Introducing G2.ai, the future of software buying.Try now

Best Container Security Tools - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Container security tools are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discovering zero-day vulnerabilities, and simulating attacks from common threat sources.

Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

To qualify for inclusion in the Container Security category, a product must:

Integrate security with DevOps tools
Monitor and secure container networks or pipelines
Enforce access and security policies
Provide runtime protection capabilities
Show More
Show Less

Featured Container Security Tools At A Glance

Free Plan Available:
Aikido Security
Sponsored
Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Container Security Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
73 Listings in Container Security Available
(123)4.5 out of 5
View top Consulting Services for Snyk
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snyk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    3
    Integrations
    3
    Integration Support
    3
    Version Control
    3
    Git Integration
    2
    Cons
    Complex Configuration
    2
    Alert Overload
    1
    Bugs
    1
    Command Line Difficulty
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snyk features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    7.9
    Security Auditing
    Average: 8.2
    6.9
    Network Segmentation
    Average: 7.8
    7.4
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    20,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 37% Small-Business
Snyk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
3
Integrations
3
Integration Support
3
Version Control
3
Git Integration
2
Cons
Complex Configuration
2
Alert Overload
1
Bugs
1
Command Line Difficulty
1
Complexity
1
Snyk features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
7.9
Security Auditing
Average: 8.2
6.9
Network Segmentation
Average: 7.8
7.4
Workload Protection
Average: 7.9
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
20,097 Twitter followers
LinkedIn® Page
www.linkedin.com
1,221 employees on LinkedIn®
(10)4.9 out of 5
9th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudanix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    5
    Ease of Use
    5
    Features
    5
    Cloud Technology
    4
    Customer Support
    4
    Cons
    Lack of Customization
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudanix features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security Auditing
    Average: 8.2
    8.1
    Network Segmentation
    Average: 7.8
    9.6
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cloudanix
    Year Founded
    2020
    HQ Location
    Sunnyvale, CA
    Twitter
    @cloudanix
    104 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Small-Business
Cloudanix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
5
Ease of Use
5
Features
5
Cloud Technology
4
Customer Support
4
Cons
Lack of Customization
1
Limited Customization
1
Cloudanix features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security Auditing
Average: 8.2
8.1
Network Segmentation
Average: 7.8
9.6
Workload Protection
Average: 7.9
Seller Details
Seller
Cloudanix
Year Founded
2020
HQ Location
Sunnyvale, CA
Twitter
@cloudanix
104 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security integrated into DevOps. Protect containers in development and operations.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Small-Business
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Container Security features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Security Auditing
    Average: 8.2
    8.8
    Network Segmentation
    Average: 7.8
    9.3
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Security integrated into DevOps. Protect containers in development and operations.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Small-Business
  • 40% Mid-Market
Tenable Container Security features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.0
9.0
Security Auditing
Average: 8.2
8.8
Network Segmentation
Average: 7.8
9.3
Workload Protection
Average: 7.9
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,329 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB
(95)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

    Users
    • CEO
    • CTO
    Industries
    • Mechanical or Industrial Engineering
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 42% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wallarm API Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    2
    Security
    2
    Threat Detection
    2
    API Deployment
    1
    Cloud Integration
    1
    Cons
    API Issues
    1
    Expensive
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wallarm API Security Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Security Auditing
    Average: 8.2
    9.6
    Network Segmentation
    Average: 7.8
    10.0
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wallarm
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, California
    Twitter
    @wallarm
    3,218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

Users
  • CEO
  • CTO
Industries
  • Mechanical or Industrial Engineering
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 42% Small-Business
Wallarm API Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
2
Security
2
Threat Detection
2
API Deployment
1
Cloud Integration
1
Cons
API Issues
1
Expensive
1
Pricing Issues
1
Wallarm API Security Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.7
Security Auditing
Average: 8.2
9.6
Network Segmentation
Average: 7.8
10.0
Workload Protection
Average: 7.9
Seller Details
Seller
Wallarm
Company Website
Year Founded
2016
HQ Location
San Francisco, California
Twitter
@wallarm
3,218 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®
(44)4.5 out of 5
13th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ARMO Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    24
    Ease of Use
    23
    Features
    20
    Comprehensive Security
    15
    Vulnerability Detection
    15
    Cons
    Learning Curve
    11
    Integration Issues
    10
    Difficult Learning
    8
    Complex Setup
    6
    Difficult Setup
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.2
    7.9
    Network Segmentation
    Average: 7.8
    9.2
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,130 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    80 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
ARMO Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
24
Ease of Use
23
Features
20
Comprehensive Security
15
Vulnerability Detection
15
Cons
Learning Curve
11
Integration Issues
10
Difficult Learning
8
Complex Setup
6
Difficult Setup
6
ARMO Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.2
7.9
Network Segmentation
Average: 7.8
9.2
Workload Protection
Average: 7.9
Seller Details
Seller
ARMO
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,130 Twitter followers
LinkedIn® Page
www.linkedin.com
80 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Mend.io Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Cloud Integration
    2
    Customer Support
    2
    Easy Integrations
    2
    Integration Support
    2
    Cons
    Integration Issues
    2
    Expensive
    1
    False Positives
    1
    Insufficient Information
    1
    Lack of Clarity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mend.io features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.8
    7.5
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mend
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts
    Twitter
    @Mend_io
    11,405 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    289 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Mend.io Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Cloud Integration
2
Customer Support
2
Easy Integrations
2
Integration Support
2
Cons
Integration Issues
2
Expensive
1
False Positives
1
Insufficient Information
1
Lack of Clarity
1
Mend.io features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.8
7.5
Workload Protection
Average: 7.9
Seller Details
Seller
Mend
Year Founded
2011
HQ Location
Boston, Massachusetts
Twitter
@Mend_io
11,405 Twitter followers
LinkedIn® Page
www.linkedin.com
289 employees on LinkedIn®
(87)4.7 out of 5
12th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    Security Auditing
    Average: 8.2
    8.5
    Network Segmentation
    Average: 7.8
    7.9
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,642 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
Security Auditing
Average: 8.2
8.5
Network Segmentation
Average: 7.8
7.9
Workload Protection
Average: 7.9
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,642 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Distributed Cloud AIP, formerly known as Threat Stack, is the leader in cloud security and compliance for application infrastructures, helping companies securely leverage the business benefits of the

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 70% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 Distributed Cloud App Infrastructure Protection (AIP) features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.8
    6.7
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,394 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,153 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Distributed Cloud AIP, formerly known as Threat Stack, is the leader in cloud security and compliance for application infrastructures, helping companies securely leverage the business benefits of the

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 70% Mid-Market
  • 20% Small-Business
F5 Distributed Cloud App Infrastructure Protection (AIP) features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
7.5
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.8
6.7
Workload Protection
Average: 7.9
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,394 Twitter followers
LinkedIn® Page
www.linkedin.com
6,153 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

    Users
    • Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VMDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Features
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Alerting System
    1
    Cons
    Complexity
    2
    Complex Reporting
    1
    Complex Setup
    1
    Difficult Learning
    1
    Feature Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VMDR features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.8
    7.5
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,189 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

Users
  • Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 28% Mid-Market
Qualys VMDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Features
2
Vulnerability Detection
2
Vulnerability Identification
2
Alerting System
1
Cons
Complexity
2
Complex Reporting
1
Complex Setup
1
Difficult Learning
1
Feature Complexity
1
Qualys VMDR features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.8
7.5
Workload Protection
Average: 7.9
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,189 Twitter followers
LinkedIn® Page
www.linkedin.com
3,393 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 62% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetScaler Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Management
    1
    Ease of Use
    1
    Efficiency
    1
    Management Ease
    1
    Management Efficiency
    1
    Cons
    Expensive
    1
    Expensive Licensing
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetScaler features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @cloudsoftware
    118 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,165 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 62% Enterprise
  • 29% Mid-Market
NetScaler Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Management
1
Ease of Use
1
Efficiency
1
Management Ease
1
Management Efficiency
1
Cons
Expensive
1
Expensive Licensing
1
NetScaler features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Fort Lauderdale, FL
Twitter
@cloudsoftware
118 Twitter followers
LinkedIn® Page
www.linkedin.com
10,165 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more tha

    Users
    • Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 47% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlgoSec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Features
    5
    Risk Management
    5
    User Interface
    5
    Visibility
    5
    Cons
    Integration Issues
    5
    Difficult Setup
    4
    Complex Setup
    3
    Difficult Configuration
    3
    Feature Complexity
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlgoSec features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.1
    Security Auditing
    Average: 8.2
    7.8
    Network Segmentation
    Average: 7.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AlgoSec
    Year Founded
    2004
    HQ Location
    Ridgefield Park, New Jersey
    Twitter
    @AlgoSec
    2,437 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    544 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more tha

Users
  • Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 47% Enterprise
  • 31% Mid-Market
AlgoSec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Features
5
Risk Management
5
User Interface
5
Visibility
5
Cons
Integration Issues
5
Difficult Setup
4
Complex Setup
3
Difficult Configuration
3
Feature Complexity
3
AlgoSec features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 9.0
8.1
Security Auditing
Average: 8.2
7.8
Network Segmentation
Average: 7.8
0.0
No information available
Seller Details
Seller
AlgoSec
Year Founded
2004
HQ Location
Ridgefield Park, New Jersey
Twitter
@AlgoSec
2,437 Twitter followers
LinkedIn® Page
www.linkedin.com
544 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Conjur features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.2
    10.0
    Network Segmentation
    Average: 7.8
    8.3
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,642 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,948 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Enterprise
  • 29% Mid-Market
CyberArk Conjur features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.2
10.0
Network Segmentation
Average: 7.8
8.3
Workload Protection
Average: 7.9
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,642 Twitter followers
LinkedIn® Page
www.linkedin.com
4,948 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 69% Enterprise
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ExtraHop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    All-in-One Solution
    1
    Comprehensive Monitoring
    1
    Easy Deployment
    1
    Responsive Support
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,841 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    761 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 69% Enterprise
  • 26% Mid-Market
ExtraHop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
All-in-One Solution
1
Comprehensive Monitoring
1
Easy Deployment
1
Responsive Support
1
Cons
This product has not yet received any negative sentiments.
ExtraHop features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,841 Twitter followers
LinkedIn® Page
www.linkedin.com
761 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWorx features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.8
    5.0
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    LOS GATOS, US
    Twitter
    @threatwatch
    101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWorx is a next-gen proactive cybersecurity platform that protects servers, cloud, containers and source code from malware and vulnerabilities without scanner appliances or bulky agents. ThreatWo

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
ThreatWorx features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.8
5.0
Workload Protection
Average: 7.9
Seller Details
Year Founded
2016
HQ Location
LOS GATOS, US
Twitter
@threatwatch
101 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NeuVector, the leader in full lifecycle container security, empowers global organizations to comprehensively secure their container infrastructures without compromising business velocity. For security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 17% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NeuVector features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Security Auditing
    Average: 8.2
    9.2
    Network Segmentation
    Average: 7.8
    7.8
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NeuVector
    Year Founded
    1992
    HQ Location
    Nuremberg, Bavaria, Germany
    Twitter
    @NeuVector
    707 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,680 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NeuVector, the leader in full lifecycle container security, empowers global organizations to comprehensively secure their container infrastructures without compromising business velocity. For security

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 17% Enterprise
NeuVector features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
6.7
Security Auditing
Average: 8.2
9.2
Network Segmentation
Average: 7.8
7.8
Workload Protection
Average: 7.9
Seller Details
Seller
NeuVector
Year Founded
1992
HQ Location
Nuremberg, Bavaria, Germany
Twitter
@NeuVector
707 Twitter followers
LinkedIn® Page
www.linkedin.com
2,680 employees on LinkedIn®