Introducing G2.ai, the future of software buying.Try now

Best Cloud-Native Application Protection Platform (CNAPP) - Page 3

Lauren Worth
LW
Researched and written by Lauren Worth

To qualify for inclusion in the Cloud-Native Application Protection Platform (CNAPP) category, a product must:

Monitor cloud applications and infrastructure for misconfigurations and incorrect enforcement of security policies and provide remediation
Secure virtual machines, containers, and cloud infrastructure in hybrid, public, and private cloud environments during runtime
Monitor public clouds to identify access breaches continuously
Protect cloud systems from unauthorized use through identity management and access control
Assess security risks and ensure compliance with cloud security policies
Show More
Show Less

Best Cloud-Native Application Protection Platform (CNAPP) At A Glance

Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Easiest to Use:
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Cloud-Native Application Protection Platform (CNAPP) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
33 Listings in Cloud-Native Application Protection Platform (CNAPP) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Skyhigh Cloud Native Application Protection Platform CNAPP is the industry’s first platform to extend Cloud Access Security Broker CASB, bringing application and data context to converge Cloud Securit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skyhigh Cloud-Native Application Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Cloud Security
    1
    Communication
    1
    Comprehensive Security
    1
    Cost Efficiency
    1
    Cons
    Cloud Dependency
    1
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usability
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    San Jose, CA
    Twitter
    @skyhighsecurity
    17,715 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    675 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Skyhigh Cloud Native Application Protection Platform CNAPP is the industry’s first platform to extend Cloud Access Security Broker CASB, bringing application and data context to converge Cloud Securit

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Skyhigh Cloud-Native Application Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Cloud Security
1
Communication
1
Comprehensive Security
1
Cost Efficiency
1
Cons
Cloud Dependency
1
Complex Configuration
1
Complexity
1
Complex Setup
1
Complex Usability
1
Seller Details
Year Founded
2022
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,715 Twitter followers
LinkedIn® Page
www.linkedin.com
675 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecOps deserve better than raw cloud telemetry. Most tools patch over noise, ignoring the state of your cloud. We fix the root cause. Stream turns raw cloud telemetry into a stateful real-time model,

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecOps deserve better than raw cloud telemetry. Most tools patch over noise, ignoring the state of your cloud. We fix the root cause. Stream turns raw cloud telemetry into a stateful real-time model,

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Company Website
Year Founded
2020
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatStryker builds on the ThreatMapper open source platform. ThreatStryker extends the vulnerability discovery capabilities, adding runtime attack detection, prediction and protection. Map your ap

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatStryker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    1
    Cybersecurity Protection
    1
    Detection
    1
    Security
    1
    Security Insights
    1
    Cons
    Automation Issues
    1
    Lack of Remediation
    1
    Limited Automation
    1
    Missing Features
    1
    Poor Remediation
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deepfence
    Year Founded
    2018
    HQ Location
    Palo Alto, US
    Twitter
    @deepfence
    595 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatStryker builds on the ThreatMapper open source platform. ThreatStryker extends the vulnerability discovery capabilities, adding runtime attack detection, prediction and protection. Map your ap

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ThreatStryker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
1
Cybersecurity Protection
1
Detection
1
Security
1
Security Insights
1
Cons
Automation Issues
1
Lack of Remediation
1
Limited Automation
1
Missing Features
1
Poor Remediation
1
Seller Details
Seller
Deepfence
Year Founded
2018
HQ Location
Palo Alto, US
Twitter
@deepfence
595 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®