic AI - Cloud-Native Application Protection Platform (CNAPP)**
- Autonomous Task Execution
- Adaptive Learning

**Agentic AI - Cloud Detection and Response (CDR)**
- Proactive Assistance

**Services - Cloud Detection and Response (CDR) **
- Managed Services

## Top Sysdig Secure Alternatives
  - [Wiz](https://www.g2.com/products/wiz-wiz/reviews) - 4.7/5.0 (773 reviews)
  - [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) - 4.4/5.0 (383 reviews)
  - [Orca Security](https://www.g2.com/products/orca-security/reviews) - 4.6/5.0 (253 reviews)

