# Best Cloud Workload Protection Platforms

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Cloud workload protection platforms help protect servers and cloud infrastructure and virtual machines (VMs) from web-based threats.

To qualify for inclusion in the Cloud Workload Protection Platforms category, a product must:

- Protect cloud infrastructure and virtual machines.
- Support container-based application security
- Monitor and protect public, private, or hybrid-cloud environments





## Category Overview

**Total Products under this Category:** 89


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 4,300+ Authentic Reviews
- 89+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Cloud Workload Protection Platforms At A Glance

- **Leader:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
- **Highest Performer:** [Plerion](https://www.g2.com/products/plerion/reviews)
- **Easiest to Use:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
- **Top Trending:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
- **Best Free Software:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)


## Top-Rated Products (Ranked by G2 Score)
### 1. [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
  Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the development lifecycle, empowering them to build fast and securely. Its Cloud Native Application Protection Platform (CNAPP) consolidates CSPM, KSPM, CWPP, Vulnerability management, IaC scanning, CIEM, DSPM into a single platform. Wiz drives visibility, risk prioritization, and business agility. Protecting Your Cloud Environments Requires a Unified, Cloud Native Platform. Wiz connects to every cloud environment, scans every layer, and covers every aspect of your cloud security - including elements that normally require installing agents. Its comprehensive approach has all of these cloud security solutions built in. Hundreds of organizations worldwide, including 50 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Its customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman &amp; Wakefield, DocuSign, Plaid, and Agoda, among others. Wiz is backed by Sequoia, Index Ventures, Insight Partners, Salesforce, Blackstone, Advent, Greenoaks, Lightspeed and Aglaé. Visit https://www.wiz.io for more information.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 772

**User Satisfaction Scores:**

- **Governance:** 8.9/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.0/10 (Category avg: 9.0/10)
- **API / Integrations:** 9.0/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Wiz](https://www.g2.com/sellers/wiz-76a0133b-42e5-454e-b5da-860e503471db)
- **Company Website:** https://www.wiz.io/
- **Year Founded:** 2020
- **HQ Location:** New York, US
- **Twitter:** @wiz_io (22,550 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/wizsecurity/ (3,248 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CISO, Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 54% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Features (113 reviews)
- Security (107 reviews)
- Ease of Use (104 reviews)
- Visibility (87 reviews)
- Easy Setup (68 reviews)

**Cons:**

- Improvement Needed (35 reviews)
- Feature Limitations (34 reviews)
- Learning Curve (34 reviews)
- Improvements Needed (29 reviews)
- Complexity (27 reviews)

### 2. [Orca Security](https://www.g2.com/products/orca-security/reviews)
  The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google Cloud, Kubernetes, Alibaba Cloud, and Oracle Cloud. Orca offers the industry’s most comprehensive cloud security solution in a single platform — eliminating the need to deploy and maintain multiple point solutions. Orca is agentless-first, and connects to your environment in minutes using Orca’s patented SideScanning™ technology that provides deep and wide visibility into your cloud environment, without requiring agents. In addition, Orca can integrate with third-party agents for runtime visibility and protection for critical workloads. Orca is at the forefront of leveraging Generative AI for simplified investigations and accelerated remediation – reducing required skill levels and saving cloud security, DevOps, and development teams time and effort, while significantly improving security outcomes. As a Cloud Native Application Protection Platform (CNAPP), Orca consolidates many point solutions in one platform, including: CSPM, CWPP, CIEM, Vulnerability Management, Container and Kubernetes Security, DSPM, API Security, CDR, Multi-cloud Compliance, Shift Left Security, and AI-SPM.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 240

**User Satisfaction Scores:**

- **Governance:** 8.5/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.0/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.8/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Orca Security](https://www.g2.com/sellers/orca-security)
- **Company Website:** https://orca.security
- **Year Founded:** 2019
- **HQ Location:** Portland, Oregon
- **Twitter:** @orcasec (4,832 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/35573984/ (495 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, CISO
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 41% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (37 reviews)
- Features (33 reviews)
- Security (29 reviews)
- User Interface (22 reviews)
- Visibility (22 reviews)

**Cons:**

- Improvement Needed (15 reviews)
- Feature Limitations (12 reviews)
- Limited Features (10 reviews)
- Missing Features (10 reviews)
- Ineffective Alerts (9 reviews)

### 3. [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews)
  Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig uniquely delivers runtime-powered visibility and agentic AI to stop cloud attacks instantly, not after the damage is done. With Sysdig, you can: - Stop threats in 2 seconds and respond in minutes - Cut vulnerability noise by 95% with runtime prioritization - Detect real risk instantly across workloads, identities, and misconfigurations - Close permissions gaps in under 2 minutes Sysdig Secure consolidates CSPM, CWPP, CIEM, vulnerability management, and threat detection into a single open, real-time platform. Unlike other CNAPPs, Sysdig connects signals across runtime, identity, and posture to eliminate blind spots, reduce tool sprawl, and accelerate innovation without compromise. No guesswork. No black boxes. Just cloud security, the right way. Learn more at https://sysdig.com


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 111

**User Satisfaction Scores:**

- **Governance:** 9.9/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.3/10 (Category avg: 9.0/10)
- **API / Integrations:** 9.8/10 (Category avg: 8.6/10)
- **Security Auditing:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Sysdig](https://www.g2.com/sellers/sysdig-715eaed9-9743-4f27-bd2b-d3730923ac3e)
- **Company Website:** https://www.sysdig.com
- **Year Founded:** 2013
- **HQ Location:** San Francisco, California
- **Twitter:** @Sysdig (10,256 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3592486/ (640 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 46% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Security (33 reviews)
- Vulnerability Detection (32 reviews)
- Threat Detection (31 reviews)
- Detection Efficiency (30 reviews)
- Features (23 reviews)

**Cons:**

- Feature Limitations (10 reviews)
- Complexity (9 reviews)
- Missing Features (8 reviews)
- Difficult Learning (7 reviews)
- Feature Complexity (7 reviews)

### 4. [Check Point CloudGuard Network Security](https://www.g2.com/products/check-point-cloudguard-network-security/reviews)
  CloudGuard Network Security is a comprehensive cloud security solution designed to protect public, private, and hybrid cloud environments from a wide array of cyber threats. This platform focuses on delivering advanced threat protection, ensuring that organizations can confidently transition to the cloud while maintaining robust security measures. With an impressive malware catch rate, CloudGuard is engineered to defend against various types of attacks, including ransomware and other malicious software. Targeted at enterprises and organizations that are increasingly adopting cloud technologies, CloudGuard Network Security is particularly beneficial for IT teams and security professionals who require a reliable and efficient way to manage security across multiple environments. The solution is ideal for businesses looking to enhance their cloud security posture without compromising on agility or operational efficiency. By integrating seamlessly with leading Infrastructure as Code (IaC) tools, CloudGuard automates network security processes, making it easier for teams to implement security measures within their continuous integration and continuous deployment (CI/CD) workflows. One of the standout features of CloudGuard is its advanced protection capabilities. The platform includes a suite of security features such as a firewall, data loss prevention (DLP), intrusion prevention system (IPS), application control, IPsec VPN, URL filtering, antivirus, anti-bot protection, threat extraction, and threat emulation. These tools work in concert to provide a multi-layered defense strategy that addresses various attack vectors, ensuring that organizations can mitigate risks effectively. Additionally, CloudGuard&#39;s automated network security capabilities support IaC and CI/CD practices, allowing organizations to streamline their security processes through the use of APIs and automation. This enables security teams to focus on more strategic initiatives rather than being bogged down by manual tasks. The unified security management feature further enhances the solution by providing consistent visibility and policy management across hybrid-cloud and on-premises environments. Users can access logging, reporting, and control from a single interface, simplifying the management of security policies and improving overall operational efficiency. Overall, CloudGuard Network Security stands out in the cloud security landscape by offering a robust, integrated solution that not only protects against emerging threats but also enhances the agility and efficiency of security operations. Its comprehensive feature set and automation capabilities make it a valuable asset for organizations navigating the complexities of cloud security.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 170

**User Satisfaction Scores:**

- **Governance:** 8.7/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.8/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.8/10 (Category avg: 8.6/10)
- **Security Auditing:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Security Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 41% Enterprise, 30% Mid-Market


#### Pros & Cons

**Pros:**

- Security (42 reviews)
- Ease of Use (28 reviews)
- Threat Detection (28 reviews)
- Threat Protection (28 reviews)
- Cloud Integration (22 reviews)

**Cons:**

- Complexity (26 reviews)
- Difficult Setup (25 reviews)
- Difficult Learning (24 reviews)
- Difficult Configuration (23 reviews)
- Difficult Learning Curve (22 reviews)

### 5. [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews)
  Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 279

**User Satisfaction Scores:**

- **Governance:** 8.9/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.8/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.4/10 (Category avg: 8.6/10)
- **Security Auditing:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,844 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Saas Consultant, Software Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Mid-Market, 35% Enterprise


#### Pros & Cons

**Pros:**

- Security (121 reviews)
- Comprehensive Security (92 reviews)
- Cloud Security (71 reviews)
- Vulnerability Detection (63 reviews)
- Threat Detection (57 reviews)

**Cons:**

- Complexity (27 reviews)
- Expensive (24 reviews)
- Delayed Detection (22 reviews)
- False Positives (19 reviews)
- Improvement Needed (19 reviews)

### 6. [Hybrid Cloud Security](https://www.g2.com/products/trend-micro-hybrid-cloud-security/reviews)
  In today&#39;s complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend&#39;s Cloud Security provides essential visibility, allowing you and your teams to secure every aspect of your transformation and eliminate disruptive security silos. Automate security policies, deployments, monitoring, and compliance audits seamlessly from a single console, ensuring the automatic protection of all workloads from both known and unknown threats. With Cloud-Native Application Protection and robust platform capabilities, Trend empowers you to proactively address vulnerabilities and defend against threats. Gain centralized visibility, continuous asset discovery, and contextualized risk assessments, equipping your team with everything necessary to stay ahead of potential cloud security risks.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 181

**User Satisfaction Scores:**

- **Governance:** 8.6/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.6/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.3/10 (Category avg: 8.6/10)
- **Security Auditing:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Who Uses This:** Cyber Security Associate, Cyber Security Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 43% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Security (9 reviews)
- Security Protection (7 reviews)
- Compliance (6 reviews)
- Cloud Security (4 reviews)
- Comprehensive Security (4 reviews)

**Cons:**

- Complexity (6 reviews)
- Complex Setup (4 reviews)
- Feature Complexity (4 reviews)
- Learning Curve (4 reviews)
- Difficult Learning (3 reviews)

### 7. [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews)
  Crowdstrike Falcon Cloud Security is the only CNAPP to stop breaches in the cloud Built for today’s hybrid and multi-cloud environments, Falcon Cloud Security protects the entire cloud attack surface - from code to runtime - by combining continuous agentless visibility with real-time detection and response. At runtime, Falcon Cloud Security delivers best-in-class cloud workload protection and real-time cloud detection and response (CDR) to stop active threats across hybrid environments. Integrated with the CrowdStrike Falcon platform, it correlates signals across endpoint, identity, and cloud to detect sophisticated cross-domain attacks that point solutions miss—enabling teams to respond faster and stop breaches in progress. To reduce risk before attacks occur, Falcon Cloud Security also delivers agentless-driven posture management that proactively shrinks the cloud attack surface. Unlike typical solutions, Crowdstrike enriches cloud risk detections with adversary intelligence and graph-based context, enabling security teams to prioritize exploitable exposures and prevent breaches before they happen. Customers using Falcon Cloud Security consistently see measurable results: 89% faster cloud detection and response 100x reduction in false positives by prioritizing exploitable, business-critical risk 83% reduction in cloud security licenses due to elimination of redundant tools


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 83

**User Satisfaction Scores:**

- **Governance:** 9.0/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.9/10 (Category avg: 9.0/10)
- **API / Integrations:** 9.1/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Company Website:** https://www.crowdstrike.com
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,215 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Enterprise, 43% Mid-Market


#### Pros & Cons

**Pros:**

- Security (49 reviews)
- Cloud Security (37 reviews)
- Detection Efficiency (34 reviews)
- Vulnerability Detection (31 reviews)
- Ease of Use (29 reviews)

**Cons:**

- Expensive (17 reviews)
- Improvements Needed (14 reviews)
- Improvement Needed (13 reviews)
- Feature Complexity (8 reviews)
- Learning Curve (8 reviews)

### 8. [AlgoSec Horizon](https://www.g2.com/products/algosec-horizon/reviews)
  AlgoSec, a global cybersecurity leader, empowers organizations to securely accelerate application delivery up to 10 times faster by automating application connectivity and security policy across the hybrid network environment. With two decades of expertise securing hybrid networks, over 2200 of the world&#39;s most complex organizations trust AlgoSec to help secure their most critical workloads. AlgoSec Horizon platform utilizes advanced AI capabilities, enabling users to automatically discover and identify their business applications across multi-clouds, and remediate risks more effectively. It serves as a single source for visibility into security and compliance issues across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Additionally, organizations can leverage intelligent change automation to streamline security change processes, thus improving security and agility. Learn how AlgoSec enables application owners, information security experts, SecOps and cloud security teams to deploy business applications faster while maintaining security at www.algosec.com.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 215

**User Satisfaction Scores:**

- **Governance:** 9.6/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.4/10 (Category avg: 9.0/10)
- **API / Integrations:** 9.5/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [AlgoSec](https://www.g2.com/sellers/algosec)
- **Company Website:** https://www.algosec.com
- **Year Founded:** 2004
- **HQ Location:** Ridgefield Park, New Jersey
- **Twitter:** @AlgoSec (2,425 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/algosec/ (559 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 51% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (15 reviews)
- Policy Management (13 reviews)
- Risk Management (9 reviews)
- Automation (8 reviews)
- Useful (8 reviews)

**Cons:**

- Improvement Needed (8 reviews)
- Integration Issues (6 reviews)
- Difficult Setup (5 reviews)
- Complex Setup (4 reviews)
- Expensive (4 reviews)

### 9. [Check Point CloudGuard CNAPP](https://www.g2.com/products/check-point-cloudguard-cnapp/reviews)
  CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter. With CloudGuard&#39;s unified &amp; modular platform , customers receive: Enhanced Cloud Security Posture Management Deep Workload Security Visibility at Scale with No Agents Enforcement of Least Privilege with Cloud Infrastructure Entitlement Management (CIEM) Runtime Protection for Cloud Workloads (CWPP) Context-Based Web Application and API Protection (WAF) Shift CNAPP Left to Secure Applications in the CI/CD Pipeline Context Graph Visualization &amp; Cloud Detection and Response For more information on CloudGuard CNAPP, visit https://www.checkpoint.com/cloudguard/cnapp/


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 168

**User Satisfaction Scores:**

- **Governance:** 8.6/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.8/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.5/10 (Category avg: 8.6/10)
- **Security Auditing:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Software Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 48% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Security (45 reviews)
- Cloud Security (35 reviews)
- Ease of Use (30 reviews)
- Cloud Integration (29 reviews)
- Comprehensive Security (29 reviews)

**Cons:**

- Improvement Needed (13 reviews)
- Complexity (12 reviews)
- Difficult Setup (10 reviews)
- Integration Issues (10 reviews)
- Poor Customer Support (10 reviews)

### 10. [Google Cloud Platform Security Overview](https://www.g2.com/products/google-cloud-platform-security-overview/reviews)
  Cloud Platform Security Overview allows users to deploy on an infrastructure protected by top experts in information, application, and network security.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 73

**User Satisfaction Scores:**

- **Governance:** 7.3/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.2/10 (Category avg: 9.0/10)
- **API / Integrations:** 7.8/10 (Category avg: 8.6/10)
- **Security Auditing:** 7.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,885,216 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)
- **Ownership:** NASDAQ:GOOG

**Reviewer Demographics:**
  - **Who Uses This:** Android Software Engineer
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 59% Mid-Market, 49% Small-Business


### 11. [NetApp ONTAP Data Management Software](https://www.g2.com/products/netapp-ontap-data-management-software/reviews)
  Simplify your data infrastructure—from the edge to the core to the cloud—with the industry&#39;s leading enterprise data management software.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 79

**User Satisfaction Scores:**

- **Ease of Admin:** 8.7/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [NetApp](https://www.g2.com/sellers/netapp)
- **Year Founded:** 1992
- **HQ Location:** Sunnyvale, California
- **Twitter:** @NetApp (118,257 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2105/ (12,677 employees on LinkedIn®)
- **Ownership:** NASDAQ

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Banking
  - **Company Size:** 46% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Data Security (7 reviews)
- Reliability (7 reviews)
- Data Management (5 reviews)
- Cloud Services (4 reviews)
- Protection (3 reviews)

**Cons:**

- Expensive (8 reviews)
- Complexity (4 reviews)
- Complexity Issues (3 reviews)
- Complex Setup (3 reviews)
- Integration Issues (3 reviews)

### 12. [SentinelOne Singularity Cloud Security](https://www.g2.com/products/sentinelone-singularity-cloud-security/reviews)
  Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure and protect your multi-cloud infrastructure, services, and containers from build time to runtime. SentinelOne’s CNAPP applies an attacker’s mindset to help security practitioners better prioritize their remediation tasks with evidence-backed Verified Exploit Paths™. The efficient and scalable runtime protection, proven over 5 years and trusted by many of the world’s leading cloud enterprises, harnesses local, autonomous AI engines to detect and thwart runtime threats in real-time. CNAPP data and workload telemetry is recorded to SentinelOne’s unified security lake, for easy access and investigation.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 113

**User Satisfaction Scores:**

- **Governance:** 9.9/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.8/10 (Category avg: 9.0/10)
- **API / Integrations:** 9.9/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Company Website:** https://www.sentinelone.com
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,607 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,183 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 60% Mid-Market, 31% Enterprise


#### Pros & Cons

**Pros:**

- Security (27 reviews)
- Ease of Use (20 reviews)
- Vulnerability Detection (19 reviews)
- Cloud Management (16 reviews)
- Cloud Security (15 reviews)

**Cons:**

- Complexity (5 reviews)
- Ineffective Alerts (5 reviews)
- Complex Setup (4 reviews)
- Difficult Configuration (4 reviews)
- Poor UI (4 reviews)

### 13. [Cortex Cloud](https://www.g2.com/products/cortex-cloud/reviews)
  Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud security and SOC workflows enables teams to achieve holistic visibility, trace risk across the lifecycle, and correlate real-time threat activity with development and runtime contexts. Cortex Cloud is a unified platform built on three core pillars: data integration, AI-driven intelligence, and automation. Now you can safeguard applications, data, and infrastructure across multicloud and hybrid environments with a unified data model that consolidates telemetry from code, runtime, identity, and endpoints, all into a single data source. Empower teams with precise, AI-powered insights and 2200+ machine learning models to identify and stop zero-day threats with real-time advanced threat detection and response. And automate with 1000+ prebuilt playbooks across your cloud stack to reduce manual workloads, accelerate remediations, and cut response times tenfold. Cortex Cloud delivers more than tools—it transforms how organizations secure their cloud environments.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 110

**User Satisfaction Scores:**

- **Governance:** 8.6/10 (Category avg: 8.7/10)
- **Ease of Admin:** 7.9/10 (Category avg: 9.0/10)
- **API / Integrations:** 9.4/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Company Website:** https://www.paloaltonetworks.com
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,686 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 38% Enterprise, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (49 reviews)
- Features (45 reviews)
- Security (43 reviews)
- Visibility (38 reviews)
- Cloud Integration (34 reviews)

**Cons:**

- Expensive (31 reviews)
- Difficult Learning (30 reviews)
- Learning Curve (29 reviews)
- Pricing Issues (24 reviews)
- Complex Setup (21 reviews)

### 14. [AWS Control Tower](https://www.g2.com/products/aws-control-tower/reviews)
  AWS Control Tower is a managed service that simplifies the setup and governance of secure, multi-account AWS environments. It automates the creation of a well-architected landing zone, incorporating best practices for security, compliance, and operations. By orchestrating various AWS services, AWS Control Tower enables organizations to establish a standardized and secure cloud environment efficiently. Key Features and Functionality: - Landing Zone: Automates the setup of a secure, multi-account AWS environment based on best practices, including identity management, logging, and security controls. - Account Factory: Provides a configurable account template to standardize the provisioning of new AWS accounts with pre-approved configurations, facilitating consistent and compliant account creation. - Control Catalog: Offers a centralized repository of over 750 preconfigured controls, allowing organizations to enforce governance policies across their AWS environment. These controls include preventive, detective, and proactive measures to maintain compliance and security. - Dashboard: Provides a centralized interface for monitoring the compliance status of accounts and organizational units, offering visibility into noncompliant resources and overall governance posture. Primary Value and Problem Solved: AWS Control Tower addresses the complexity of managing multiple AWS accounts by providing a centralized, automated solution for establishing and maintaining a secure and compliant cloud environment. It reduces the time and effort required to set up multi-account environments, enforces consistent governance policies, and enhances visibility into compliance status. This enables organizations to focus on innovation and business objectives while ensuring their AWS infrastructure adheres to best practices and regulatory requirements.


  **Average Rating:** 3.9/5.0
  **Total Reviews:** 20

**User Satisfaction Scores:**

- **Governance:** 9.7/10 (Category avg: 8.7/10)
- **Ease of Admin:** 7.8/10 (Category avg: 9.0/10)
- **API / Integrations:** 9.7/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,223,984 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Company Size:** 45% Mid-Market, 41% Enterprise


### 15. [Plerion](https://www.g2.com/products/plerion/reviews)
  Simplify cloud security. Plerion is an Aussie cyber security company. Our suite of solutions include an AI security engineer, Pleri, embedded on a code and cloud security platform. We secure everything you build and run, from code to cloud to AI. Plerion has achieved AWS Partner Security Software Competency and is IS27001 and SOC2 certified.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 24

**User Satisfaction Scores:**

- **Governance:** 9.4/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.9/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.3/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Plerion](https://www.g2.com/sellers/plerion)
- **Company Website:** https://plerion.com/
- **Year Founded:** 2021
- **HQ Location:** Sydney, AU
- **Twitter:** @PlerionHQ (141 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/plerion (32 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 58% Mid-Market, 29% Small-Business


#### Pros & Cons

**Pros:**

- Security (11 reviews)
- Ease of Use (10 reviews)
- Customer Support (7 reviews)
- Helpful (7 reviews)
- Prioritization (6 reviews)

**Cons:**

- Improvements Needed (5 reviews)
- Improvement Needed (4 reviews)
- Missing Features (4 reviews)
- Cloud Integration (2 reviews)
- Integration Issues (2 reviews)

### 16. [InsightVM (Nexpose)](https://www.g2.com/products/insightvm-nexpose/reviews)
  InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning technical teams, security teams can remediate vulnerabilities and build Security into the core of the organization. With InsightVM, security teams can: Gain Clarity Into Risk and Across Teams Better understand the risk in your modern environment so you can work in lockstep with technical teams. Extend Security’s Influence Align traditionally siloed teams and drive impact with the shared view and common language of InsightVM. See Shared Progress Take a proactive approach to security with tracking and metrics that create accountability and recognize progress.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 69

**User Satisfaction Scores:**

- **Governance:** 8.7/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.0/10 (Category avg: 9.0/10)
- **API / Integrations:** 9.2/10 (Category avg: 8.6/10)
- **Security Auditing:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Rapid7](https://www.g2.com/sellers/rapid7)
- **Year Founded:** 2000
- **HQ Location:** Boston, MA
- **Twitter:** @rapid7 (124,080 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/39624/ (3,249 employees on LinkedIn®)
- **Ownership:** NASDAQ:RPD

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Enterprise, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Automation (4 reviews)
- Vulnerability Identification (4 reviews)
- Asset Management (3 reviews)
- Features (3 reviews)
- Prioritization (3 reviews)

**Cons:**

- Complexity (3 reviews)
- Performance Issues (2 reviews)
- Resource Limitations (2 reviews)
- Resource Management (2 reviews)
- Time-Consuming (2 reviews)

### 17. [ARMO Platform](https://www.g2.com/products/armo-platform/reviews)
  ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while actively detecting and responding to cyberattacks with real risk context. Using an eBPF-based runtime sensor to record application behavior and related activities, ARMO Platform enables DevOps, security, and platform teams to eliminate the security noise and go from thousands of irrelevant alerts to focus on the most important and exploitable threats. This allows those teams to shift from managing hypothetical security issues to mitigating actual risks and providing them with the means to remediate them. ARMO is an open-source-driven company and the creator of Kubescape, a leading open-source Kubernetes security project, now an official CNCF project. To learn more about ARMO Platform please visit: https://www.armosec.io/


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 44

**User Satisfaction Scores:**

- **Governance:** 8.7/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.9/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.8/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [ARMO](https://www.g2.com/sellers/armo)
- **Year Founded:** 2019
- **HQ Location:** Tel Aviv, IL
- **Twitter:** @armosec (3,092 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/armosec/ (88 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 59% Small-Business, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (20 reviews)
- Security (19 reviews)
- Features (16 reviews)
- Vulnerability Detection (12 reviews)
- Comprehensive Security (11 reviews)

**Cons:**

- Learning Curve (10 reviews)
- Integration Issues (9 reviews)
- Difficult Learning (7 reviews)
- Limited Integrations (6 reviews)
- Missing Features (6 reviews)

### 18. [Armor Anywhere](https://www.g2.com/products/armor-anywhere/reviews)
  Armor Agent protects Windows and Linux servers wherever they run, in public cloud, private cloud, or on-premises environments, with a single, lightweight agent that installs with one line of code. The agent combines malware protection, intrusion prevention (IDS/IPS), file integrity monitoring, vulnerability scanning, patch monitoring, and behavioral threat detection into one deployment. Rather than stitching together multiple point tools, Armor Agent consolidates core workload security into a unified agent managed through the Armor platform. Armor Agent is available in two tiers. The Free Tier covers up to 5 endpoints at no cost, with full malware and intrusion defense, vulnerability scanning, patch monitoring, and file integrity monitoring included. The Premium Tier adds security alerts, log search, threat intelligence, threat hunting, dedicated support, and 24×7 SOC monitoring at $99/month per endpoint with no endpoint limit. Both tiers support compliance requirements for HIPAA, PCI DSS, HITRUST, and ISO frameworks. Get started with the Free Tier at https://www.armor.com/free/armor-agent


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Governance:** 10.0/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.8/10 (Category avg: 9.0/10)
- **API / Integrations:** 10.0/10 (Category avg: 8.6/10)
- **Security Auditing:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Armor](https://www.g2.com/sellers/armor)
- **Year Founded:** 2009
- **HQ Location:** Plano, Texas
- **Twitter:** @Armor (9,759 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/333863/ (211 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 83% Small-Business, 17% Mid-Market


### 19. [Calico](https://www.g2.com/products/calico-2025-10-31/reviews)
  The Calico platform, built on the most trusted open-source technologies in Kubernetes — Calico Open Source, Istio, Envoy, and eBPF — provides a single management plane for secure networking and observability for AI workloads. It can be deployed as Calico Cloud, a fully-managed SaaS platform, or Calico Enterprise, a self-managed platform. Calico works with popular managed Kubernetes services such as AKS, EKS, and GKE, as well as self-managed Kubernetes distributions including Red Hat OpenShift, SUSE/Rancher, VMware Tanzu, and Mirantis. Calico is the only platform with a pluggable data plane architecture enabling support for multiple data planes, including eBPF, nftables, standard Linux, VPP, and Windows. Calico secures 1 million+ clusters daily, and is used by leading companies, including NVIDIA, RBC, Bloomberg, Chipotle, GoDaddy, and Upwork.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 42

**User Satisfaction Scores:**

- **Governance:** 8.8/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.9/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.3/10 (Category avg: 8.6/10)
- **Security Auditing:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Tigera](https://www.g2.com/sellers/tigera)
- **Company Website:** https://www.tigera.io
- **Year Founded:** 2016
- **HQ Location:** San Jose, CA
- **Twitter:** @tigeraio (1,959 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10614868 (129 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 36% Enterprise, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (19 reviews)
- Security (15 reviews)
- Customer Support (14 reviews)
- Features (11 reviews)
- Policy Management (11 reviews)

**Cons:**

- Complex Setup (7 reviews)
- Complexity (6 reviews)
- Difficult Configuration (6 reviews)
- Difficult Learning (6 reviews)
- Difficult Setup (6 reviews)

### 20. [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews)
  FortiCNAPP (formerly Lacework) is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire application lifecycle—from development to runtime—it combines posture management, workload protection, identity security, and threat detection into one integrated platform. By leveraging machine learning and behavioral analytics, FortiCNAPP helps security teams detect unknown threats, reduce noise, and accelerate response. Integrated with the Fortinet Security Fabric, it provides full-stack visibility across cloud, network, and endpoint environments—empowering teams to operate with confidence, reduce complexity, and scale securely.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 383

**User Satisfaction Scores:**

- **Governance:** 8.6/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.6/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.2/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Company Website:** https://www.fortinet.com
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Security Analyst
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 62% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Security (8 reviews)
- Vulnerability Detection (7 reviews)
- Alert Management (6 reviews)
- Cloud Security (6 reviews)
- Ease of Use (6 reviews)

**Cons:**

- Difficult Setup (5 reviews)
- Poor Documentation (5 reviews)
- Complex Setup (4 reviews)
- Setup Difficulty (4 reviews)
- Complex Configuration (3 reviews)

### 21. [Smart UPS](https://www.g2.com/products/smart-ups/reviews)
  APC&#39;s next-generation Connected Smart-UPS \* is a time-saving, resource-saving innovation, making it easier to deploy, maintain, and monitor your power infrastructure - so you can focus on your business.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Governance:** 6.5/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.0/10 (Category avg: 9.0/10)
- **API / Integrations:** 6.4/10 (Category avg: 8.6/10)
- **Security Auditing:** 7.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [APC](https://www.g2.com/sellers/apc)
- **Year Founded:** 1981
- **HQ Location:** Rueil-Malmaison, Île-de-France
- **Twitter:** @APCbySchneider (14,134 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2795/ (4,181 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 47% Mid-Market, 35% Small-Business


#### Pros & Cons

**Pros:**

- Installation Ease (1 reviews)

**Cons:**

- Expensive (1 reviews)

### 22. [Qualys VMDR](https://www.g2.com/products/qualys-vmdr/reviews)
  Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable steps to reduce risk. It also gives cybersecurity and IT teams a shared platform to collaborate, and the power to quickly align and automate no-code workflows to respond to threats with automated remediation and integrations with ITSM solutions such as ServiceNow.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 164

**User Satisfaction Scores:**

- **Governance:** 8.1/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.6/10 (Category avg: 9.0/10)
- **API / Integrations:** 7.8/10 (Category avg: 8.6/10)
- **Security Auditing:** 7.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Qualys](https://www.g2.com/sellers/qualys)
- **Year Founded:** 1999
- **HQ Location:** Foster City, CA
- **Twitter:** @qualys (34,180 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/8561/ (3,564 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Enterprise, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (2 reviews)
- Features (2 reviews)
- Vulnerability Detection (2 reviews)
- Vulnerability Identification (2 reviews)
- Alerting System (1 reviews)

**Cons:**

- Complexity (2 reviews)
- Complex Reporting (1 reviews)
- Complex Setup (1 reviews)
- Difficult Learning (1 reviews)
- Feature Complexity (1 reviews)

### 23. [Zscaler Zero Trust Cloud](https://www.g2.com/products/zscaler-zero-trust-cloud/reviews)
  Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 37

**User Satisfaction Scores:**

- **Governance:** 6.7/10 (Category avg: 8.7/10)
- **Ease of Admin:** 8.4/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,513 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)
- **Ownership:** NASDAQ:ZS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 52% Enterprise, 29% Small-Business


#### Pros & Cons

**Pros:**

- Security (5 reviews)
- Threat Detection (4 reviews)
- Ease of Use (3 reviews)
- Protection (3 reviews)
- Threat Protection (3 reviews)

**Cons:**

- Access Control (1 reviews)
- Complex Configuration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Difficult Configuration (1 reviews)

### 24. [Illumio](https://www.g2.com/products/illumio/reviews)
   Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications, and isolate high-value assets to stop breaches and ransomware from spreading.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 31

**User Satisfaction Scores:**

- **Governance:** 9.4/10 (Category avg: 8.7/10)
- **Ease of Admin:** 9.4/10 (Category avg: 9.0/10)
- **API / Integrations:** 8.9/10 (Category avg: 8.6/10)
- **Security Auditing:** 9.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Illumio](https://www.g2.com/sellers/illumio)
- **Company Website:** https://www.illumio.com/
- **Year Founded:** 2013
- **HQ Location:** Sunnyvale, California
- **Twitter:** @illumio (3,415 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/illumio/ (854 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 44% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Security (5 reviews)
- Centralized Management (3 reviews)
- Implementation Ease (3 reviews)
- Installation Ease (3 reviews)

**Cons:**

- Difficult Learning Curve (2 reviews)
- Integration Issues (2 reviews)
- Compatibility Issues (1 reviews)
- Difficult Learning (1 reviews)
- Expensive (1 reviews)

### 25. [Symantec Cloud Workload Protection](https://www.g2.com/products/symantec-symantec-cloud-workload-protection/reviews)
  Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 11

**User Satisfaction Scores:**

- **Ease of Admin:** 10.0/10 (Category avg: 9.0/10)
- **API / Integrations:** 10.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Company Size:** 58% Mid-Market, 25% Small-Business




## Parent Category

[Cloud Security Software](https://www.g2.com/categories/cloud-security)



## Related Categories

- [Container Security Tools](https://www.g2.com/categories/container-security-tools)
- [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance)
- [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm)



---

## Buyer Guide

### What You Should Know About Cloud Workload Protection Platforms 

### What are Cloud Workload Protection Platforms?

Cloud workload protection is not a very intuitive term and likely sounds alien to people who do not operate cloud infrastructure. However, individuals that work frequently with cloud infrastructure are probably somewhat familiar with cloud workload protection. For context, cloud workload protection is typically described as a family of workload-centric security solutions designed to secure on-premises, physical, and virtual servers along with a range of [infrastructure as a service (IaaS) providers](https://www.g2.com/categories/infrastructure-as-a-service-iaas) and applications. Cloud workload protection platforms are an evolution of endpoint protection solutions designed specifically for server workloads.

Cloud workload protection solutions provide users with automated discovery and broad visibility of workloads deployed across cloud service providers. In addition to providing visibility, these tools protect individual workloads with malware protection, [vulnerability scanning](https://www.g2.com/categories/vulnerability-scanner), access control, and anomaly detection features. Malware and vulnerability scanning are often paired with automated remediation or patching features to simplify and scale workload management. The platforms also provide access control through privilege management and micro-segmentation. However, their most interesting feature might be behavior monitoring powered by [machine learning](https://www.g2.com/categories/machine-learning) that discovers errors or unexpected changes. This makes it harder for threat actors and nefarious insiders to alter workloads, policies, or privileges. Once detected, access can be automatically restricted and reverted to its previous state.

**Key Benefits of Cloud Workload Protection Platforms**

- Complete visibility of workloads in the cloud
- Automated threat detection and response
- Custom protection for unique servers and workloads
- Workload, application, and infrastructure hardening

### Why Use Cloud Workload Protection Platforms?

Cloud workload protection platforms provide numerous benefits, the most important being automated scaling, workload hardening, cross-cloud security management, anomaly detection, and response functionality.

**Automation and efficiency —** Cloud workload protection platforms automate a number of security operations related to the cloud. The first is discovery; after workloads are discovered, these platforms scale to protect large numbers of workloads and identify their unique security requirements. These platforms automatically detect new workloads and scan them for vulnerabilities. They can also automate the detection and response of security incidents.

Automation can save significant time for security teams, especially those that are tasked with protecting DevOps pipelines. These environments are constantly changing and need adaptable security solutions to protect them no matter their state. Some automation features may only be available through APIs and other integrations, but nonetheless simplify numerous tasks for IT professionals, engineers, and security teams.

**Multicloud management —** No two multicloud environments are alike. Multicloud architectures are complex, intricate environments that span across on-premises servers and cloud providers to deliver powerful, scalable, and secure infrastructure. Still, their inherent complexity can [present challenges to security teams](https://research.g2.com/insights/challenges-of-multicloud-solution-management-and-security). Each workload has its own requirements and cloud workload protection platforms provide a single pane of glass and automated discovery to ensure no workload goes unprotected or unnoticed.

Different workloads may run on different operating systems or possess different compliance requirements. Regardless of the countless variations in security needs, these platforms can adapt to changes and enable highly customizable policy enforcement to protect a wide range of workloads.

**Monitoring and detection —** Workload discovery is not the only monitoring feature provided by cloud workload protection platforms. Their most important monitoring capability is behavioral monitoring used to detect changes, misuse, and other anomalies automatically. These platforms can harden workloads by detecting exploits, scanning for vulnerabilities, and providing next-generation firewalls. Still, prevention is only the first phase of cybersecurity. Once protection is in place, baselines must be measured and privileges must be distributed.

Any activity deviating from the established baselines should be detected and administrators should be alerted. Depending on the nature of the threat, various response workflows can be established to remedy the issue. Servers might require endpoint detection and response while applications require processes to be blocked. Regardless of the issue, threats should be modeled and workflows should be designed accordingly.

### What are the Common Features of Cloud Workload Protection Platforms?

Cloud workload protection platforms can provide a wide range of features, but here are a few of the most common found in the market.

**Cloud gap analytics —** This feature analyzes data associated with denied entries and policy enforcement, giving information for better authentication and security protocols.

**Cloud registry —** Cloud registries detail the range of cloud service providers a product can integrate with and provide security for.

**Asset discovery —** Asset discovery features unveil applications in use and trends associated with traffic, access, and usage.

**Governance —** User provisioning and governance features allow users to create, edit, and relinquish user access privileges.

**Logging and reporting —** Log documentation and reporting provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

[**Data security**](https://www.g2.com/categories/data-security) **—** Data protection and security features help users manage policies for user data access and data encryption.

[**Data loss prevention (DLP)**](https://www.g2.com/categories/data-loss-prevention-dlp) **—** DLP stores data securely either on-premise or in an adjacent cloud database to prevent loss of data.

**Security auditing —** Auditing helps users analyze data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

**Anomaly detection —** Anomaly detection is conducted by constantly monitoring activity related to user behavior and compares activity to benchmarked patterns.

**Workload diversity —** Diverse workload support would imply a cloud security solution that supports a range of instance types from any number of cloud service providers.

**Analytics and** [**machine learning**](https://www.g2.com/categories/machine-learning) **—** Analytics and machine learning improve security and protection across workloads by automating network segmentation, malware protection, and incident response.

### Software and Services Related to Cloud Workload Protection Platforms

These technology families are either closely related to cloud workload protection platforms or there is a significant overlap between products.

[**Endpoint detection and response (EDR) software**](https://www.g2.com/categories/endpoint-detection-response-edr) **—** EDR software is used to protect devices such as servers, laptops, and mobile devices from threats, discover security incidents, and automate their resolution. This concept is mirrored with cloud workload protection platforms, but those tools are not designed to protect cloud workloads. They may be able to resolve server issues or other minor incidents, but do not provide scalable cloud-based workload protection or policy management functionality.

[**Data center security software**](https://www.g2.com/categories/data-center-security) **—** While data centers are commonly used to power cloud services and applications, data center security software is not designed for managing and securing multicloud environments. These tools have similar workload protection features, but they are limited to individual data centers or groups of servers running on-premises. Securing a multicloud architecture requires significant adaptability and diverse workload support across numerous services and providers.

[**Cloud management platforms**](https://www.g2.com/categories/cloud-management-platforms) **—** Cloud management platforms are tools used to provide a single pane of glass for multicloud environments. There is some overlap between cloud management and workload protection platforms, but most of them do not provide the same level of protection and incident response functionality as cloud workload protection platforms. Instead, they may integrate with additional security tools or simply monitor their activity without providing the means to resolve issues as they arise.

[**Cloud compliance software**](https://www.g2.com/categories/cloud-compliance) **—** Cloud compliance software is used to ensure data, workloads, APIs and other cloud services are properly protecting sensitive information and abiding by established regulations. While they can be used to protect workloads and discover services, they don’t have the same runtime-level or workload-centric protection features such as vulnerability scanning, malware protection, virtual firewall, or intrusion detection.




