Introducing G2.ai, the future of software buying.Try now

Best Container Security Tools - Page 3

Lauren Worth
LW
Researched and written by Lauren Worth

Container security tools are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discovering zero-day vulnerabilities, and simulating attacks from common threat sources.

Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

To qualify for inclusion in the Container Security category, a product must:

Integrate security with DevOps tools
Monitor and secure container networks or pipelines
Enforce access and security policies
Provide runtime protection capabilities
Show More
Show Less

Featured Container Security Tools At A Glance

Free Plan Available:
Aikido Security
Sponsored
Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Container Security Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
73 Listings in Container Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AccuKnox Zero Trust CNAPP cloud security protects public and private clouds, Kubernetes and VMs. AccuKnox is a AI-powered Zero Trust Cloud Native Security Platform that helps organizations comply with

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AccuKnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    5
    Security
    4
    Cloud Integration
    3
    Compliance Management
    3
    Customer Support
    3
    Cons
    Difficult Learning
    3
    Complex Setup
    2
    Expensive
    2
    Poor Customer Support
    2
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AccuKnox features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Security Auditing
    Average: 8.2
    9.0
    Network Segmentation
    Average: 7.8
    9.0
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Accuknox
    Year Founded
    2020
    HQ Location
    California, USA
    Twitter
    @AccuKnox
    342 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    171 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AccuKnox Zero Trust CNAPP cloud security protects public and private clouds, Kubernetes and VMs. AccuKnox is a AI-powered Zero Trust Cloud Native Security Platform that helps organizations comply with

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 31% Mid-Market
AccuKnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
5
Security
4
Cloud Integration
3
Compliance Management
3
Customer Support
3
Cons
Difficult Learning
3
Complex Setup
2
Expensive
2
Poor Customer Support
2
Complexity
1
AccuKnox features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.7
Security Auditing
Average: 8.2
9.0
Network Segmentation
Average: 7.8
9.0
Workload Protection
Average: 7.9
Seller Details
Seller
Accuknox
Year Founded
2020
HQ Location
California, USA
Twitter
@AccuKnox
342 Twitter followers
LinkedIn® Page
www.linkedin.com
171 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOOS is the complete application security posture management platform. Scan your software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate an

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 50% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SOOS Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    3
    Accuracy of Findings
    2
    Cloud Integration
    2
    Easy Integrations
    2
    Cons
    Inadequate Reporting
    2
    Poor Reporting
    2
    Difficult Customization
    1
    Expensive
    1
    Improvement Needed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOOS features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.8
    8.3
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOOS
    Company Website
    Year Founded
    2019
    HQ Location
    Winooski, US
    Twitter
    @soostech
    50 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOOS is the complete application security posture management platform. Scan your software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate an

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 50% Mid-Market
  • 43% Small-Business
SOOS Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
3
Accuracy of Findings
2
Cloud Integration
2
Easy Integrations
2
Cons
Inadequate Reporting
2
Poor Reporting
2
Difficult Customization
1
Expensive
1
Improvement Needed
1
SOOS features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.8
8.3
Workload Protection
Average: 7.9
Seller Details
Seller
SOOS
Company Website
Year Founded
2019
HQ Location
Winooski, US
Twitter
@soostech
50 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Anchore, Inc., based in Santa Barbara, CA, was founded in 2016 by Saïd Ziouani and Daniel Nurmi to help organizations implement secure container-based workflows without compromising velocity. Anchore

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Anchore Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Vulnerability Scanning
    2
    Automation
    1
    Cloud Integration
    1
    Container Security
    1
    Cons
    Complex Setup
    1
    Learning Curve
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Anchore features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.2
    5.6
    Network Segmentation
    Average: 7.8
    6.1
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Anchore
    Year Founded
    2016
    HQ Location
    Santa Barbara, California, United States
    Twitter
    @anchore
    2,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    91 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Anchore, Inc., based in Santa Barbara, CA, was founded in 2016 by Saïd Ziouani and Daniel Nurmi to help organizations implement secure container-based workflows without compromising velocity. Anchore

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Anchore Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Vulnerability Scanning
2
Automation
1
Cloud Integration
1
Container Security
1
Cons
Complex Setup
1
Learning Curve
1
Poor Documentation
1
Anchore features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.2
5.6
Network Segmentation
Average: 7.8
6.1
Workload Protection
Average: 7.9
Seller Details
Seller
Anchore
Year Founded
2016
HQ Location
Santa Barbara, California, United States
Twitter
@anchore
2,803 Twitter followers
LinkedIn® Page
www.linkedin.com
91 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Security Smart Check – Container Image Security Protect your container images sooner with automated scanning for advanced security within your CI/CD pipeline

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Security Smart Check features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Security Auditing
    Average: 8.2
    6.7
    Network Segmentation
    Average: 7.8
    8.3
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Security Smart Check – Container Image Security Protect your container images sooner with automated scanning for advanced security within your CI/CD pipeline

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Deep Security Smart Check features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
7.5
Security Auditing
Average: 8.2
6.7
Network Segmentation
Average: 7.8
8.3
Workload Protection
Average: 7.9
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,953 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted b

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 52% Small-Business
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GuardRails Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    2
    Quality Improvement
    2
    Security
    2
    Threat Detection
    2
    Vulnerability Detection
    2
    Cons
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GuardRails features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security Auditing
    Average: 8.2
    0.0
    No information available
    10.0
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Singapore, Singapore
    Twitter
    @guardrailsio
    1,566 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted b

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 52% Small-Business
  • 48% Mid-Market
GuardRails Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
2
Quality Improvement
2
Security
2
Threat Detection
2
Vulnerability Detection
2
Cons
Missing Features
1
GuardRails features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security Auditing
Average: 8.2
0.0
No information available
10.0
Workload Protection
Average: 7.9
Seller Details
Year Founded
2017
HQ Location
Singapore, Singapore
Twitter
@guardrailsio
1,566 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styra are the creators and maintainers of Open Policy Agent and leaders in cloud-native authorization. Our mission at Styra is to provide unified authorization and policy across the cloud-native stack

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Styra features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Security Auditing
    Average: 8.2
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Styra
    Year Founded
    2016
    HQ Location
    Redwood City, California, United States
    Twitter
    @styrainc
    3,399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    55 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styra are the creators and maintainers of Open Policy Agent and leaders in cloud-native authorization. Our mission at Styra is to provide unified authorization and policy across the cloud-native stack

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Styra features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
6.7
Security Auditing
Average: 8.2
0.0
No information available
0.0
No information available
Seller Details
Seller
Styra
Year Founded
2016
HQ Location
Redwood City, California, United States
Twitter
@styrainc
3,399 Twitter followers
LinkedIn® Page
www.linkedin.com
55 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 53% Small-Business
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ActiveState Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Vancouver, BC
    Twitter
    @ActiveState
    4,036 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 53% Small-Business
  • 26% Mid-Market
ActiveState Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1997
HQ Location
Vancouver, BC
Twitter
@ActiveState
4,036 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Open-source container vulnerability analysis service.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CoreOS Clair features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Hat
    Year Founded
    1993
    HQ Location
    Raleigh, NC
    Twitter
    @RedHat
    297,275 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19,575 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Open-source container vulnerability analysis service.

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Small-Business
CoreOS Clair features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Red Hat
Year Founded
1993
HQ Location
Raleigh, NC
Twitter
@RedHat
297,275 Twitter followers
LinkedIn® Page
www.linkedin.com
19,575 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Define what activity is considered normal for your containerized applications & be notified when an application deviates.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falco Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Easy Integrations
    1
    Features
    1
    Security
    1
    Cons
    Complexity
    1
    Complex Setup
    1
    High Resource Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falco features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.0
    7.5
    Security Auditing
    Average: 8.2
    7.5
    Network Segmentation
    Average: 7.8
    7.5
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,214 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    660 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Define what activity is considered normal for your containerized applications & be notified when an application deviates.

Users
No information available
Industries
No information available
Market Segment
  • 33% Mid-Market
  • 33% Enterprise
Falco Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Easy Integrations
1
Features
1
Security
1
Cons
Complexity
1
Complex Setup
1
High Resource Usage
1
Falco features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.0
7.5
Security Auditing
Average: 8.2
7.5
Network Segmentation
Average: 7.8
7.5
Workload Protection
Average: 7.9
Seller Details
Seller
Sysdig
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,214 Twitter followers
LinkedIn® Page
www.linkedin.com
660 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Root is a cloud-native security company on a mission to fix vulnerabilities at scale in open source software. Its flagship offering, Root AVR, complements existing scanners by going beyond detection t

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Root Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Implementation
    1
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Cons
    Slow Performance
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Root features and usability ratings that predict user satisfaction
    0.0
    No information available
    5.0
    Security Auditing
    Average: 8.2
    0.0
    Network Segmentation
    Average: 7.8
    0.0
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Root
    Company Website
    Year Founded
    2024
    HQ Location
    Boston, Massachusetts, United States
    LinkedIn® Page
    www.linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Root is a cloud-native security company on a mission to fix vulnerabilities at scale in open source software. Its flagship offering, Root AVR, complements existing scanners by going beyond detection t

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Root Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Implementation
1
Ease of Use
1
Easy Integrations
1
Features
1
Cons
Slow Performance
1
Update Issues
1
Root features and usability ratings that predict user satisfaction
0.0
No information available
5.0
Security Auditing
Average: 8.2
0.0
Network Segmentation
Average: 7.8
0.0
Workload Protection
Average: 7.9
Seller Details
Seller
Root
Company Website
Year Founded
2024
HQ Location
Boston, Massachusetts, United States
LinkedIn® Page
www.linkedin.com
38 employees on LinkedIn®
(4)4.2 out of 5
View top Consulting Services for Sonatype Lifecycle
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sonatype Lifecycle features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sonatype
    Year Founded
    2008
    HQ Location
    Fulton, US
    Twitter
    @sonatype
    10,713 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    529 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when s

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Sonatype Lifecycle features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sonatype
Year Founded
2008
HQ Location
Fulton, US
Twitter
@sonatype
10,713 Twitter followers
LinkedIn® Page
www.linkedin.com
529 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Uptycs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Computing
    1
    Cloud Security
    1
    Cloud Technology
    1
    Compliance
    1
    Compliance Management
    1
    Cons
    Expensive
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uptycs features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    3.3
    Security Auditing
    Average: 8.2
    5.0
    Network Segmentation
    Average: 7.8
    5.0
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,505 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Uptycs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Computing
1
Cloud Security
1
Cloud Technology
1
Compliance
1
Compliance Management
1
Cons
Expensive
1
Pricing Issues
1
Uptycs features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
3.3
Security Auditing
Average: 8.2
5.0
Network Segmentation
Average: 7.8
5.0
Workload Protection
Average: 7.9
Seller Details
Seller
Uptycs
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,505 Twitter followers
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Upwind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Visibility
    3
    Customer Support
    2
    Detection Efficiency
    2
    Implementation Ease
    2
    Cons
    Alert Overload
    1
    Compliance Issues
    1
    Data Management
    1
    Data Overload
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Upwind features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Security Auditing
    Average: 8.2
    10.0
    Network Segmentation
    Average: 7.8
    10.0
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Upwind
    Company Website
    Year Founded
    2022
    HQ Location
    San Francisco, California, United States
    LinkedIn® Page
    www.linkedin.com
    217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 29% Enterprise
Upwind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Visibility
3
Customer Support
2
Detection Efficiency
2
Implementation Ease
2
Cons
Alert Overload
1
Compliance Issues
1
Data Management
1
Data Overload
1
False Positives
1
Upwind features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Security Auditing
Average: 8.2
10.0
Network Segmentation
Average: 7.8
10.0
Workload Protection
Average: 7.9
Seller Details
Seller
Upwind
Company Website
Year Founded
2022
HQ Location
San Francisco, California, United States
LinkedIn® Page
www.linkedin.com
217 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Xygeni Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    2
    Prioritization
    2
    Risk Management
    2
    Security
    2
    Cloud Integration
    1
    Cons
    Difficult Setup
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xygeni features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.2
    4.2
    Network Segmentation
    Average: 7.8
    5.0
    Workload Protection
    Average: 7.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Madrid, ES
    Twitter
    @xygeni
    189 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Mid-Market
Xygeni Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
2
Prioritization
2
Risk Management
2
Security
2
Cloud Integration
1
Cons
Difficult Setup
1
Learning Curve
1
Xygeni features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.2
4.2
Network Segmentation
Average: 7.8
5.0
Workload Protection
Average: 7.9
Seller Details
Year Founded
2021
HQ Location
Madrid, ES
Twitter
@xygeni
189 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Araali Network Security Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    API Integration
    1
    Detection Efficiency
    1
    Integrations
    1
    Onboarding
    1
    Cons
    Complex Coding
    1
    Delayed Detection
    1
    Ineffective Alerts
    1
    Inefficient Alert System
    1
    Network Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pro features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Araali Network Security Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
API Integration
1
Detection Efficiency
1
Integrations
1
Onboarding
1
Cons
Complex Coding
1
Delayed Detection
1
Ineffective Alerts
1
Inefficient Alert System
1
Network Issues
1
Araali Network Security Pro features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®