Introducing G2.ai, the future of software buying.Try now

Top Free Container Security Tools

Check out our list of free Container Security Tools. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Container Security Tools to ensure you get the right product.

View Free Container Security Tools

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
28 Container Security Products Available
(702)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Container Security software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.3
    7.6
    Network Segmentation
    Average: 7.9
    8.0
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,928 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.3
7.6
Network Segmentation
Average: 7.9
8.0
Workload Protection
Average: 8.1
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,406 Twitter followers
LinkedIn® Page
www.linkedin.com
2,928 employees on LinkedIn®
(221)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security Auditing
    Average: 8.3
    7.7
    Network Segmentation
    Average: 7.9
    7.8
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VP
    1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
    Verified User in Telecommunications
    ET
    I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    456 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security Auditing
Average: 8.3
7.7
Network Segmentation
Average: 7.9
7.8
Workload Protection
Average: 8.1
VP
1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
Verified User in Telecommunications
ET
I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,853 Twitter followers
LinkedIn® Page
www.linkedin.com
456 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(108)4.9 out of 5
3rd Easiest To Use in Container Security software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.9
    Security Auditing
    Average: 8.3
    9.9
    Network Segmentation
    Average: 7.9
    9.9
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
9.9
Security Auditing
Average: 8.3
9.9
Network Segmentation
Average: 7.9
9.9
Workload Protection
Average: 8.1
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(186)4.5 out of 5
8th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security Auditing
    Average: 8.3
    6.7
    Network Segmentation
    Average: 7.9
    9.3
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Nico John C.
    NC
    It optimizes our cost in the cloud and also check all the gaps in between the clouds that we had in production. Read review
    Sumit K.
    SK
    Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security Auditing
Average: 8.3
6.7
Network Segmentation
Average: 7.9
9.3
Workload Protection
Average: 8.1
Nico John C.
NC
It optimizes our cost in the cloud and also check all the gaps in between the clouds that we had in production. Read review
Sumit K.
SK
Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
(38)4.8 out of 5
Optimized for quick response
5th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Chainguard Containers are a guarded catalog of minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for high severity, 14 days for high, medium and low) that helps custo

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 50% Enterprise
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chainguard features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.6
    Security Auditing
    Average: 8.3
    7.2
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Mathieu B.
    MB
    I was looking for replacing my base images with more a secure approach (i.e. distroless), Chainguard images were a great fit because easy to use... Read review
    Mark M.
    MM
    We've all seen a ton of projects that will detect CVEs but then you have the secondary problem of deciding where the CVE originated from (base... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    Kirkland, WA
    Twitter
    @chainguard_dev
    5,997 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    402 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Chainguard Containers are a guarded catalog of minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for high severity, 14 days for high, medium and low) that helps custo

Users
No information available
Industries
  • Computer Software
Market Segment
  • 50% Enterprise
  • 32% Small-Business
Chainguard features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.6
Security Auditing
Average: 8.3
7.2
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.1
Mathieu B.
MB
I was looking for replacing my base images with more a secure approach (i.e. distroless), Chainguard images were a great fit because easy to use... Read review
Mark M.
MM
We've all seen a ton of projects that will detect CVEs but then you have the secondary problem of deciding where the CVE originated from (base... Read review
Seller Details
Company Website
Year Founded
2021
HQ Location
Kirkland, WA
Twitter
@chainguard_dev
5,997 Twitter followers
LinkedIn® Page
www.linkedin.com
402 employees on LinkedIn®
(112)4.3 out of 5
18th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mend.io, formerly WhiteSource, effortlessly secures what developers create. Mend.io uniquely removes the burden of application security, allowing development teams to deliver quality, secure code fast

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mend.io features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.3
    8.3
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Vivek Kumar S.
    VS
    Interface and flow of the application.Also the simplicity Read review
    Meer T.
    MT
    The best thing is the security and easy to use. The mend bot offers couple of qualities to protect your projects against several security protocols... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mend
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts
    Twitter
    @Mend_io
    11,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    286 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mend.io, formerly WhiteSource, effortlessly secures what developers create. Mend.io uniquely removes the burden of application security, allowing development teams to deliver quality, secure code fast

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Mend.io features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.3
8.3
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.1
Vivek Kumar S.
VS
Interface and flow of the application.Also the simplicity Read review
Meer T.
MT
The best thing is the security and easy to use. The mend bot offers couple of qualities to protect your projects against several security protocols... Read review
Seller Details
Seller
Mend
Year Founded
2011
HQ Location
Boston, Massachusetts
Twitter
@Mend_io
11,464 Twitter followers
LinkedIn® Page
www.linkedin.com
286 employees on LinkedIn®
(87)4.7 out of 5
12th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    Security Auditing
    Average: 8.3
    8.5
    Network Segmentation
    Average: 7.9
    7.9
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
    AJ T.
    AT
    Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,694 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
Security Auditing
Average: 8.3
8.5
Network Segmentation
Average: 7.9
7.9
Workload Protection
Average: 8.1
HH
It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
AJ T.
AT
Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,694 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
(55)4.7 out of 5
Optimized for quick response
6th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security Auditing
    Average: 8.3
    7.1
    Network Segmentation
    Average: 7.9
    10.0
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    UI
    Our dev team loves the self-serve approach on Aikido. Read review
    Tamara F.
    TF
    I love couple of things - first one is that it is really-really user friendly. For me interface is really user friendly, it was very quick to set... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    2,538 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    83 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
Aikido Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security Auditing
Average: 8.3
7.1
Network Segmentation
Average: 7.9
10.0
Workload Protection
Average: 8.1
Verified User in Information Technology and Services
UI
Our dev team loves the self-serve approach on Aikido. Read review
Tamara F.
TF
I love couple of things - first one is that it is really-really user friendly. For me interface is really user friendly, it was very quick to set... Read review
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
2,538 Twitter followers
LinkedIn® Page
www.linkedin.com
83 employees on LinkedIn®
(97)4.1 out of 5
Optimized for quick response
20th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.3
    7.7
    Network Segmentation
    Average: 7.9
    7.7
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Herberth S.
    HS
    Their platform is easy to use, and having good integration with other brands facilitates its implementation, it is a solution that has several... Read review
    Verified User in Computer Software
    UC
    Having worked on some in-house AI driven security solutions I can say this gives a very nice turn-key solution. The fact it's a cloud native... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 32% Small-Business
Cortex Cloud features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.3
7.7
Network Segmentation
Average: 7.9
7.7
Workload Protection
Average: 8.1
Herberth S.
HS
Their platform is easy to use, and having good integration with other brands facilitates its implementation, it is a solution that has several... Read review
Verified User in Computer Software
UC
Having worked on some in-house AI driven security solutions I can say this gives a very nice turn-key solution. The fact it's a cloud native... Read review
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
(43)4.5 out of 5
15th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.3
    7.8
    Network Segmentation
    Average: 7.9
    9.1
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abdurrahman A.
    AA
    This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
    Mandira G.
    MG
    I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Company Website
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 37% Mid-Market
ARMO Platform features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.3
7.8
Network Segmentation
Average: 7.9
9.1
Workload Protection
Average: 8.1
Abdurrahman A.
AA
This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
Mandira G.
MG
I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
Seller Details
Seller
ARMO
Company Website
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,144 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 63% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetScaler features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Shubham G.
    SG
    The best function of Citrix Web App Firewall is its user friendly interface which enables anyone to use the product hassle free. Read review
    Verified User in Pharmaceuticals
    UP
    Application performance acceleration is one of the feature of it. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @cloudsoftware
    110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,886 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 63% Enterprise
  • 29% Mid-Market
NetScaler features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Shubham G.
SG
The best function of Citrix Web App Firewall is its user friendly interface which enables anyone to use the product hassle free. Read review
Verified User in Pharmaceuticals
UP
Application performance acceleration is one of the feature of it. Read review
Seller Details
HQ Location
Fort Lauderdale, FL
Twitter
@cloudsoftware
110 Twitter followers
LinkedIn® Page
www.linkedin.com
10,886 employees on LinkedIn®
(26)4.4 out of 5
Optimized for quick response
14th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico O

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 42% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Calico Cloud features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    8.6
    Security Auditing
    Average: 8.3
    9.3
    Network Segmentation
    Average: 7.9
    8.8
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RK
    Calico helps us roll up multiple security features in a single place through a single installer. This makes administration and deployment... Read review
    Verified User in International Trade and Development
    AI
    1. Detailed network policy control 2. Scalability and efficiency 3. Effortless management 4. Prompt support 5. Seamless Integration Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tigera
    Company Website
    Year Founded
    2016
    HQ Location
    San Jose, CA
    Twitter
    @tigeraio
    1,958 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    123 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico O

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 42% Enterprise
  • 35% Mid-Market
Calico Cloud features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
8.6
Security Auditing
Average: 8.3
9.3
Network Segmentation
Average: 7.9
8.8
Workload Protection
Average: 8.1
RK
Calico helps us roll up multiple security features in a single place through a single installer. This makes administration and deployment... Read review
Verified User in International Trade and Development
AI
1. Detailed network policy control 2. Scalability and efficiency 3. Effortless management 4. Prompt support 5. Seamless Integration Read review
Seller Details
Seller
Tigera
Company Website
Year Founded
2016
HQ Location
San Jose, CA
Twitter
@tigeraio
1,958 Twitter followers
LinkedIn® Page
www.linkedin.com
123 employees on LinkedIn®
(95)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

    Users
    • CTO
    • CEO
    Industries
    • Mechanical or Industrial Engineering
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 42% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wallarm API Security Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Security Auditing
    Average: 8.3
    9.6
    Network Segmentation
    Average: 7.9
    10.0
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VS
    perimeter scanner and attack rechecker allow us to be 100% sure there is no backdoor or unknown entries and every vulnerability is highlighted and... Read review
    DL
    - Amazing firewall that can work as a standalone proxy server, filter all incoming HTTP requests and block attacks - Supports integration with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wallarm
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, California
    Twitter
    @wallarm
    3,201 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    146 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

Users
  • CTO
  • CEO
Industries
  • Mechanical or Industrial Engineering
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 42% Small-Business
Wallarm API Security Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.7
Security Auditing
Average: 8.3
9.6
Network Segmentation
Average: 7.9
10.0
Workload Protection
Average: 8.1
VS
perimeter scanner and attack rechecker allow us to be 100% sure there is no backdoor or unknown entries and every vulnerability is highlighted and... Read review
DL
- Amazing firewall that can work as a standalone proxy server, filter all incoming HTTP requests and block attacks - Supports integration with... Read review
Seller Details
Seller
Wallarm
Company Website
Year Founded
2016
HQ Location
San Francisco, California
Twitter
@wallarm
3,201 Twitter followers
LinkedIn® Page
www.linkedin.com
146 employees on LinkedIn®
(10)4.9 out of 5
9th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudanix features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security Auditing
    Average: 8.3
    8.1
    Network Segmentation
    Average: 7.9
    9.6
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Anurag  G.
    AG
    The tool gives you a detailed insight about threats and vulnerabilities while taking a very basic access of your account and without fetching... Read review
    Raghav A.
    RA
    Overall, Cloudanix is a robust, reliable tool for any organization looking to strengthen their cloud infrastructure’s security, compliance, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cloudanix
    Year Founded
    2020
    HQ Location
    Sunnyvale, CA
    Twitter
    @cloudanix
    95 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Small-Business
Cloudanix features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security Auditing
Average: 8.3
8.1
Network Segmentation
Average: 7.9
9.6
Workload Protection
Average: 8.1
Anurag  G.
AG
The tool gives you a detailed insight about threats and vulnerabilities while taking a very basic access of your account and without fetching... Read review
Raghav A.
RA
Overall, Cloudanix is a robust, reliable tool for any organization looking to strengthen their cloud infrastructure’s security, compliance, and... Read review
Seller Details
Seller
Cloudanix
Year Founded
2020
HQ Location
Sunnyvale, CA
Twitter
@cloudanix
95 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 70% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Telecommunications
    UT
    The capability of deep dive into any OSI Layer's protocol to match your pre-configured triggers for abnormal network pattern and potential issue... Read review
    Verified User in Telecommunications
    AT
    EAsy to use, intuitive platform, drill downs Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,915 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    725 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 70% Enterprise
  • 25% Mid-Market
ExtraHop features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Telecommunications
UT
The capability of deep dive into any OSI Layer's protocol to match your pre-configured triggers for abnormal network pattern and potential issue... Read review
Verified User in Telecommunications
AT
EAsy to use, intuitive platform, drill downs Read review
Seller Details
Company Website
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,915 Twitter followers
LinkedIn® Page
www.linkedin.com
725 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWorx features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.3
    8.3
    Network Segmentation
    Average: 7.9
    5.0
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Parikshit S.
    PS
    Ease of use - agent-less and scan-less approach. Comprehensiveness - Helps us secure cloud, container and code. Effectiveness (improved... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    LOS GATOS, US
    Twitter
    @threatwatch
    102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
ThreatWorx features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.3
8.3
Network Segmentation
Average: 7.9
5.0
Workload Protection
Average: 8.1
Parikshit S.
PS
Ease of use - agent-less and scan-less approach. Comprehensiveness - Helps us secure cloud, container and code. Effectiveness (improved... Read review
Seller Details
Year Founded
2016
HQ Location
LOS GATOS, US
Twitter
@threatwatch
102 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AccuKnox Zero Trust CNAPP cloud security protects public and private clouds, Kubernetes and VMs. AccuKnox is a AI-powered Zero Trust Cloud Native Security Platform that helps organizations comply with

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AccuKnox features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Security Auditing
    Average: 8.3
    9.0
    Network Segmentation
    Average: 7.9
    9.0
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Hospital & Health Care
    AH
    I had a very good initial conversation with the sales team and had a successful demo. The solution is very capable. The solutions offered are... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Accuknox
    Year Founded
    2020
    HQ Location
    California, USA
    Twitter
    @AccuKnox
    325 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AccuKnox Zero Trust CNAPP cloud security protects public and private clouds, Kubernetes and VMs. AccuKnox is a AI-powered Zero Trust Cloud Native Security Platform that helps organizations comply with

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 31% Mid-Market
AccuKnox features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.7
Security Auditing
Average: 8.3
9.0
Network Segmentation
Average: 7.9
9.0
Workload Protection
Average: 8.1
Verified User in Hospital & Health Care
AH
I had a very good initial conversation with the sales team and had a successful demo. The solution is very capable. The solutions offered are... Read review
Seller Details
Seller
Accuknox
Year Founded
2020
HQ Location
California, USA
Twitter
@AccuKnox
325 Twitter followers
LinkedIn® Page
www.linkedin.com
152 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOOS is the complete application security posture management platform. Scan your software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate an

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 50% Mid-Market
    • 45% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOOS features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.3
    7.5
    Network Segmentation
    Average: 7.9
    8.3
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jim B.
    JB
    Cost-effective for startups. I always put off scanning my open-source libraries because the cost was too high to bear. SOOS takes that off the table. Read review
    Jeff G.
    JG
    SOOS works about as well as Snyk or Sonatype for SCA, and at about 0.1% of the price. Their support has been super responsive and helpful when... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOOS
    Company Website
    Year Founded
    2019
    HQ Location
    Winooski, US
    Twitter
    @soostech
    49 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOOS is the complete application security posture management platform. Scan your software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate an

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 50% Mid-Market
  • 45% Small-Business
SOOS features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.3
7.5
Network Segmentation
Average: 7.9
8.3
Workload Protection
Average: 8.1
Jim B.
JB
Cost-effective for startups. I always put off scanning my open-source libraries because the cost was too high to bear. SOOS takes that off the table. Read review
Jeff G.
JG
SOOS works about as well as Snyk or Sonatype for SCA, and at about 0.1% of the price. Their support has been super responsive and helpful when... Read review
Seller Details
Seller
SOOS
Company Website
Year Founded
2019
HQ Location
Winooski, US
Twitter
@soostech
49 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styra are the creators and maintainers of Open Policy Agent and leaders in cloud-native authorization. Our mission at Styra is to provide unified authorization and policy across the cloud-native stack

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Styra features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Security Auditing
    Average: 8.3
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FW
    Ease of use, git integration, out of the box k8s policies, Styra support. Read review
    Verified User in Mechanical or Industrial Engineering
    EM
    Technology, flexibility, Collab with Styra team, Hands-on-mentality, leadership engagement. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Styra
    HQ Location
    Redwood City, CA
    Twitter
    @styrainc
    3,434 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styra are the creators and maintainers of Open Policy Agent and leaders in cloud-native authorization. Our mission at Styra is to provide unified authorization and policy across the cloud-native stack

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Styra features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
6.7
Security Auditing
Average: 8.3
0.0
No information available
0.0
No information available
FW
Ease of use, git integration, out of the box k8s policies, Styra support. Read review
Verified User in Mechanical or Industrial Engineering
EM
Technology, flexibility, Collab with Styra team, Hands-on-mentality, leadership engagement. Read review
Seller Details
Seller
Styra
HQ Location
Redwood City, CA
Twitter
@styrainc
3,434 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 53% Small-Business
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ActiveState Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FRANCISCO M.
    M
    the great advantages it offers to develop my projects in terms of security in addition to the great community ready-to-use software supply chain... Read review
    Alexander H.
    AH
    Easy to use fast active community to help if I encounter problems Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Vancouver, BC
    Twitter
    @ActiveState
    4,038 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 53% Small-Business
  • 26% Mid-Market
ActiveState Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
FRANCISCO M.
M
the great advantages it offers to develop my projects in terms of security in addition to the great community ready-to-use software supply chain... Read review
Alexander H.
AH
Easy to use fast active community to help if I encounter problems Read review
Seller Details
Year Founded
1997
HQ Location
Vancouver, BC
Twitter
@ActiveState
4,038 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
(4)4.2 out of 5
View top Consulting Services for Sonatype Lifecycle
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sonatype Lifecycle features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    UC
    Nexus is best vulnerability scanning tool to identify the vulnerabilities and misconfugration in server. Read review
    Verified User in Consumer Services
    AC
    I like the ease of use of the application. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sonatype
    Year Founded
    2008
    HQ Location
    Fulton, US
    Twitter
    @sonatype
    10,754 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    517 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when s

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Sonatype Lifecycle features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Computer & Network Security
UC
Nexus is best vulnerability scanning tool to identify the vulnerabilities and misconfugration in server. Read review
Verified User in Consumer Services
AC
I like the ease of use of the application. Read review
Seller Details
Seller
Sonatype
Year Founded
2008
HQ Location
Fulton, US
Twitter
@sonatype
10,754 Twitter followers
LinkedIn® Page
www.linkedin.com
517 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uptycs features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    3.3
    Security Auditing
    Average: 8.3
    5.0
    Network Segmentation
    Average: 7.9
    5.0
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    - Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
    Verified User in Computer & Network Security
    UC
    Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Uptycs features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
3.3
Security Auditing
Average: 8.3
5.0
Network Segmentation
Average: 7.9
5.0
Workload Protection
Average: 8.1
Verified User in Financial Services
UF
- Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
Verified User in Computer & Network Security
UC
Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
Seller Details
Seller
Uptycs
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,508 Twitter followers
LinkedIn® Page
www.linkedin.com
178 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xygeni features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.3
    4.2
    Network Segmentation
    Average: 7.9
    5.0
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Óscar G.
    ÓG
    - Real-time malware detection: Xygeni’s early warning system has been a game-changer, identifying malicious open source components before they can... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    Twitter
    @xygeni
    188 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Xygeni features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.3
4.2
Network Segmentation
Average: 7.9
5.0
Workload Protection
Average: 8.1
Óscar G.
ÓG
- Real-time malware detection: Xygeni’s early warning system has been a game-changer, identifying malicious open source components before they can... Read review
Seller Details
Year Founded
2021
Twitter
@xygeni
188 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pro features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Dan M.
    DM
    I help to run a complicated service which runs tens of thousands of rapidly evolving disparate processes across a distributed compute cluster.... Read review
    Verified User in Information Technology and Services
    AI
    I like how flexible their policy engine is, which allows me to spot the anomaly in the environment easily. The enforcement feature is helpful in... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Araali Network Security Pro features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Dan M.
DM
I help to run a complicated service which runs tens of thousands of rapidly evolving disparate processes across a distributed compute cluster.... Read review
Verified User in Information Technology and Services
AI
I like how flexible their policy engine is, which allows me to spot the anomaly in the environment easily. The enforcement feature is helpful in... Read review
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted b

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 52% Small-Business
    • 48% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GuardRails features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security Auditing
    Average: 8.3
    0.0
    No information available
    10.0
    Workload Protection
    Average: 8.1
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ranu M.
    RM
    It helps developers secure code from any unwanted security issues caused during the development or implementation of technology and notify as soon... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Singapore, Singapore
    Twitter
    @guardrailsio
    1,573 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted b

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 52% Small-Business
  • 48% Mid-Market
GuardRails features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security Auditing
Average: 8.3
0.0
No information available
10.0
Workload Protection
Average: 8.1
Ranu M.
RM
It helps developers secure code from any unwanted security issues caused during the development or implementation of technology and notify as soon... Read review
Seller Details
Year Founded
2017
HQ Location
Singapore, Singapore
Twitter
@guardrailsio
1,573 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Runecast features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • BL
    Runecast is an extremely powerful tool that provides value out-of-the-box in minutes. It scans your VMware vSphere, NSX-T, Azure, AWS, VMware... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, London
    Twitter
    @Runecast
    1,145 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 25% Mid-Market
Runecast features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
BL
Runecast is an extremely powerful tool that provides value out-of-the-box in minutes. It scans your VMware vSphere, NSX-T, Azure, AWS, VMware... Read review
Seller Details
Year Founded
2014
HQ Location
London, London
Twitter
@Runecast
1,145 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudWize features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Shreya B.
    SB
    We manage the cost metrics of our associated AWS accounts using various features such as cost views, monthly breakdowns & reports offered by... Read review
    Igor R.
    IR
    Cloudwize.io is an incredible AI-powered cloud management platform. Its real-time optimization, proactive monitoring, intuitive interface, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudWize
    Year Founded
    2019
    HQ Location
    Netanya, IL
    Twitter
    @cloud_wize
    94 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
CloudWize features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Shreya B.
SB
We manage the cost metrics of our associated AWS accounts using various features such as cost views, monthly breakdowns & reports offered by... Read review
Igor R.
IR
Cloudwize.io is an incredible AI-powered cloud management platform. Its real-time optimization, proactive monitoring, intuitive interface, and... Read review
Seller Details
Seller
CloudWize
Year Founded
2019
HQ Location
Netanya, IL
Twitter
@cloud_wize
94 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deploy secure development environments in minutes while protecting your assets and improving your DevOps efficiency. Strong Network's code development workspaces allow organizations to efficiently m

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Strong Network features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Deploy secure development environments in minutes while protecting your assets and improving your DevOps efficiency. Strong Network's code development workspaces allow organizations to efficiently m

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Strong Network features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com