Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Search software
Software
Expand/Collapse Software
AI Agents
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For Developers
Use our Developer Portal to test API data
Deals
Leave a Review
Join or Log In
Search
Search Software and Services
Expand/Collapse
Home
...
All Categories
Cloud Workload Protection Platforms Discussions
Cloud Workload Protection Platforms Discussions
Share
All Cloud Workload Protection Platforms Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
Hybrid Cloud Security
0
1
What is deep security software?
What is deep security software?
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Cloud Data Security Software
Intrusion Detection and Prevention Systems (IDPS)
Container Security Software
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Show More
Pinned by G2 as a
common question.
Posted within
Tufin Orchestration Suite
0
1
What is Tufin orchestration suite?
What is Tufin orchestration suite?
Microsegmentation Software
Network Security Policy Management (NSPM)
Cloud Workload Protection Platforms
1
person commented
BF
Brandy F.
Pinned by G2 as a
common question.
Posted within
Hybrid Cloud Security
0
1
What is Trend Micro in information security?
What is Trend Micro in information security?
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Cloud Data Security Software
Intrusion Detection and Prevention Systems (IDPS)
Container Security Software
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Show More
Pinned by G2 as a
common question.
Posted within
Microsoft Defender for Cloud
0
1
Is Azure security Center a SIEM?
Is Azure security Center a SIEM?
Cloud Compliance Software
Cloud Workload Protection Platforms
Security Risk Analysis Software
Extended Detection and Response (XDR) Platforms
Cloud Security Posture Management (CSPM) Software
Show More
1
person commented
AM
Ayush M.
Pinned by G2 as a
common question.
Posted within
Tufin Orchestration Suite
0
1
What is Tufin secure track?
What is Tufin secure track?
Microsegmentation Software
Network Security Policy Management (NSPM)
Cloud Workload Protection Platforms
1
person commented
MS
Maura S.
Pinned by G2 as a
common question.
Posted within
Tufin Orchestration Suite
0
1
What is Tufin software used for?
What is Tufin software used for?
Microsegmentation Software
Network Security Policy Management (NSPM)
Cloud Workload Protection Platforms
1
person commented
MS
Maura S.
Pinned by G2 as a
common question.
Posted within
PingSafe
0
0
Do you recommend PingSafe for cloud security, and what has been your experience so far?
Do you recommend PingSafe for cloud security, and what has been your experience so far?
Attack Surface Management Software
Cloud Security Posture Management (CSPM) Software
Cloud Security Monitoring and Analytics Software
Cloud Compliance Software
Container Security Tools
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Exposure Management Platforms
Cloud-Native Application Protection Platform (CNAPP)
Show More
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard Network Security
0
0
How has CloudGuard Network Security supported your cybersecurity efforts, and what features do yo...
How has CloudGuard Network Security supported your cybersecurity efforts, and what features do you rely on most?
Microsegmentation Software
AWS Marketplace Software
Cloud Compliance Software
Cloud Data Security Software
Zero Trust Networking Software
Network Security Policy Management (NSPM) Software
Cloud Workload Protection Platforms
Firewall Software
Show More
1
person commented
DP
Dewesh P.
Pinned by G2 as a
common question.
Posted within
Tufin Orchestration Suite
0
0
What are the benefits and drawbacks of using Tufin for network security policy management?
What are the benefits and drawbacks of using Tufin for network security policy management?
Microsegmentation Software
Network Security Policy Management (NSPM) Software
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard Network Security
0
0
What is CloudGuard Network Security (IaaS) used for?
What is CloudGuard Network Security (IaaS) used for?
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Microsegmentation Software
1
person commented
DP
Dewesh P.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard CNAPP
0
0
What is CloudGuard Posture Management used for?
What is CloudGuard Posture Management used for?
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Cloud Content Collaboration Software
Cloud Security Posture Management (CSPM) Software
Cloud Detection and Response (CDR) Software
Container Security Tools
Cloud Security Monitoring and Analytics Software
API Security Tools
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
Check Point CloudGuard CNAPP
Pinned by G2 as a
common question.
Posted within
Google Cloud Platform Security Overview
0
0
What is Google Cloud Platform Security Overview used for?
What is Google Cloud Platform Security Overview used for?
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
InsightVM (Nexpose)
0
0
What is InsightVM (Nexpose) used for?
What is InsightVM (Nexpose) used for?
Cloud Infrastructure Monitoring Software
Cloud Workload Protection Platforms
ServiceNow Marketplace Apps
Vulnerability Scanner Software
Risk-based Vulnerability Management Software
Cloud Security Monitoring and Analytics Software
AWS Marketplace Software
Show More
1
person commented
MJ
Mayank J.
Pinned by G2 as a
common question.
Posted within
Microsoft Defender for Cloud
0
0
What is Microsoft Defender for Cloud used for?
What is Microsoft Defender for Cloud used for?
Cloud Detection and Response (CDR) Software
Cloud-Native Application Protection Platform (CNAPP)
Cloud Security Posture Management (CSPM) Software
Secure Code Review Software
API Security Tools
Cloud Security Monitoring and Analytics Software
Software Composition Analysis Tools
Cloud Compliance Software
Container Security Tools
Cloud Workload Protection Platforms
Security Risk Analysis Software
Container Monitoring Software
Show More
1
person commented
CS
Chandru S.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard CNAPP
0
0
What is Dome9 ARC used for?
What is Dome9 ARC used for?
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Cloud Security Posture Management (CSPM) Software
Cloud Detection and Response (CDR) Software
Container Security Tools
Cloud Security Monitoring and Analytics Software
API Security Tools
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
Check Point CloudGuard CNAPP
Pinned by G2 as a
common question.
Posted within
Symantec Cloud Workload Protection
0
0
What is Symantec Cloud Workload Protection used for?
What is Symantec Cloud Workload Protection used for?
Container Security Tools
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
NetApp ONTAP Data Management Software
0
0
What is Virtual Infrastructure Management used for?
What is Virtual Infrastructure Management used for?
Hyperconverged Infrastructure (HCI) Solutions
File Recovery Software
Cloud Workload Protection Platforms
Cloud FIle Storage Software
Cloud Infrastructure Monitoring Software
Hybrid Cloud Storage Solutions
Block Storage Software
Cloud Infrastructure Automation Software
Show More
Pinned by G2 as a
common question.
Posted within
Armor Anywhere
0
0
What is Armor Anywhere used for?
What is Armor Anywhere used for?
Extended Detection and Response (XDR) Platforms
Intrusion Detection and Prevention Systems (IDPS)
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Managed Detection and Response (MDR) Software
Show More
Pinned by G2 as a
common question.
Posted within
Tenable Cloud Security
0
0
What is Ermetic used for?
What is Ermetic used for?
Cloud Security Posture Management (CSPM) Software
Cloud Security Monitoring and Analytics Software
Data-Centric Security Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Privileged Access Management (PAM) Software
Identity and Access Management (IAM) Software
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
VP
Veeresh P.
Pinned by G2 as a
common question.
Posted within
Intezer Protect
0
0
What is Intezer Protect used for?
What is Intezer Protect used for?
Container Security Tools
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
Turbot
0
0
What is Turbot used for?
What is Turbot used for?
Cloud Workload Protection Platforms
Cloud Security Posture Management (CSPM) Software
Pinned by G2 as a
common question.
Posted within
Cisco Secure Workload (Tetration)
0
0
What is Cisco Secure Workload (Tetration) used for?
What is Cisco Secure Workload (Tetration) used for?
Microsegmentation Software
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
Caveonix Cloud
0
0
What is Caveonix Cloud used for?
What is Caveonix Cloud used for?
Cloud Workload Protection Platforms
Cloud Compliance Software
Cloud Security Posture Management (CSPM) Software
Cloud-Native Application Protection Platform (CNAPP)
Pinned by G2 as a
common question.
Posted within
IBM Secure Gateway
0
0
What is IBM Secure Gateway used for?
What is IBM Secure Gateway used for?
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
Armor Complete
0
0
What is Armor Complete used for?
What is Armor Complete used for?
Cloud Workload Protection Platforms
Cloud Compliance Software
Pinned by G2 as a
common question.
Posted within
AtomicWP Workload Protection
0
0
What is AtomicWP Workload Protection used for?
What is AtomicWP Workload Protection used for?
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
IBM Security zSecure
0
0
What is IBM Security zSecure used for?
What is IBM Security zSecure used for?
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
Fidelis Halo
0
0
What is Fidelis Halo used for?
What is Fidelis Halo used for?
Cloud Compliance Software
Data Center Security Solutions
Cloud Workload Protection Platforms
Software-Defined Perimeter (SDP) Software
Cloud Security Posture Management (CSPM) Software
Security Compliance Software
Show More
Pinned by G2 as a
common question.
Posted within
Lightspin
0
0
What is Lightspin used for?
What is Lightspin used for?
Cloud Security Software
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard Network Security
0
0
What is CloudGuard Network Security for Gateway Load Balancer used for?
What is CloudGuard Network Security for Gateway Load Balancer used for?
AWS Marketplace Software
Microsegmentation Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Network Security Policy Management (NSPM)
Show More
1
person commented
VM
Viral M.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard Network Security
0
0
What is CloudGuard Network Security for Gateway Load Balancer used for?
What is CloudGuard Network Security for Gateway Load Balancer used for?
AWS Marketplace Software
Microsegmentation Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Network Security Policy Management (NSPM)
Show More
1
person commented
DP
Dewesh P.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard CNAPP
0
0
What is CloudGuard AppSec used for?
What is CloudGuard AppSec used for?
AWS Marketplace Software
API Security Tools
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Cloud Workload Protection Platforms
Cloud Detection and Response (CDR) Software
Cloud Data Security Software
Container Security Tools
Cloud Security Monitoring and Analytics Software
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
Check Point CloudGuard CNAPP
Pinned by G2 as a
common question.
Posted within
InsightVM (Nexpose)
0
0
What is InsightVM?
What is InsightVM?
Cloud Infrastructure Monitoring Software
Cloud Workload Protection Platforms
ServiceNow Marketplace Apps
Vulnerability Scanner Software
Risk-based Vulnerability Management Software
Cloud Security Monitoring and Analytics Software
AWS Marketplace Software
Show More
1
person commented
MJ
Mayank J.
Pinned by G2 as a
common question.
Posted within
ExtraHop
0
0
Is ExtraHop a startup?
Is ExtraHop a startup?
Network Detection and Response (NDR) Software
Network Traffic Analysis (NTA) Software
Intrusion Detection and Prevention Systems (IDPS)
Extended Detection and Response (XDR) Platforms
Container Security Software
Cloud Workload Protection Platforms
Digital Forensics Software
Cloud Detection and Response (CDR) Software
Show More
Pinned by G2 as a
common question.
Posted within
Tufin Orchestration Suite
0
0
What is secure track?
What is secure track?
Microsegmentation Software
Network Security Policy Management (NSPM)
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
Posted within
SentinelOne Singularity Endpoint
0
0
How does Sentinel one work?
How does Sentinel one work?
Identity Threat Detection and Response (ITDR) Software
Endpoint Protection Platforms Software
Extended Detection and Response (XDR) Platforms
Endpoint Protection Suites
Cloud Workload Protection Platforms
Endpoint Management Software
Antivirus Software
Endpoint Detection & Response (EDR) Software
Deception Technology Software
Vulnerability Scanner Software
Show More
Pinned by G2 as a
common question.
Posted within
SentinelOne Singularity Endpoint
0
0
How does Sentinel one work?
How does Sentinel one work?
Identity Threat Detection and Response (ITDR) Software
Endpoint Protection Platforms Software
Extended Detection and Response (XDR) Platforms
Endpoint Protection Suites
Cloud Workload Protection Platforms
Endpoint Management Software
Antivirus Software
Endpoint Detection & Response (EDR) Software
Deception Technology Software
Vulnerability Scanner Software
Show More
Pinned by G2 as a
common question.
Posted within
Orca Security
0
0
Where is Orca security based?
Where is Orca security based?
Cloud Compliance Software
Container Security Software
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Cloud Security Posture Management (CSPM) Software
Cloud-Native Application Protection Platform (CNAPP)
Cloud Detection and Response (CDR) Software
Show More
2
people commented
NU
Nitish U.
EO
Pinned by G2 as a
common question.
Posted within
Qualys VMDR
0
0
What does Qualys Vmdr do?
What does Qualys Vmdr do?
Risk-based Vulnerability Management Software
Cloud Compliance Software
Vulnerability Scanner Software
Cloud Workload Protection Platforms
Container Security Software
Security Risk Analysis Software
ServiceNow Marketplace Apps
Show More
1
person commented
BV
Balasubramaniya V.
Pinned by G2 as a
common question.
Posted within
NetApp Cloud Volumes ONTAP
0
0
What are the three benefits of NetApp cloud volumes ONTAP?
What are the three benefits of NetApp cloud volumes ONTAP?
Cloud Infrastructure Automation Software
Cloud Infrastructure Monitoring Software
Online Backup Software
File Recovery Software
Cloud Workload Protection Platforms
Cloud FIle Storage Software
Block Storage Software
Hybrid Cloud Storage Software
Archive Storage Software
Cloud Migration Software
File Migration Software
Database as a Service (DBaaS) Provider
Cloud Content Collaboration Software
Cloud Platform as a Service (PaaS) Software
Cloud Cost Management Software
Show More
Pinned by G2 as a
common question.
Posted within
F5 Distributed Cloud App Infrastructure Protection (AIP)
0
0
Is ThreatStack an ids?
Is ThreatStack an ids?
Cloud Security Monitoring and Analytics Software
Cloud Compliance Software
Cloud Infrastructure Monitoring Software
Container Security Software
Cloud Workload Protection Platforms
Cloud Security Posture Management (CSPM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Trend Micro Deep Security
0
0
What is Trend Micro Deep Security Relay?
What is Trend Micro Deep Security Relay?
Data Center Security Software
Container Security Software
Cloud Workload Protection Platforms
IoT Security Software
Pinned by G2 as a
common question.
Posted within
FortiCNAPP
0
0
How much does lacework cost?
How much does lacework cost?
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Container Security Software
Cloud Workload Protection Platforms
Cloud Security Monitoring and Analytics Software
Cloud-Native Application Protection Platform (CNAPP)
Show More
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard CNAPP
0
0
What are the key benefits of Check Point cloud automation?
What are the key benefits of Check Point cloud automation?
Cloud Infrastructure Monitoring Software
Cloud Security Monitoring and Analytics Software
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Cloud Workload Protection Platforms
Cloud Detection and Response (CDR) Software
Cloud Data Security Software
Container Security Tools
API Security Tools
Cloud-Native Application Protection Platform (CNAPP)
Show More
Pinned by G2 as a
common question.
Posted within
Sophos Cloud Optix
0
0
Which 3 Sophos products can be used to protect public cloud hosted servers?
Which 3 Sophos products can be used to protect public cloud hosted servers?
Extended Detection and Response (XDR) Platforms
Cloud Security Monitoring and Analytics Software
Cloud Compliance Software
Cloud Workload Protection Platforms
Cloud Security Posture Management (CSPM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Sophos Cloud Optix
0
0
Which 3 Sophos products can be used to protect public cloud hosted servers?
Which 3 Sophos products can be used to protect public cloud hosted servers?
Extended Detection and Response (XDR) Platforms
Cloud Security Monitoring and Analytics Software
Cloud Compliance Software
Cloud Workload Protection Platforms
Cloud Security Posture Management (CSPM) Software
Show More
Pinned by G2 as a
common question.
Posted within
AWS Control Tower
0
0
Is AWS control tower a service?
Is AWS control tower a service?
Cloud Workload Protection Platforms
Cloud Compliance Software
Pinned by G2 as a
common question.
Posted within
Qualys Cloud Platform.
0
0
How much does Qualys cost?
How much does Qualys cost?
Cloud Compliance Software
Container Security Software
Cloud Workload Protection Platforms
Security Risk Analysis Software
Vulnerability Scanner Software
ServiceNow Marketplace Apps
Risk-based Vulnerability Management Software
Show More
Pinned by G2 as a
common question.
Posted within
Morphisec
0
0
What is endpoint security used for?
What is endpoint security used for?
Deception Technology Software
Endpoint Detection & Response (EDR) Software
Endpoint Protection Suites
Antivirus Software
Cloud Workload Protection Platforms
Endpoint Protection Platforms Software
Show More
Pinned by G2 as a
common question.
Posted within
Kaspersky Hybrid Cloud Security
0
0
What applications does a single Kaspersky hybrid cloud security license allow to use?
What applications does a single Kaspersky hybrid cloud security license allow to use?
Cloud Workload Protection Platforms
Pinned by G2 as a
common question.
‹ Prev
‹ Prev
1
2
3
Next ›
Next ›
Top Contributors in Cloud Workload Protection Platforms
1
KM
Loading...
Kristin M.
3 pts
2
DP
Loading...
Dewesh P.
Cyber Security Engineer
3 pts
3
MS
Loading...
Mathews S.
Cyber security technolgist
2 pts
4
MS
Loading...
Maura S.
Modern Marketer
2 pts
5
MJ
Loading...
Mayank J.
Endpoint Security Specialist
2 pts
Popular Discussions without Comments
0
0
Do you recommend pingsafe for cloud security, and what has been your experience so far?
0
0
What are the benefits and drawbacks of using tufin for network security policy management?
0
0
What is google cloud platform security overview used for?
0
0
What is symantec cloud workload protection used for?
0
0
What is virtual infrastructure management used for?
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
Create an account
Already have an account?
Log in
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
LinkedIn
or continue with
Google
Google
Create an account
Already have an account?
Log in
Create an account
Already have an account?
Log in
By proceeding, you agree to our
Terms of Use
and
Privacy Policy