Google Container Security Reviews & Product Details

Google Container Security Overview

What is Google Container Security?

Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale.

Google Container Security Details
Product Description

Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale.


Seller Details
Seller
Google
Ownership
NASDAQ:GOOG
Company Website
Phone
+1 (650) 253-0000
Year Founded
1998
HQ Location
Mountain View, CA
Total Revenue (USD mm)
$161,857
Twitter
@google
22,793,389 Twitter followers
LinkedIn® Page
www.linkedin.com
226,485 employees on LinkedIn®
Description

Organize the world’s information and make it universally accessible and useful.

Show More
Answer a few questions to help the Google Container Security community
Have you used Google Container Security before?
Yes

Google Container Security Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 1 Google Container Security review
Showing 1 review
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
All Industries
Region
Already have Google Container Security?
Write a Review
UM
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: Invitation from G2
What do you like best?

Google container security is great for infrastructure security. It keeps our system, and information safe and secure. Review collected by and hosted on G2.com.

What do you dislike?

There isn’t much we dislike about google products. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Basically just security. When you’re dealing with clients and client information, it is important to make sure everything is safe and secure at all times. Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Google Container Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Dynatrace Logo
Dynatrace
4.5
(1,020)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
2
Qualys Cloud Platform. Logo
Qualys Cloud Platform.
4.1
(58)
Vulnerability Management
3
WhiteSource Software Logo
WhiteSource Software
4.4
(49)
Open Source license and security management software
4
Sysdig Platform Logo
Sysdig Platform
4.5
(25)
Sysdig is an open source, system-level exploration that capture system state and activity from a running Linux instance, then save, filter and analyze.
5
Aqua Security Logo
Aqua Security
4.5
(1)
Aqua Security provides scalable security for the complete development-to-deployment lifecycle of containerized applications.
6
Threat Stack Logo
Threat Stack
4.4
(34)
Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss.
7
StackRox Logo
StackRox
5.0
(12)
StackRox enables enterprises to detect and disrupt attacks and make their container environments more resilient. Our solutions represent a unique, innovative approach to securing containers across their lifecycle, from build to runtime.
8
Lacework Logo
Lacework
4.6
(24)
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unmatched visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.
9
Wallarm Next Gen WAF and API Security Logo
Wallarm Next Gen WAF and API Security
4.7
(21)
Wallarm is an AI-powered application security solution for the teams launching new modular software services or upgrading their existing web applications to a new stack. Wallarm includes an adaptive Next Gen WAF, attack sandboxing, vulnerability scanner and development time testing modules.
10
Prisma Cloud Compute Logo
Prisma Cloud Compute
3.5
(1)
Prisma Cloud Compute provides an enterprise suite for container security that address risks on the host and within the containerized application it enable enterprises to enforce consistent security policies from development to production.
Show More