100 Sysdig Secure Reviews
Overall Review Sentiment for Sysdig Secure
Log in to view review sentiment.

We have been using sysdig secure for more than 2 months now and we have got significant visibility into our infrastructure on where it stands on different benchmarks. I liked the runtime threat detection and the vulnerability management feature of sysdig. The UI is fantastic and gives a clear picture of our infrastructure. It also provides support for creating custom policies to benchmark our infrastructure. Review collected by and hosted on G2.com.
Filters can be more helpful on all dashboards. Review collected by and hosted on G2.com.

Top 3 features that I like most, they would be:
1- Supporting multicloud, containers and Kubernetes, and it easily integrates with other systems.
2- The ability to detect and respond to threats is quite advanced even for behavioral threats detection , file tampering, kernel level exploit and system compromise.
3 - If a user is compromised – flag that user; alert that user was compromised as well as redirect that user to remediate whatever change was made. Review collected by and hosted on G2.com.
Missing runtime detection in CSPM use cases, particularly for lateral movement within organizational accounts, especially in AWS. Review collected by and hosted on G2.com.
1- Advanced Runtime Threat Detection & Prevention
2- Runtime Vulnerability Management that provide the actionable insights on vulnerable packages loaded in memory and the application stack, identifying exploitable and fixable vulnerabilities present for over XX days.
3- Proactive Threat Detection, Response, & Mitigation
4- Seamless Usability, Integration
5- Comprehensive Support from diffrent team like solution engineering, customer success, and professional services teams for smooth onboarding and implementation. Review collected by and hosted on G2.com.
It’s not about dislike something in Sysdig secure. More about considering additional sources for log ingestion while reducing overhead. For example, VPC flow log ingestion can provide valuable inputs like port and IP address details. Review collected by and hosted on G2.com.
1- The actionable runtime insights for remedation.
2- Detailed information on misconfigurations and resolution with CSPM and KSPM
3- Agentless and agent based host scanning which provided insights with "In use" package which is having the vulnerability.
4- Support team is very engaging and doing an exceptional job both in setting things up and answering further queries with the product. Review collected by and hosted on G2.com.
We have no dislike till now with sysdig secure solution that effectively meets all our needs. Review collected by and hosted on G2.com.
Detailed deep visibility into workloads and multi cloud for runtime security posture management and repid response capability. Review collected by and hosted on G2.com.
It's not about dislike of the current product, but rather a gaps to provide the present the historic trend and comparisons with industry peers in the same vertical would greatly enhance the product's value. Review collected by and hosted on G2.com.

When we were comparing Sysdig Secure with another competitor in the space, we opted to run some Atomic Red Team tests against our demo hosts for both services. Sysdig deteted and alerted us to the testing within a few moments, and the competitor took hours. That was when we knew Sysdig would be the better option for us.
On top of being able to rapidly detect, alert, triage, and investigate cloud and host threats, we have a slew of additional features that improve our security posture overall.
I utilize Sysdig every work day to complete reviews and investigations, and it is a key piece of our cyber security strategy. Their customer support is also incredible. Review collected by and hosted on G2.com.
Sometimes there are little idiosyncrasies in a few of the UI elements and features. We've also found agent updates to be a bit difficult to automate due to instability. This was during our (complex) impelmentation as well as ongoing maintenance. Review collected by and hosted on G2.com.
1- The strong detection & prevention for cloud-native threat landscape, using both agent-based and agentless methods.
2- The automatically discovers assets across multiple organization accounts and regions,
3- Runtime threat detection and prevention, and manages vulnerabilities for both container and non-container workloads.
4- Rapid response capabilities for containers.
5- Ability to export the SBOM in CycloneDx
6- Easy-to-use interface
Most Importantly, they have recenetly introduced the compliance posture check
for indian regulations after we requested like RBI, SEBI and DPDP Act. Review collected by and hosted on G2.com.
I would suggest adding more thoughtful detection rules for better management of organizational accounts in the future. Review collected by and hosted on G2.com.
Sysdig secure is a powerful and onestop solutions for Cloud Security, Container Security, Real Time Threat Detection & Protection, no limit on CICD int, no limit for Registry int, CSPM and Risk based vulnerability management solutions.
Customization in policy and complete automated shift left approach for Devsecops and forensics capabilities are just awesome to have.
The new user-level compromised tags and investigation features are especially impressive. They provide clear, actionable insights that help us prioritize and address risks with ease. Tackling complex cloud security challenges now feels much more manageable, and we’re able to stay proactive and secure with confidence. Review collected by and hosted on G2.com.
Storage requirements for On Prem solutions, Nothing else serious. Review collected by and hosted on G2.com.

1. Provides in-depth runtime threat detection and prevention for VM workloads and AKS clusters across all subscriptions.
2. lmpact analysis and step-by-step remediation guidance to resolve issues efficiently.
3. Creation of tailored alerts to detect and notify deviations from secure configurations, ensuring swift misconfiguration resolution.
4. Monitors runtime behavior to identify and respond to threats like suspicious activities or privilege escalations, powered by the powerful Falco engine.
5. Scans container images, IaC, and dependencies for vulnerabilities directly within the CI/CD pipeline, enabling early detection during development.
6.Ease of Implementation suport from PS and CS Team
7.Customer Support team based in India time. Review collected by and hosted on G2.com.
Need to add additional capabilities for runtime detection in the Azure function app. Review collected by and hosted on G2.com.
Top three capabiktese with sysdog secure which we like
1- Ease of Integration with our AWS at orgnization level using terraform as modular approch for CSPM , CIEM/CDR , Agentless VM for container & Wokrlaod
2- Runtime detecting and alert workflow defination.
3- CWPP Worklaod proection for linux and EKS nodes. Review collected by and hosted on G2.com.
The ability to run on-demand vulnerability assessment of the compute instance is missing. Review collected by and hosted on G2.com.