Star Rating
Languages Supported
Pricing Options

Container Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Best Container Security Software

    Container security software is used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

    Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discover zero-day vulnerabilities, and simulate attacks from common threat sources.

    Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

    To qualify for inclusion in the Container Security category, a product must:

    Integrate security with DevOps tools
    Monitor and secure container networks or pipelines
    Enforce access and security policies
    Provide runtime protection capabilities

    Top 6 Container Security Software

    • Dynatrace
    • Lacework
    • Sysdig Platform
    • StackRox
    • Qualys Cloud Platform.
    • Threat Stack

    Compare Container Security Software

    G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
    Sort By:
    Results: 33
    View Grid®
    Adv. Filters
    (1,020)4.5 out of 5
    Optimized for quick response

    Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation. With automatic and intelligent observability at scale, our all-in-one platform delivers precise answers about the performance of applications, the underlying infrastructure and the experience of all users to enable organizations to innovate faster, collaborate more efficiently, and deliver more value with dramatically less effort. That’s why many of the world’s largest enterprises trust D

    (24)4.6 out of 5

    Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.

    (25)4.5 out of 5
    Optimized for quick response
    Entry Level Price:$20 per host per month

    Sysdig is driving the secure DevOps movement, empowering organizations to confidently secure containers, Kubernetes and cloud services. With the Sysdig Secure DevOps Platform, cloud teams secure the build pipeline, detect and respond to runtime threats, continuously validate compliance, and monitor and troubleshoot cloud infrastructure and services. Sysdig is a SaaS platform, built on an open source stack that includes Falco and sysdig OSS, the open standards for runtime threat detection and res

    (12)5.0 out of 5

    StackRox helps enterprises secure their Kubernetes environments at scale. The StackRox Kubernetes Security Platform enables security and DevOps teams to enforce their compliance and security policies across the entire container life cycle, from build to deploy to runtime. StackRox integrates with existing DevOps and security tools, enabling teams to quickly operationalize container and Kubernetes security. StackRox customers span cloud-native startups, Global 2000 enterprises, and government age

    (58)4.1 out of 5

    Qualys' integrated approach to IT security and compliance enables organizations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively. Our solutions empower various roles within the organization to meet your unique requirements. Built on top of Qualys’ Infrastructure and Core Services, the Qualys Cloud Suite incorporates the following applications, all of which are delivered via the cloud: • AssetView • Vulnerability Management • Con

    (34)4.4 out of 5

    Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk identification and real-time threat detection across cloud workloads. The Threat Stack Cloud Security Platform® helps organizations improve operational efficiency by bridging the gap between security, development, and operations. By delivering full stack security observability across the cloud management con

    (49)4.4 out of 5
    Optimized for quick response
    Entry Level Price:$4,000+

    WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time. WhiteSource doesn’t only alert on issues, it also provides actionable, validated remediation paths to enable quick resolution and automated policy enforcement to speed up time-to-fix. It also helps you focus on what matters by prioritizing remed

    (21)4.7 out of 5
    Optimized for quick response

    Protect any API. In any environment. Against any threats. Wallarm is the platform Dev, Sec, and Ops teams choose to build cloud-native applications securely, monitor them for modern threats, and get alerted when threats arise. Whether you protect some of the legacy apps or brand new cloud-native APIs, Wallarm multi-cloud platform provides key components to secure your business against emerging threats. -> Robust protection for the entire application portfolio Mitigate threats against OWASP

    (6)4.0 out of 5

    (4)4.5 out of 5

    ThreatWatch is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWatch serves multiple use cases including threat intelligence, DevSecOps, cloud security, vulnerability management and third party risk assessment.

    (5)4.5 out of 5

    Open-source container vulnerability analysis service.

    (2)4.5 out of 5

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Security integrated into DevOps. Protect containers in development and operations.

    (1)5.0 out of 5

    Anchore, Inc., based in Santa Barbara, CA, was founded in 2016 by Saïd Ziouani and Daniel Nurmi to help organizations implement secure container-based workflows without compromising velocity. Anchore Enterprise is a complete container security workflow solution for professional teams. Integrating seamlessly with a wide variety of development tools and platforms, it allows teams to adhere to defined industry security standards. The Anchore Enterprise user interface provides visibility to securit

    (1)4.5 out of 5

    Aqua Security provides scalable security for the complete development-to-deployment lifecycle of containerized applications.

    (1)4.0 out of 5

    Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale.

    Portshift is a Kubernetes security leader, our innovative digital identity-based solution creates a unique, signed identity for each workload at the CI/CD pipeline stage, that is then used to enforce runtime security policies.

    (1)3.5 out of 5
    Optimized for quick response

    Twistlock is the world’s first truly comprehensive cloud native security platform - providing holistic coverage across hosts, containers, and serverless in a single platform. Twistlock is cloud-native and API-enabled itself, protecting all your workloads regardless of what underlying compute technology powers them.

    (18)4.4 out of 5

    Trend Micro Deep Security is designed to mprove visibility and simplify security management across physical, virtual, and cloud environments.

    0 ratings

    SECURE KUBERNETES & SERVICE MESH. ANYWHERE. Bridge Security & DevOps with code-to-production security for Kubernetes deployments

    0 ratings

    Capsule8 is the industry's only real-time, zero-day attack detection platform capable of scaling to massive production deployments.

    0 ratings

    Deepfence provides application layer intrusion prevention for modern workloads. Deepfence's Security as a Microservice gets deployed as a lightweight sidecar container on every host, and can be scaled and orchestrated in exactly the same manner as your other containers.

    0 ratings

    Deploy containers on a platform with more diverse PoP locations than centralized cloud providers, getting your workload closer to your end users and clients.

    0 ratings

    Define what activity is considered normal for your containerized applications & be notified when an application deviates.

    (19)4.5 out of 5


    0 ratings

    NeuVector delivers an application and network intelligent container security solution that automatically adapts to protect running containers.

    (3)3.8 out of 5

    Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when selecting from public repositories. Remediate known issues within the IDE. With integration to the most popular IDEs, developers can select the best components based on real-time intelligence and move to an approved version with one click. Nexus Lifecycle integrates with Eclipse, IntelliJ, and Visua

    0 ratings

    0 ratings

    Snyk Container empowers developers to easily find and fix vulnerabilities in containers and Kubernetes applications

    Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines

    Select Grid® View
    Select Company Size
    G2 Grid® for Container Security
    Filter Grid®
    Filter Grid®
    Select Grid® View
    Select Company Size
    Check out the G2 Grid® for the top Container Security Software products. G2 scores products and sellers based on reviews gathered from our user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on our proprietary G2 Grid®, which you can use to compare products, streamline the buying process, and quickly identify the best products based on the experiences of your peers.
    High Performers
    Qualys Cloud Platform.
    Sysdig Platform
    Threat Stack
    Market Presence