Introducing G2.ai, the future of software buying.Try now

Best Container Security Tools for Small Business

Lauren Worth
LW
Researched and written by Lauren Worth

Products classified in the overall Container Security category are similar in many regards and help companies of all sizes solve their business problems. However, small business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Small Business Container Security to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Small Business Container Security category.

In addition to qualifying for inclusion in the Container Security Tools category, to qualify for inclusion in the Small Business Container Security Tools category, a product must have at least 10 reviews left by a reviewer from a small business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

10 Listings in Small Business Container Security Available

(111)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig unique

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 46% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    35
    Vulnerability Detection
    35
    Threat Detection
    31
    Detection Efficiency
    30
    Features
    25
    Cons
    Feature Limitations
    13
    Missing Features
    10
    Complexity
    9
    Learning Curve
    8
    Difficult Learning
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Security Auditing
    Average: 8.2
    9.1
    Network Segmentation
    Average: 7.9
    9.4
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,213 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig unique

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 46% Enterprise
  • 40% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
35
Vulnerability Detection
35
Threat Detection
31
Detection Efficiency
30
Features
25
Cons
Feature Limitations
13
Missing Features
10
Complexity
9
Learning Curve
8
Difficult Learning
7
Sysdig Secure features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.6
Security Auditing
Average: 8.2
9.1
Network Segmentation
Average: 7.9
9.4
Workload Protection
Average: 8.0
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,213 Twitter followers
LinkedIn® Page
www.linkedin.com
658 employees on LinkedIn®
(109)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido hel

    Users
    • CTO
    • Founder
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 76% Small-Business
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aikido Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Security
    48
    Features
    44
    Easy Integrations
    38
    Easy Setup
    36
    Cons
    Missing Features
    14
    Limited Features
    11
    Lacking Features
    10
    Pricing Issues
    10
    Expensive
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Security Auditing
    Average: 8.2
    7.6
    Network Segmentation
    Average: 7.9
    10.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    4,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido hel

Users
  • CTO
  • Founder
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 76% Small-Business
  • 20% Mid-Market
Aikido Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Security
48
Features
44
Easy Integrations
38
Easy Setup
36
Cons
Missing Features
14
Limited Features
11
Lacking Features
10
Pricing Issues
10
Expensive
9
Aikido Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.0
Security Auditing
Average: 8.2
7.6
Network Segmentation
Average: 7.9
10.0
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
4,097 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(753)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Container Security software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    127
    Features
    123
    Security
    117
    Visibility
    98
    Easy Setup
    86
    Cons
    Improvement Needed
    39
    Learning Curve
    39
    Feature Limitations
    38
    Improvements Needed
    35
    Missing Features
    31
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.1
    Security Auditing
    Average: 8.2
    7.7
    Network Segmentation
    Average: 7.9
    8.0
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    20,019 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 39% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
127
Features
123
Security
117
Visibility
98
Easy Setup
86
Cons
Improvement Needed
39
Learning Curve
39
Feature Limitations
38
Improvements Needed
35
Missing Features
31
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.1
Security Auditing
Average: 8.2
7.7
Network Segmentation
Average: 7.9
8.0
Workload Protection
Average: 8.0
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
20,019 Twitter followers
LinkedIn® Page
www.linkedin.com
3,109 employees on LinkedIn®
(126)4.5 out of 5
View top Consulting Services for Snyk
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snyk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    4
    Integrations
    4
    Integration Support
    3
    Vulnerability Detection
    3
    Vulnerability Identification
    3
    Cons
    False Positives
    3
    Software Bugs
    3
    Complex Configuration
    2
    Poor Interface Design
    2
    Scanning Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snyk features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.1
    7.9
    Security Auditing
    Average: 8.2
    6.9
    Network Segmentation
    Average: 7.9
    7.4
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    20,122 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,210 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Mid-Market
  • 37% Small-Business
Snyk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
4
Integrations
4
Integration Support
3
Vulnerability Detection
3
Vulnerability Identification
3
Cons
False Positives
3
Software Bugs
3
Complex Configuration
2
Poor Interface Design
2
Scanning Issues
2
Snyk features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.1
7.9
Security Auditing
Average: 8.2
6.9
Network Segmentation
Average: 7.9
7.4
Workload Protection
Average: 8.0
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
20,122 Twitter followers
LinkedIn® Page
www.linkedin.com
1,210 employees on LinkedIn®
(47)4.8 out of 5
Optimized for quick response
5th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Chainguard Containers are a guarded catalog of minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for critical severity, 14 days for high, medium and low) that helps c

    Users
    No information available
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 43% Enterprise
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Chainguard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Customer Support
    8
    Security
    8
    Comprehensive Security
    5
    Container Security
    5
    Cons
    Pricing Issues
    3
    Difficult Learning
    2
    Integration Issues
    2
    Missing Features
    2
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chainguard features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    8.7
    Security Auditing
    Average: 8.2
    7.4
    Network Segmentation
    Average: 7.9
    8.4
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    Kirkland, WA
    Twitter
    @chainguard_dev
    6,161 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    585 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Chainguard Containers are a guarded catalog of minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for critical severity, 14 days for high, medium and low) that helps c

Users
No information available
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 43% Enterprise
  • 30% Small-Business
Chainguard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Customer Support
8
Security
8
Comprehensive Security
5
Container Security
5
Cons
Pricing Issues
3
Difficult Learning
2
Integration Issues
2
Missing Features
2
Authentication Issues
1
Chainguard features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.1
8.7
Security Auditing
Average: 8.2
7.4
Network Segmentation
Average: 7.9
8.4
Workload Protection
Average: 8.0
Seller Details
Company Website
Year Founded
2021
HQ Location
Kirkland, WA
Twitter
@chainguard_dev
6,161 Twitter followers
LinkedIn® Page
www.linkedin.com
585 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mend.io Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Cloud Integration
    1
    Easy Integrations
    1
    Integration Support
    1
    Remediation Solutions
    1
    Cons
    Expensive
    1
    Integration Issues
    1
    Limited Cloud Integration
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mend.io features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.1
    9.1
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.9
    7.5
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mend
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts
    Twitter
    @Mend_io
    11,360 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    280 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Mend.io Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Cloud Integration
1
Easy Integrations
1
Integration Support
1
Remediation Solutions
1
Cons
Expensive
1
Integration Issues
1
Limited Cloud Integration
1
Pricing Issues
1
Mend.io features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.1
9.1
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.9
7.5
Workload Protection
Average: 8.0
Seller Details
Seller
Mend
Company Website
Year Founded
2011
HQ Location
Boston, Massachusetts
Twitter
@Mend_io
11,360 Twitter followers
LinkedIn® Page
www.linkedin.com
280 employees on LinkedIn®
(383)4.4 out of 5
Optimized for quick response
15th Easiest To Use in Container Security software
View top Consulting Services for FortiCNAPP
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiCNAPP (formerly Lacework) is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire

    Users
    • Security Engineer
    • Security Analyst
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiCNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Security Insights
    7
    Vulnerability Detection
    7
    Alert Management
    6
    Ease of Use
    6
    Cons
    Difficult Setup
    3
    Insufficient Information
    3
    Poor Documentation
    3
    Setup Difficulty
    3
    Complex Configuration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiCNAPP features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Security Auditing
    Average: 8.2
    7.9
    Network Segmentation
    Average: 7.9
    8.5
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,446 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,801 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FortiCNAPP (formerly Lacework) is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire

Users
  • Security Engineer
  • Security Analyst
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
FortiCNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Security Insights
7
Vulnerability Detection
7
Alert Management
6
Ease of Use
6
Cons
Difficult Setup
3
Insufficient Information
3
Poor Documentation
3
Setup Difficulty
3
Complex Configuration
2
FortiCNAPP features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.1
8.8
Security Auditing
Average: 8.2
7.9
Network Segmentation
Average: 7.9
8.5
Workload Protection
Average: 8.0
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,446 Twitter followers
LinkedIn® Page
www.linkedin.com
15,801 employees on LinkedIn®
(44)4.5 out of 5
13th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ARMO Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    24
    Ease of Use
    23
    Features
    20
    Comprehensive Security
    15
    Vulnerability Detection
    15
    Cons
    Learning Curve
    11
    Integration Issues
    10
    Difficult Learning
    8
    Complex Setup
    6
    Difficult Setup
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Security Auditing
    Average: 8.2
    7.9
    Network Segmentation
    Average: 7.9
    9.2
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,118 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    80 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
ARMO Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
24
Ease of Use
23
Features
20
Comprehensive Security
15
Vulnerability Detection
15
Cons
Learning Curve
11
Integration Issues
10
Difficult Learning
8
Complex Setup
6
Difficult Setup
6
ARMO Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.1
9.2
Security Auditing
Average: 8.2
7.9
Network Segmentation
Average: 7.9
9.2
Workload Protection
Average: 8.0
Seller Details
Seller
ARMO
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,118 Twitter followers
LinkedIn® Page
www.linkedin.com
80 employees on LinkedIn®
(42)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Calico Cloud is a fully-managed SaaS platform that provides unified networking, network security, and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is buil

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 36% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Calico Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Policy Management
    6
    Security
    6
    Visibility
    5
    Customer Support
    4
    Cons
    Difficult Learning
    3
    Expertise Required
    3
    Complexity
    2
    Complex UI
    2
    Complex Usability
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Calico features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Security Auditing
    Average: 8.2
    9.3
    Network Segmentation
    Average: 7.9
    8.8
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tigera
    Company Website
    Year Founded
    2016
    HQ Location
    San Jose, CA
    Twitter
    @tigeraio
    1,964 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    130 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Calico Cloud is a fully-managed SaaS platform that provides unified networking, network security, and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is buil

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 36% Mid-Market
  • 36% Enterprise
Calico Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Policy Management
6
Security
6
Visibility
5
Customer Support
4
Cons
Difficult Learning
3
Expertise Required
3
Complexity
2
Complex UI
2
Complex Usability
2
Calico features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
8.9
Security Auditing
Average: 8.2
9.3
Network Segmentation
Average: 7.9
8.8
Workload Protection
Average: 8.0
Seller Details
Seller
Tigera
Company Website
Year Founded
2016
HQ Location
San Jose, CA
Twitter
@tigeraio
1,964 Twitter followers
LinkedIn® Page
www.linkedin.com
130 employees on LinkedIn®
(87)4.7 out of 5
12th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    0.0
    Security Auditing
    Average: 8.2
    8.5
    Network Segmentation
    Average: 7.9
    7.9
    Workload Protection
    Average: 8.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,587 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.1
0.0
Security Auditing
Average: 8.2
8.5
Network Segmentation
Average: 7.9
7.9
Workload Protection
Average: 8.0
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,587 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®