Introducing G2.ai, the future of software buying.Try now

Best Container Security Tools

Lauren Worth
LW
Researched and written by Lauren Worth

Container security tools are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discovering zero-day vulnerabilities, and simulating attacks from common threat sources.

Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

To qualify for inclusion in the Container Security category, a product must:

Integrate security with DevOps tools
Monitor and secure container networks or pipelines
Enforce access and security policies
Provide runtime protection capabilities

Best Container Security Tools At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
68 Listings in Container Security Available
(702)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Container Security software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    100
    Features
    91
    Security
    86
    Visibility
    69
    Easy Setup
    68
    Cons
    Improvement Needed
    31
    Feature Limitations
    29
    Improvements Needed
    28
    Missing Features
    26
    Learning Curve
    24
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.3
    7.6
    Network Segmentation
    Average: 7.9
    8.0
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,928 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
100
Features
91
Security
86
Visibility
69
Easy Setup
68
Cons
Improvement Needed
31
Feature Limitations
29
Improvements Needed
28
Missing Features
26
Learning Curve
24
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.3
7.6
Network Segmentation
Average: 7.9
8.0
Workload Protection
Average: 8.1
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,406 Twitter followers
LinkedIn® Page
www.linkedin.com
2,928 employees on LinkedIn®
(109)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 46% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    36
    Security
    35
    Threat Detection
    30
    Detection Efficiency
    29
    Features
    26
    Cons
    Feature Limitations
    12
    Complexity
    9
    Missing Features
    9
    Feature Complexity
    7
    Improvements Needed
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.6
    Security Auditing
    Average: 8.3
    9.1
    Network Segmentation
    Average: 7.9
    9.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,126 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    734 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 46% Enterprise
  • 40% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
36
Security
35
Threat Detection
30
Detection Efficiency
29
Features
26
Cons
Feature Limitations
12
Complexity
9
Missing Features
9
Feature Complexity
7
Improvements Needed
7
Sysdig Secure features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.6
Security Auditing
Average: 8.3
9.1
Network Segmentation
Average: 7.9
9.3
Workload Protection
Average: 8.1
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,126 Twitter followers
LinkedIn® Page
www.linkedin.com
734 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(221)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Security
    50
    Features
    49
    Cloud Security
    36
    Vulnerability Detection
    34
    Cons
    Improvement Needed
    23
    Feature Limitations
    19
    Missing Features
    18
    Improvements Needed
    15
    Ineffective Alerts
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security Auditing
    Average: 8.3
    7.7
    Network Segmentation
    Average: 7.9
    7.8
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    456 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Security
50
Features
49
Cloud Security
36
Vulnerability Detection
34
Cons
Improvement Needed
23
Feature Limitations
19
Missing Features
18
Improvements Needed
15
Ineffective Alerts
14
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security Auditing
Average: 8.3
7.7
Network Segmentation
Average: 7.9
7.8
Workload Protection
Average: 8.1
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,853 Twitter followers
LinkedIn® Page
www.linkedin.com
456 employees on LinkedIn®
(38)4.8 out of 5
Optimized for quick response
5th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Chainguard Containers are a guarded catalog of minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for high severity, 14 days for high, medium and low) that helps custo

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 50% Enterprise
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Chainguard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Security
    16
    Container Security
    11
    Customer Support
    11
    Vulnerability Scanning
    7
    Cons
    Pricing Issues
    4
    Missing Features
    3
    Difficult Learning
    2
    Integration Issues
    2
    Poor Documentation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chainguard features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.6
    Security Auditing
    Average: 8.3
    7.2
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    Kirkland, WA
    Twitter
    @chainguard_dev
    5,997 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    402 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Chainguard Containers are a guarded catalog of minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for high severity, 14 days for high, medium and low) that helps custo

Users
No information available
Industries
  • Computer Software
Market Segment
  • 50% Enterprise
  • 32% Small-Business
Chainguard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Security
16
Container Security
11
Customer Support
11
Vulnerability Scanning
7
Cons
Pricing Issues
4
Missing Features
3
Difficult Learning
2
Integration Issues
2
Poor Documentation
2
Chainguard features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.6
Security Auditing
Average: 8.3
7.2
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.1
Seller Details
Company Website
Year Founded
2021
HQ Location
Kirkland, WA
Twitter
@chainguard_dev
5,997 Twitter followers
LinkedIn® Page
www.linkedin.com
402 employees on LinkedIn®
(381)4.4 out of 5
Optimized for quick response
13th Easiest To Use in Container Security software
View top Consulting Services for Lacework FortiCNAPP
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lacework FortiCNAPP is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire applicatio

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lacework FortiCNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    29
    Security
    24
    Features
    17
    Vulnerability Detection
    17
    Alert Management
    14
    Cons
    Integration Issues
    10
    Missing Features
    10
    Improvement Needed
    9
    Improvements Needed
    8
    Complexity
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lacework FortiCNAPP features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security Auditing
    Average: 8.3
    7.9
    Network Segmentation
    Average: 7.9
    8.5
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lacework FortiCNAPP is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire applicatio

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
Lacework FortiCNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
29
Security
24
Features
17
Vulnerability Detection
17
Alert Management
14
Cons
Integration Issues
10
Missing Features
10
Improvement Needed
9
Improvements Needed
8
Complexity
7
Lacework FortiCNAPP features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security Auditing
Average: 8.3
7.9
Network Segmentation
Average: 7.9
8.5
Workload Protection
Average: 8.1
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
(55)4.7 out of 5
Optimized for quick response
6th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aikido Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Easy Integrations
    24
    Easy Setup
    23
    Security
    23
    Customer Support
    22
    Cons
    Limited Features
    7
    Missing Features
    7
    Improvement Needed
    6
    UX Improvement
    6
    False Positives
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security Auditing
    Average: 8.3
    7.1
    Network Segmentation
    Average: 7.9
    10.0
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    2,538 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    83 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
Aikido Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Easy Integrations
24
Easy Setup
23
Security
23
Customer Support
22
Cons
Limited Features
7
Missing Features
7
Improvement Needed
6
UX Improvement
6
False Positives
5
Aikido Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security Auditing
Average: 8.3
7.1
Network Segmentation
Average: 7.9
10.0
Workload Protection
Average: 8.1
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
2,538 Twitter followers
LinkedIn® Page
www.linkedin.com
83 employees on LinkedIn®
(108)4.9 out of 5
3rd Easiest To Use in Container Security software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    38
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.9
    Security Auditing
    Average: 8.3
    9.9
    Network Segmentation
    Average: 7.9
    9.9
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
38
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
9.9
Security Auditing
Average: 8.3
9.9
Network Segmentation
Average: 7.9
9.9
Workload Protection
Average: 8.1
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(303)4.4 out of 5
11th Easiest To Use in Container Security software
View top Consulting Services for Microsoft Defender for Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    166
    Comprehensive Security
    113
    Cloud Security
    99
    Ease of Use
    74
    Threat Protection
    70
    Cons
    Complexity
    37
    Expensive
    36
    False Positives
    26
    Delayed Detection
    25
    Improvement Needed
    25
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.3
    9.4
    Network Segmentation
    Average: 7.9
    9.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
166
Comprehensive Security
113
Cloud Security
99
Ease of Use
74
Threat Protection
70
Cons
Complexity
37
Expensive
36
False Positives
26
Delayed Detection
25
Improvement Needed
25
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.3
9.4
Network Segmentation
Average: 7.9
9.3
Workload Protection
Average: 8.1
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Small-Business
    • 23% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Container Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Container Security
    4
    Cloud Integration
    3
    Scanning Technology
    3
    Security
    3
    Comprehensive Security
    2
    Cons
    Complexity
    2
    Complex Setup
    2
    Learning Curve
    2
    Difficult Learning
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Container Security features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.3
    9.5
    Network Segmentation
    Average: 7.9
    8.7
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale.

Users
No information available
Industries
No information available
Market Segment
  • 54% Small-Business
  • 23% Enterprise
Google Container Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Container Security
4
Cloud Integration
3
Scanning Technology
3
Security
3
Comprehensive Security
2
Cons
Complexity
2
Complex Setup
2
Learning Curve
2
Difficult Learning
1
Expensive
1
Google Container Security features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.3
9.5
Network Segmentation
Average: 7.9
8.7
Workload Protection
Average: 8.1
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(186)4.5 out of 5
8th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Engineer
    • Cyber Security Associate
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    27
    Cloud Integration
    12
    Cloud Services
    11
    Cloud Security
    10
    Cloud Technology
    10
    Cons
    Complexity
    9
    Complex Setup
    7
    Difficult Setup
    6
    Feature Complexity
    6
    Difficulty
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security Auditing
    Average: 8.3
    6.7
    Network Segmentation
    Average: 7.9
    9.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Engineer
  • Cyber Security Associate
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
27
Cloud Integration
12
Cloud Services
11
Cloud Security
10
Cloud Technology
10
Cons
Complexity
9
Complex Setup
7
Difficult Setup
6
Feature Complexity
6
Difficulty
5
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security Auditing
Average: 8.3
6.7
Network Segmentation
Average: 7.9
9.3
Workload Protection
Average: 8.1
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
(12)5.0 out of 5
7th Easiest To Use in Container Security software
View top Consulting Services for Red Hat Advanced Cluster Security for Kubernetes
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Red Hat Advanced Cluster Security for Kubernetes features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Hat
    Year Founded
    1993
    HQ Location
    Raleigh, NC
    Twitter
    @RedHat
    295,491 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19,596 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 42% Mid-Market
  • 33% Small-Business
Red Hat Advanced Cluster Security for Kubernetes features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Red Hat
Year Founded
1993
HQ Location
Raleigh, NC
Twitter
@RedHat
295,491 Twitter followers
LinkedIn® Page
www.linkedin.com
19,596 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 52% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard CNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    32
    Cloud Security
    24
    Features
    22
    Cloud Integration
    20
    Detection
    20
    Cons
    Improvement Needed
    8
    Poor Support Services
    8
    Limited Customization
    7
    Missing Features
    7
    Poor Customer Support
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.1
    Security Auditing
    Average: 8.3
    8.1
    Network Segmentation
    Average: 7.9
    8.9
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 52% Enterprise
  • 34% Mid-Market
Check Point CloudGuard CNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
32
Cloud Security
24
Features
22
Cloud Integration
20
Detection
20
Cons
Improvement Needed
8
Poor Support Services
8
Limited Customization
7
Missing Features
7
Poor Customer Support
7
Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
8.1
Security Auditing
Average: 8.3
8.1
Network Segmentation
Average: 7.9
8.9
Workload Protection
Average: 8.1
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
(57)4.2 out of 5
16th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 56% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aqua Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Security
    18
    User Interface
    11
    Vulnerability Detection
    11
    Vulnerability Identification
    11
    Cons
    Missing Features
    12
    Lack of Features
    7
    Limited Features
    6
    Improvement Needed
    5
    UX Improvement
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aqua Security features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.0
    8.0
    Security Auditing
    Average: 8.3
    7.2
    Network Segmentation
    Average: 7.9
    8.6
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Burlington, US
    Twitter
    @AquaSecTeam
    7,598 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    583 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 56% Enterprise
  • 39% Mid-Market
Aqua Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Security
18
User Interface
11
Vulnerability Detection
11
Vulnerability Identification
11
Cons
Missing Features
12
Lack of Features
7
Limited Features
6
Improvement Needed
5
UX Improvement
5
Aqua Security features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.0
8.0
Security Auditing
Average: 8.3
7.2
Network Segmentation
Average: 7.9
8.6
Workload Protection
Average: 8.1
Seller Details
Year Founded
2015
HQ Location
Burlington, US
Twitter
@AquaSecTeam
7,598 Twitter followers
LinkedIn® Page
www.linkedin.com
583 employees on LinkedIn®
(97)4.1 out of 5
Optimized for quick response
20th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cortex Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    38
    Security
    36
    Features
    35
    Cloud Services
    28
    Cloud Integration
    27
    Cons
    Expensive
    24
    Learning Curve
    21
    Pricing Issues
    20
    Difficult Learning
    18
    Not User-Friendly
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.3
    7.7
    Network Segmentation
    Average: 7.9
    7.7
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 32% Small-Business
Cortex Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
38
Security
36
Features
35
Cloud Services
28
Cloud Integration
27
Cons
Expensive
24
Learning Curve
21
Pricing Issues
20
Difficult Learning
18
Not User-Friendly
17
Cortex Cloud features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.3
7.7
Network Segmentation
Average: 7.9
7.7
Workload Protection
Average: 8.1
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
(122)4.5 out of 5
19th Easiest To Use in Container Security software
View top Consulting Services for Snyk
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snyk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    5
    Integration Support
    4
    Integrations
    3
    Version Control
    3
    Ease of Use
    2
    Cons
    False Positives
    3
    Complex Configuration
    2
    Poor Customer Support
    2
    Poor Support Services
    2
    Pricing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snyk features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    7.9
    Security Auditing
    Average: 8.3
    6.9
    Network Segmentation
    Average: 7.9
    7.4
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    19,789 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,331 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 38% Small-Business
Snyk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
5
Integration Support
4
Integrations
3
Version Control
3
Ease of Use
2
Cons
False Positives
3
Complex Configuration
2
Poor Customer Support
2
Poor Support Services
2
Pricing Issues
2
Snyk features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
7.9
Security Auditing
Average: 8.3
6.9
Network Segmentation
Average: 7.9
7.4
Workload Protection
Average: 8.1
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
19,789 Twitter followers
LinkedIn® Page
www.linkedin.com
1,331 employees on LinkedIn®
(26)4.4 out of 5
Optimized for quick response
14th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico O

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 42% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Calico Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    11
    Ease of Use
    11
    Visibility
    8
    Policy Management
    7
    Security
    7
    Cons
    Missing Features
    5
    Complexity
    4
    Feature Complexity
    4
    Limited Integrations
    4
    Complex Configuration
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Calico Cloud features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    8.6
    Security Auditing
    Average: 8.3
    9.3
    Network Segmentation
    Average: 7.9
    8.8
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tigera
    Company Website
    Year Founded
    2016
    HQ Location
    San Jose, CA
    Twitter
    @tigeraio
    1,958 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    123 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico O

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 42% Enterprise
  • 35% Mid-Market
Calico Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
11
Ease of Use
11
Visibility
8
Policy Management
7
Security
7
Cons
Missing Features
5
Complexity
4
Feature Complexity
4
Limited Integrations
4
Complex Configuration
3
Calico Cloud features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
8.6
Security Auditing
Average: 8.3
9.3
Network Segmentation
Average: 7.9
8.8
Workload Protection
Average: 8.1
Seller Details
Seller
Tigera
Company Website
Year Founded
2016
HQ Location
San Jose, CA
Twitter
@tigeraio
1,958 Twitter followers
LinkedIn® Page
www.linkedin.com
123 employees on LinkedIn®
(10)4.9 out of 5
9th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudanix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    5
    Ease of Use
    5
    Features
    5
    Cloud Technology
    4
    Customer Support
    4
    Cons
    Lack of Customization
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudanix features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security Auditing
    Average: 8.3
    8.1
    Network Segmentation
    Average: 7.9
    9.6
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cloudanix
    Year Founded
    2020
    HQ Location
    Sunnyvale, CA
    Twitter
    @cloudanix
    95 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Small-Business
Cloudanix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
5
Ease of Use
5
Features
5
Cloud Technology
4
Customer Support
4
Cons
Lack of Customization
1
Limited Customization
1
Cloudanix features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security Auditing
Average: 8.3
8.1
Network Segmentation
Average: 7.9
9.6
Workload Protection
Average: 8.1
Seller Details
Seller
Cloudanix
Year Founded
2020
HQ Location
Sunnyvale, CA
Twitter
@cloudanix
95 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security integrated into DevOps. Protect containers in development and operations.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Container Security features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security Auditing
    Average: 8.3
    8.8
    Network Segmentation
    Average: 7.9
    9.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Security integrated into DevOps. Protect containers in development and operations.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
Tenable Container Security features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security Auditing
Average: 8.3
8.8
Network Segmentation
Average: 7.9
9.3
Workload Protection
Average: 8.1
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
(43)4.5 out of 5
15th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ARMO Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    22
    Security
    21
    Features
    18
    Insights
    15
    Vulnerability Detection
    15
    Cons
    Learning Curve
    10
    Integration Issues
    9
    Difficult Learning
    7
    Difficult Setup
    6
    Missing Features
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.3
    7.8
    Network Segmentation
    Average: 7.9
    9.1
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Company Website
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 37% Mid-Market
ARMO Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
22
Security
21
Features
18
Insights
15
Vulnerability Detection
15
Cons
Learning Curve
10
Integration Issues
9
Difficult Learning
7
Difficult Setup
6
Missing Features
6
ARMO Platform features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.3
7.8
Network Segmentation
Average: 7.9
9.1
Workload Protection
Average: 8.1
Seller Details
Seller
ARMO
Company Website
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,144 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
(95)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

    Users
    • CTO
    • CEO
    Industries
    • Mechanical or Industrial Engineering
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 42% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wallarm API Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Security
    3
    Threat Detection
    3
    Comprehensive Security
    2
    Cybersecurity
    2
    Cons
    API Issues
    1
    Complexity
    1
    Expensive
    1
    Learning Curve
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wallarm API Security Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Security Auditing
    Average: 8.3
    9.6
    Network Segmentation
    Average: 7.9
    10.0
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wallarm
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, California
    Twitter
    @wallarm
    3,201 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    146 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

Users
  • CTO
  • CEO
Industries
  • Mechanical or Industrial Engineering
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 42% Small-Business
Wallarm API Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Security
3
Threat Detection
3
Comprehensive Security
2
Cybersecurity
2
Cons
API Issues
1
Complexity
1
Expensive
1
Learning Curve
1
Limited Features
1
Wallarm API Security Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.7
Security Auditing
Average: 8.3
9.6
Network Segmentation
Average: 7.9
10.0
Workload Protection
Average: 8.1
Seller Details
Seller
Wallarm
Company Website
Year Founded
2016
HQ Location
San Francisco, California
Twitter
@wallarm
3,201 Twitter followers
LinkedIn® Page
www.linkedin.com
146 employees on LinkedIn®
(112)4.3 out of 5
18th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mend.io, formerly WhiteSource, effortlessly secures what developers create. Mend.io uniquely removes the burden of application security, allowing development teams to deliver quality, secure code fast

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mend.io Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Easy Integrations
    3
    Integration Support
    3
    Scanning Efficiency
    3
    Cloud Integration
    2
    Cons
    Integration Issues
    2
    Poor Documentation
    2
    Expensive
    1
    False Positives
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mend.io features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.3
    8.3
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mend
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts
    Twitter
    @Mend_io
    11,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    286 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mend.io, formerly WhiteSource, effortlessly secures what developers create. Mend.io uniquely removes the burden of application security, allowing development teams to deliver quality, secure code fast

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Mend.io Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Easy Integrations
3
Integration Support
3
Scanning Efficiency
3
Cloud Integration
2
Cons
Integration Issues
2
Poor Documentation
2
Expensive
1
False Positives
1
Insufficient Information
1
Mend.io features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.3
8.3
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.1
Seller Details
Seller
Mend
Year Founded
2011
HQ Location
Boston, Massachusetts
Twitter
@Mend_io
11,464 Twitter followers
LinkedIn® Page
www.linkedin.com
286 employees on LinkedIn®
(87)4.7 out of 5
12th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    Security Auditing
    Average: 8.3
    8.5
    Network Segmentation
    Average: 7.9
    7.9
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,694 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
Security Auditing
Average: 8.3
8.5
Network Segmentation
Average: 7.9
7.9
Workload Protection
Average: 8.1
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,694 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 63% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetScaler Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Features
    1
    Latency Reduction
    1
    Load Balancing
    1
    Performance
    1
    Cons
    Connection Issues
    1
    Connectivity Issues
    1
    Expensive
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetScaler features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @cloudsoftware
    110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,886 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 63% Enterprise
  • 29% Mid-Market
NetScaler Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Features
1
Latency Reduction
1
Load Balancing
1
Performance
1
Cons
Connection Issues
1
Connectivity Issues
1
Expensive
1
Slow Performance
1
NetScaler features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Fort Lauderdale, FL
Twitter
@cloudsoftware
110 Twitter followers
LinkedIn® Page
www.linkedin.com
10,886 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Distributed Cloud AIP, formerly known as Threat Stack, is the leader in cloud security and compliance for application infrastructures, helping companies securely leverage the business benefits of the

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 70% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 Distributed Cloud App Infrastructure Protection (AIP) features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Security Auditing
    Average: 8.3
    8.3
    Network Segmentation
    Average: 7.9
    6.7
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,401 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,142 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Distributed Cloud AIP, formerly known as Threat Stack, is the leader in cloud security and compliance for application infrastructures, helping companies securely leverage the business benefits of the

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 70% Mid-Market
  • 20% Small-Business
F5 Distributed Cloud App Infrastructure Protection (AIP) features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
7.5
Security Auditing
Average: 8.3
8.3
Network Segmentation
Average: 7.9
6.7
Workload Protection
Average: 8.1
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,401 Twitter followers
LinkedIn® Page
www.linkedin.com
6,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

    Users
    • Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VMDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Features
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Alerting System
    1
    Cons
    Complexity
    2
    Complex Reporting
    1
    Complex Setup
    1
    Difficult Learning
    1
    Feature Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VMDR features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.3
    7.5
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,094 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,905 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

Users
  • Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 28% Mid-Market
Qualys VMDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Features
2
Vulnerability Detection
2
Vulnerability Identification
2
Alerting System
1
Cons
Complexity
2
Complex Reporting
1
Complex Setup
1
Difficult Learning
1
Feature Complexity
1
Qualys VMDR features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.3
7.5
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.1
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,094 Twitter followers
LinkedIn® Page
www.linkedin.com
2,905 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more tha

    Users
    • Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 47% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlgoSec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Security
    38
    Policy Management
    34
    Risk Management
    29
    Features
    24
    Cons
    Improvement Needed
    20
    Improvements Needed
    20
    Missing Features
    13
    Integration Issues
    12
    Limited Features
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlgoSec features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.1
    Security Auditing
    Average: 8.3
    7.8
    Network Segmentation
    Average: 7.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AlgoSec
    Year Founded
    2004
    HQ Location
    Ridgefield Park, New Jersey
    Twitter
    @AlgoSec
    2,451 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    550 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more tha

Users
  • Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 47% Enterprise
  • 31% Mid-Market
AlgoSec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Security
38
Policy Management
34
Risk Management
29
Features
24
Cons
Improvement Needed
20
Improvements Needed
20
Missing Features
13
Integration Issues
12
Limited Features
10
AlgoSec features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 9.0
8.1
Security Auditing
Average: 8.3
7.8
Network Segmentation
Average: 7.9
0.0
No information available
Seller Details
Seller
AlgoSec
Year Founded
2004
HQ Location
Ridgefield Park, New Jersey
Twitter
@AlgoSec
2,451 Twitter followers
LinkedIn® Page
www.linkedin.com
550 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Conjur Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    1
    Cloud Services
    1
    Security
    1
    Useful
    1
    Cons
    Improvements Needed
    1
    Inadequate Tracking
    1
    Inefficiency
    1
    User Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Conjur features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.3
    10.0
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,416 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Enterprise
  • 29% Mid-Market
CyberArk Conjur Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
1
Cloud Services
1
Security
1
Useful
1
Cons
Improvements Needed
1
Inadequate Tracking
1
Inefficiency
1
User Difficulty
1
CyberArk Conjur features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.3
10.0
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.1
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,416 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 70% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ExtraHop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Reliability
    5
    Visibility
    5
    Customer Support
    3
    Features
    3
    Cons
    False Positives
    3
    Expensive
    2
    Inadequate Monitoring
    2
    Missing Features
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,915 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    725 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 70% Enterprise
  • 25% Mid-Market
ExtraHop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Reliability
5
Visibility
5
Customer Support
3
Features
3
Cons
False Positives
3
Expensive
2
Inadequate Monitoring
2
Missing Features
2
Alert Issues
1
ExtraHop features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,915 Twitter followers
LinkedIn® Page
www.linkedin.com
725 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWorx features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.3
    8.3
    Network Segmentation
    Average: 7.9
    5.0
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    LOS GATOS, US
    Twitter
    @threatwatch
    102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
ThreatWorx features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.3
8.3
Network Segmentation
Average: 7.9
5.0
Workload Protection
Average: 8.1
Seller Details
Year Founded
2016
HQ Location
LOS GATOS, US
Twitter
@threatwatch
102 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NeuVector, the leader in full lifecycle container security, empowers global organizations to comprehensively secure their container infrastructures without compromising business velocity. For security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NeuVector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Container Security
    1
    Dashboard Usability
    1
    Management Ease
    1
    Risk Management
    1
    Cons
    Cloud Dependency
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NeuVector features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Security Auditing
    Average: 8.3
    9.2
    Network Segmentation
    Average: 7.9
    7.8
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NeuVector
    Year Founded
    2015
    HQ Location
    San Jose, California
    Twitter
    @NeuVector
    708 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NeuVector, the leader in full lifecycle container security, empowers global organizations to comprehensively secure their container infrastructures without compromising business velocity. For security

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 17% Mid-Market
NeuVector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Container Security
1
Dashboard Usability
1
Management Ease
1
Risk Management
1
Cons
Cloud Dependency
1
NeuVector features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
6.7
Security Auditing
Average: 8.3
9.2
Network Segmentation
Average: 7.9
7.8
Workload Protection
Average: 8.1
Seller Details
Seller
NeuVector
Year Founded
2015
HQ Location
San Jose, California
Twitter
@NeuVector
708 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AccuKnox Zero Trust CNAPP cloud security protects public and private clouds, Kubernetes and VMs. AccuKnox is a AI-powered Zero Trust Cloud Native Security Platform that helps organizations comply with

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AccuKnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    5
    Security
    4
    Cloud Integration
    3
    Compliance Management
    3
    Customer Support
    3
    Cons
    Difficult Learning
    3
    Complex Setup
    2
    Expensive
    2
    Poor Customer Support
    2
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AccuKnox features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Security Auditing
    Average: 8.3
    9.0
    Network Segmentation
    Average: 7.9
    9.0
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Accuknox
    Year Founded
    2020
    HQ Location
    California, USA
    Twitter
    @AccuKnox
    325 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AccuKnox Zero Trust CNAPP cloud security protects public and private clouds, Kubernetes and VMs. AccuKnox is a AI-powered Zero Trust Cloud Native Security Platform that helps organizations comply with

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 31% Mid-Market
AccuKnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
5
Security
4
Cloud Integration
3
Compliance Management
3
Customer Support
3
Cons
Difficult Learning
3
Complex Setup
2
Expensive
2
Poor Customer Support
2
Complexity
1
AccuKnox features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.7
Security Auditing
Average: 8.3
9.0
Network Segmentation
Average: 7.9
9.0
Workload Protection
Average: 8.1
Seller Details
Seller
Accuknox
Year Founded
2020
HQ Location
California, USA
Twitter
@AccuKnox
325 Twitter followers
LinkedIn® Page
www.linkedin.com
152 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOOS is the complete application security posture management platform. Scan your software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate an

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 50% Mid-Market
    • 45% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SOOS Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Vulnerability Detection
    12
    Easy Integrations
    10
    Easy Setup
    10
    Integrations
    10
    Cons
    Inadequate Reporting
    6
    Lacking Features
    5
    Poor Reporting
    5
    Dashboard Issues
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOOS features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.3
    7.5
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOOS
    Company Website
    Year Founded
    2019
    HQ Location
    Winooski, US
    Twitter
    @soostech
    49 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOOS is the complete application security posture management platform. Scan your software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate an

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 50% Mid-Market
  • 45% Small-Business
SOOS Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Vulnerability Detection
12
Easy Integrations
10
Easy Setup
10
Integrations
10
Cons
Inadequate Reporting
6
Lacking Features
5
Poor Reporting
5
Dashboard Issues
3
Improvement Needed
3
SOOS features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.3
7.5
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.1
Seller Details
Seller
SOOS
Company Website
Year Founded
2019
HQ Location
Winooski, US
Twitter
@soostech
49 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Anchore, Inc., based in Santa Barbara, CA, was founded in 2016 by Saïd Ziouani and Daniel Nurmi to help organizations implement secure container-based workflows without compromising velocity. Anchore

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Anchore Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Vulnerability Scanning
    2
    Automation
    1
    Cloud Integration
    1
    Container Security
    1
    Cons
    Complex Setup
    1
    Learning Curve
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Anchore features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.3
    5.6
    Network Segmentation
    Average: 7.9
    6.1
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Anchore
    Year Founded
    2016
    HQ Location
    Santa Barbara, CA
    Twitter
    @anchore
    2,792 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Anchore, Inc., based in Santa Barbara, CA, was founded in 2016 by Saïd Ziouani and Daniel Nurmi to help organizations implement secure container-based workflows without compromising velocity. Anchore

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Anchore Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Vulnerability Scanning
2
Automation
1
Cloud Integration
1
Container Security
1
Cons
Complex Setup
1
Learning Curve
1
Poor Documentation
1
Anchore features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.3
5.6
Network Segmentation
Average: 7.9
6.1
Workload Protection
Average: 8.1
Seller Details
Seller
Anchore
Year Founded
2016
HQ Location
Santa Barbara, CA
Twitter
@anchore
2,792 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Security Smart Check – Container Image Security Protect your container images sooner with automated scanning for advanced security within your CI/CD pipeline

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Security Smart Check features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Security Auditing
    Average: 8.3
    6.7
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Security Smart Check – Container Image Security Protect your container images sooner with automated scanning for advanced security within your CI/CD pipeline

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Deep Security Smart Check features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
7.5
Security Auditing
Average: 8.3
6.7
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.1
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styra are the creators and maintainers of Open Policy Agent and leaders in cloud-native authorization. Our mission at Styra is to provide unified authorization and policy across the cloud-native stack

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Styra features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Security Auditing
    Average: 8.3
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Styra
    HQ Location
    Redwood City, CA
    Twitter
    @styrainc
    3,434 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styra are the creators and maintainers of Open Policy Agent and leaders in cloud-native authorization. Our mission at Styra is to provide unified authorization and policy across the cloud-native stack

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Styra features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
6.7
Security Auditing
Average: 8.3
0.0
No information available
0.0
No information available
Seller Details
Seller
Styra
HQ Location
Redwood City, CA
Twitter
@styrainc
3,434 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 53% Small-Business
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ActiveState Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Vancouver, BC
    Twitter
    @ActiveState
    4,038 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 53% Small-Business
  • 26% Mid-Market
ActiveState Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1997
HQ Location
Vancouver, BC
Twitter
@ActiveState
4,038 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Open-source container vulnerability analysis service.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CoreOS Clair features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Hat
    Year Founded
    1993
    HQ Location
    Raleigh, NC
    Twitter
    @RedHat
    295,491 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19,596 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Open-source container vulnerability analysis service.

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Small-Business
CoreOS Clair features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Red Hat
Year Founded
1993
HQ Location
Raleigh, NC
Twitter
@RedHat
295,491 Twitter followers
LinkedIn® Page
www.linkedin.com
19,596 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Define what activity is considered normal for your containerized applications & be notified when an application deviates.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falco Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Easy Integrations
    1
    Features
    1
    Security
    1
    Cons
    Complexity
    1
    Complex Setup
    1
    High Resource Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falco features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Security Auditing
    Average: 8.3
    7.5
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,126 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    734 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Define what activity is considered normal for your containerized applications & be notified when an application deviates.

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Falco Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Easy Integrations
1
Features
1
Security
1
Cons
Complexity
1
Complex Setup
1
High Resource Usage
1
Falco features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.0
7.5
Security Auditing
Average: 8.3
7.5
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.1
Seller Details
Seller
Sysdig
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,126 Twitter followers
LinkedIn® Page
www.linkedin.com
734 employees on LinkedIn®
(4)4.2 out of 5
View top Consulting Services for Sonatype Lifecycle
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sonatype Lifecycle features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sonatype
    Year Founded
    2008
    HQ Location
    Fulton, US
    Twitter
    @sonatype
    10,754 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    517 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when s

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Sonatype Lifecycle features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sonatype
Year Founded
2008
HQ Location
Fulton, US
Twitter
@sonatype
10,754 Twitter followers
LinkedIn® Page
www.linkedin.com
517 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Uptycs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Computing
    1
    Cloud Security
    1
    Cloud Technology
    1
    Compliance
    1
    Compliance Management
    1
    Cons
    Expensive
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uptycs features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    3.3
    Security Auditing
    Average: 8.3
    5.0
    Network Segmentation
    Average: 7.9
    5.0
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Uptycs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Computing
1
Cloud Security
1
Cloud Technology
1
Compliance
1
Compliance Management
1
Cons
Expensive
1
Pricing Issues
1
Uptycs features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
3.3
Security Auditing
Average: 8.3
5.0
Network Segmentation
Average: 7.9
5.0
Workload Protection
Average: 8.1
Seller Details
Seller
Uptycs
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,508 Twitter followers
LinkedIn® Page
www.linkedin.com
178 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Xygeni Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    2
    Prioritization
    2
    Risk Management
    2
    Security
    2
    Cloud Integration
    1
    Cons
    Difficult Setup
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xygeni features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.3
    4.2
    Network Segmentation
    Average: 7.9
    5.0
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    Twitter
    @xygeni
    188 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Xygeni Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
2
Prioritization
2
Risk Management
2
Security
2
Cloud Integration
1
Cons
Difficult Setup
1
Learning Curve
1
Xygeni features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.3
4.2
Network Segmentation
Average: 7.9
5.0
Workload Protection
Average: 8.1
Seller Details
Year Founded
2021
Twitter
@xygeni
188 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Araali Network Security Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    API Integration
    1
    Detection Efficiency
    1
    Integrations
    1
    Onboarding
    1
    Cons
    Complex Coding
    1
    Delayed Detection
    1
    Ineffective Alerts
    1
    Inefficient Alert System
    1
    Network Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pro features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Araali Network Security Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
API Integration
1
Detection Efficiency
1
Integrations
1
Onboarding
1
Cons
Complex Coding
1
Delayed Detection
1
Ineffective Alerts
1
Inefficient Alert System
1
Network Issues
1
Araali Network Security Pro features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 48% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Analytics
    2
    Detection
    2
    Cons
    Complexity
    3
    Complex Coding
    2
    Learning Curve
    2
    Training Deficiency
    2
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.3
    8.3
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 48% Enterprise
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Threat Detection
3
Cybersecurity
2
Data Analytics
2
Detection
2
Cons
Complexity
3
Complex Coding
2
Learning Curve
2
Training Deficiency
2
Complex Configuration
1
Corelight features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.3
8.3
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.1
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,205 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cycode is the only end-to-end software supply chain (SSC) security solution to provide visibility, security, and integrity across all phases of the SDLC. Cycode integrates with all of your software de

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cycode Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Onboarding
    1
    Risk Management
    1
    Cons
    Integration Issues
    1
    Limited Cloud Integration
    1
    Limited Integrations
    1
    Security Vulnerabilities
    1
    Vulnerability Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cycode features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Security Auditing
    Average: 8.3
    8.3
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cycode
    Year Founded
    2019
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    135 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cycode is the only end-to-end software supply chain (SSC) security solution to provide visibility, security, and integrity across all phases of the SDLC. Cycode integrates with all of your software de

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Cycode Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Integrations
1
Features
1
Onboarding
1
Risk Management
1
Cons
Integration Issues
1
Limited Cloud Integration
1
Limited Integrations
1
Security Vulnerabilities
1
Vulnerability Management
1
Cycode features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Security Auditing
Average: 8.3
8.3
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.1
Seller Details
Seller
Cycode
Year Founded
2019
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
135 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Data Theorem Cloud Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Security
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Vulnerability Management
    2
    Cons
    Expensive
    2
    Improvement Needed
    1
    Performance Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Data Theorem Cloud Secure features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Security Auditing
    Average: 8.3
    8.3
    Network Segmentation
    Average: 7.9
    6.7
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Data Theorem Cloud Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Security
2
Vulnerability Detection
2
Vulnerability Identification
2
Vulnerability Management
2
Cons
Expensive
2
Improvement Needed
1
Performance Issues
1
Slow Performance
1
Data Theorem Cloud Secure features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Security Auditing
Average: 8.3
8.3
Network Segmentation
Average: 7.9
6.7
Workload Protection
Average: 8.1
Seller Details
Year Founded
2013
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted b

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 52% Small-Business
    • 48% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GuardRails features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security Auditing
    Average: 8.3
    0.0
    No information available
    10.0
    Workload Protection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Singapore, Singapore
    Twitter
    @guardrailsio
    1,573 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted b

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 52% Small-Business
  • 48% Mid-Market
GuardRails features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security Auditing
Average: 8.3
0.0
No information available
10.0
Workload Protection
Average: 8.1
Seller Details
Year Founded
2017
HQ Location
Singapore, Singapore
Twitter
@guardrailsio
1,573 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Portshift is a Kubernetes security leader, our innovative digital identity-based solution creates a unique, signed identity for each workload at the CI/CD pipeline stage, that is then used to enforce

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Portshift Containers Security Operator features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Portshift
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Portshift is a Kubernetes security leader, our innovative digital identity-based solution creates a unique, signed identity for each workload at the CI/CD pipeline stage, that is then used to enforce

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Portshift Containers Security Operator features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Portshift
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Runecast features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, London
    Twitter
    @Runecast
    1,145 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 25% Mid-Market
Runecast features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
London, London
Twitter
@Runecast
1,145 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kubernetes networking is open by default pods can freely talk to each other. Moreover, microservices architecture presents an increased attack surface and potential for damage. Once an app in the Kube

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pay-as-you-go features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kubernetes networking is open by default pods can freely talk to each other. Moreover, microservices architecture presents an increased attack surface and potential for damage. Once an app in the Kube

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Araali Network Security Pay-as-you-go features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Carbonetes is the most comprehensive container security analysis in the market. It can be integrated seamlessly into your CI/CD pipeline so that your containers are automatically scanned and evaluated

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Carbonetes features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Houston, TX
    Twitter
    @carbonetes
    14 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Carbonetes is the most comprehensive container security analysis in the market. It can be integrated seamlessly into your CI/CD pipeline so that your containers are automatically scanned and evaluated

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Carbonetes features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Houston, TX
Twitter
@carbonetes
14 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudWize Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Security
    5
    Cloud Services
    4
    Customer Support
    4
    Cloud Integration
    3
    Cons
    Complex Implementation
    1
    Complex Setup
    1
    Improvements Needed
    1
    Insufficient Training
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudWize features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudWize
    Year Founded
    2019
    HQ Location
    Netanya, IL
    Twitter
    @cloud_wize
    94 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
CloudWize Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Security
5
Cloud Services
4
Customer Support
4
Cloud Integration
3
Cons
Complex Implementation
1
Complex Setup
1
Improvements Needed
1
Insufficient Training
1
Poor Documentation
1
CloudWize features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CloudWize
Year Founded
2019
HQ Location
Netanya, IL
Twitter
@cloud_wize
94 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Constellation leverages confidential computing to isolate entire Kubernetes clusters from the infrastructure. Finally, the public cloud turns into your private cloud. All data in the cluster remains

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Constellation features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Bochum, DE
    LinkedIn® Page
    linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Constellation leverages confidential computing to isolate entire Kubernetes clusters from the infrastructure. Finally, the public cloud turns into your private cloud. All data in the cluster remains

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Constellation features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Bochum, DE
LinkedIn® Page
linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    An enlightened approach to security observability, across clouds, containers, and serverless. Deepfence ThreatMapper is the leading open source threat discovery solution for cloud-native applications

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deepfence.io features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deepfence
    Year Founded
    2018
    HQ Location
    Palo Alto, US
    Twitter
    @deepfence
    598 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

An enlightened approach to security observability, across clouds, containers, and serverless. Deepfence ThreatMapper is the leading open source threat discovery solution for cloud-native applications

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Deepfence.io features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Deepfence
Year Founded
2018
HQ Location
Palo Alto, US
Twitter
@deepfence
598 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deploy containers on a platform with more diverse PoP locations than centralized cloud providers, getting your workload closer to your end users and clients.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edge Computing Containers features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    StackPath
    Year Founded
    2009
    HQ Location
    Los Angeles, CA
    Twitter
    @StackPath
    2,368 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deploy containers on a platform with more diverse PoP locations than centralized cloud providers, getting your workload closer to your end users and clients.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Edge Computing Containers features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
StackPath
Year Founded
2009
HQ Location
Los Angeles, CA
Twitter
@StackPath
2,368 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fairwinds Insights provides platform teams all the business and mission critical functionality to make Kubernetes easy for developers to use and self-service. Fairwinds Insights is a SaaS for platfo

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fairwinds Insights features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fairwinds
    Year Founded
    2016
    HQ Location
    Boston
    Twitter
    @fairwindsops
    1,407 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Fairwinds Insights provides platform teams all the business and mission critical functionality to make Kubernetes easy for developers to use and self-service. Fairwinds Insights is a SaaS for platfo

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Fairwinds Insights features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fairwinds
Year Founded
2016
HQ Location
Boston
Twitter
@fairwindsops
1,407 Twitter followers
LinkedIn® Page
www.linkedin.com
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CodeEye's IRIS is a next-generation application security posture management (ASPM) platform, offers an all-in-one solution with real-time, AI-powered vulnerability and threat detection, correlation, p

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IRIS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CodeEye
    Year Founded
    2015
    HQ Location
    Toronto, CA
    Twitter
    @CodeEyeAI
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CodeEye's IRIS is a next-generation application security posture management (ASPM) platform, offers an all-in-one solution with real-time, AI-powered vulnerability and threat detection, correlation, p

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IRIS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CodeEye
Year Founded
2015
HQ Location
Toronto, CA
Twitter
@CodeEyeAI
5 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kubesafe features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kubesafe
    LinkedIn® Page
    www.linkedin.com
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Kubesafe features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Kubesafe
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Minimus images radically reduce the amount of vulnerabilities that impact your cloud environment. Minimus builds images from scratch, directly from upstream project sources, with only the minimal sof

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Minimus features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Minimus
Product Description
How are these determined?Information
This description is provided by the seller.

Minimus images radically reduce the amount of vulnerabilities that impact your cloud environment. Minimus builds images from scratch, directly from upstream project sources, with only the minimal sof

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Minimus features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Minimus
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netmaker is a

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netmaker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gravitl
    Year Founded
    2009
    HQ Location
    Santa Monica, US
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netmaker is a

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Netmaker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Gravitl
Year Founded
2009
HQ Location
Santa Monica, US
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RapidFort is a unified CI/CD security platform that eliminates up to 95% of vulnerabilities without requiring code changes. We provide RF-Curated Near Zero CVE Images hardened to NIST 800-70 and FI

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RapidFort features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RapidFort
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RapidFort is a unified CI/CD security platform that eliminates up to 95% of vulnerabilities without requiring code changes. We provide RF-Curated Near Zero CVE Images hardened to NIST 800-70 and FI

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
RapidFort features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
RapidFort
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Skyhigh Cloud Native Application Protection Platform CNAPP is the industry’s first platform to extend Cloud Access Security Broker CASB, bringing application and data context to converge Cloud Securit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skyhigh Cloud-Native Application Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Cloud Security
    1
    Communication
    1
    Comprehensive Security
    1
    Cost Efficiency
    1
    Cons
    Cloud Dependency
    1
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skyhigh Cloud-Native Application Protection Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Jose, CA
    Twitter
    @skyhighsecurity
    17,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    639 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Skyhigh Cloud Native Application Protection Platform CNAPP is the industry’s first platform to extend Cloud Access Security Broker CASB, bringing application and data context to converge Cloud Securit

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Skyhigh Cloud-Native Application Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Cloud Security
1
Communication
1
Comprehensive Security
1
Cost Efficiency
1
Cons
Cloud Dependency
1
Complex Configuration
1
Complexity
1
Complex Setup
1
Complex Usability
1
Skyhigh Cloud-Native Application Protection Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,873 Twitter followers
LinkedIn® Page
www.linkedin.com
639 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deploy secure development environments in minutes while protecting your assets and improving your DevOps efficiency. Strong Network's code development workspaces allow organizations to efficiently m

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Strong Network features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Deploy secure development environments in minutes while protecting your assets and improving your DevOps efficiency. Strong Network's code development workspaces allow organizations to efficiently m

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Strong Network features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Cloud Workload Protection features and usability ratings that predict user satisfaction
    1.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines

Users
No information available
Industries
No information available
Market Segment
  • 58% Mid-Market
  • 25% Small-Business
Symantec Cloud Workload Protection features and usability ratings that predict user satisfaction
1.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sypderbat features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sypderbat
    LinkedIn® Page
    www.linkedin.com
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sypderbat features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sypderbat
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatStryker builds on the ThreatMapper open source platform. ThreatStryker extends the vulnerability discovery capabilities, adding runtime attack detection, prediction and protection. Map your ap

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatStryker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    1
    Cybersecurity Protection
    1
    Detection
    1
    Security
    1
    Security Insights
    1
    Cons
    Automation Issues
    1
    Lack of Remediation
    1
    Limited Automation
    1
    Missing Features
    1
    Poor Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatStryker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deepfence
    Year Founded
    2018
    HQ Location
    Palo Alto, US
    Twitter
    @deepfence
    598 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatStryker builds on the ThreatMapper open source platform. ThreatStryker extends the vulnerability discovery capabilities, adding runtime attack detection, prediction and protection. Map your ap

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ThreatStryker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
1
Cybersecurity Protection
1
Detection
1
Security
1
Security Insights
1
Cons
Automation Issues
1
Lack of Remediation
1
Limited Automation
1
Missing Features
1
Poor Remediation
1
ThreatStryker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Deepfence
Year Founded
2018
HQ Location
Palo Alto, US
Twitter
@deepfence
598 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trickest Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trickest
    HQ Location
    Dover, Delaware
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Trickest Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Trickest
HQ Location
Dover, Delaware
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veracode Container Security secures containers and infrastructure as code with a CLI tool that integrates into an existing CI/CD pipeline.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veracode Container Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VERACODE
    Year Founded
    2006
    HQ Location
    Burlington, MA
    Twitter
    @Veracode
    22,303 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    579 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Veracode Container Security secures containers and infrastructure as code with a CLI tool that integrates into an existing CI/CD pipeline.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Veracode Container Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
VERACODE
Year Founded
2006
HQ Location
Burlington, MA
Twitter
@Veracode
22,303 Twitter followers
LinkedIn® Page
www.linkedin.com
579 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wangsu Container Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Shangai. China
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Wangsu Container Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Shangai. China
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®