[go: up one dir, main page]

Introducing G2.ai, the future of software buying.Try now

Top Free Container Security Tools

Check out our list of free Container Security Tools. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Container Security Tools to ensure you get the right product.

View Free Container Security Tools

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
28 Container Security Products Available
(710)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Container Security software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.2
    7.6
    Network Segmentation
    Average: 7.7
    8.0
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    18,470 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,991 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.2
7.6
Network Segmentation
Average: 7.7
8.0
Workload Protection
Average: 7.9
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
18,470 Twitter followers
LinkedIn® Page
www.linkedin.com
2,991 employees on LinkedIn®
(221)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security Auditing
    Average: 8.2
    7.7
    Network Segmentation
    Average: 7.7
    7.8
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VP
    1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
    Verified User in Telecommunications
    ET
    I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,850 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    476 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security Auditing
Average: 8.2
7.7
Network Segmentation
Average: 7.7
7.8
Workload Protection
Average: 7.9
VP
1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
Verified User in Telecommunications
ET
I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,850 Twitter followers
LinkedIn® Page
www.linkedin.com
476 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(108)4.9 out of 5
3rd Easiest To Use in Container Security software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.9
    Security Auditing
    Average: 8.2
    9.9
    Network Segmentation
    Average: 7.7
    9.9
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,002 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
9.9
Security Auditing
Average: 8.2
9.9
Network Segmentation
Average: 7.7
9.9
Workload Protection
Average: 7.9
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,477 Twitter followers
LinkedIn® Page
www.linkedin.com
3,002 employees on LinkedIn®
(186)4.5 out of 5
13th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Engineer
    • Cyber Security Associate
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.2
    6.7
    Network Segmentation
    Average: 7.7
    9.2
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Sumit K.
    SK
    Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
    Lemmuel A.
    LA
    I like trend micro hybrid cloud security when they can protect you on a modern threats even you are using hybrid setup Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,941 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,792 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Engineer
  • Cyber Security Associate
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 34% Enterprise
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.2
6.7
Network Segmentation
Average: 7.7
9.2
Workload Protection
Average: 7.9
Sumit K.
SK
Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
Lemmuel A.
LA
I like trend micro hybrid cloud security when they can protect you on a modern threats even you are using hybrid setup Read review
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,941 Twitter followers
LinkedIn® Page
www.linkedin.com
7,792 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(83)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is the no-nonsense security platform for developers. The all-in-one security platform that covers you from code-to-cloud and helps you get security done. Engineering teams execute faster with A

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 77% Small-Business
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Security Auditing
    Average: 8.2
    7.3
    Network Segmentation
    Average: 7.7
    10.0
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Olivier F.
    OF
    We’ve been using it for almost half a year now. It works exactly as we expected. We’ve needed support twice, and both times we received a quick and... Read review
    AR
    It gives you a 360 degree view of your product. Easy integrations. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    3,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    102 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is the no-nonsense security platform for developers. The all-in-one security platform that covers you from code-to-cloud and helps you get security done. Engineering teams execute faster with A

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 77% Small-Business
  • 20% Mid-Market
Aikido Security features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
8.9
Security Auditing
Average: 8.2
7.3
Network Segmentation
Average: 7.7
10.0
Workload Protection
Average: 7.9
Olivier F.
OF
We’ve been using it for almost half a year now. It works exactly as we expected. We’ve needed support twice, and both times we received a quick and... Read review
AR
It gives you a 360 degree view of your product. Easy integrations. Read review
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
3,462 Twitter followers
LinkedIn® Page
www.linkedin.com
102 employees on LinkedIn®
(40)4.8 out of 5
Optimized for quick response
6th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Chainguard Containers are a guarded catalog of minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for critical severity, 14 days for high, medium and low) that helps c

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chainguard features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.6
    Security Auditing
    Average: 8.2
    7.2
    Network Segmentation
    Average: 7.7
    8.3
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Mathieu B.
    MB
    I was looking for replacing my base images with more a secure approach (i.e. distroless), Chainguard images were a great fit because easy to use... Read review
    Mark M.
    MM
    We've all seen a ton of projects that will detect CVEs but then you have the secondary problem of deciding where the CVE originated from (base... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    Kirkland, WA
    Twitter
    @chainguard_dev
    6,079 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    538 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Chainguard Containers are a guarded catalog of minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for critical severity, 14 days for high, medium and low) that helps c

Users
No information available
Industries
  • Computer Software
Market Segment
  • 48% Enterprise
  • 30% Small-Business
Chainguard features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
8.6
Security Auditing
Average: 8.2
7.2
Network Segmentation
Average: 7.7
8.3
Workload Protection
Average: 7.9
Mathieu B.
MB
I was looking for replacing my base images with more a secure approach (i.e. distroless), Chainguard images were a great fit because easy to use... Read review
Mark M.
MM
We've all seen a ton of projects that will detect CVEs but then you have the secondary problem of deciding where the CVE originated from (base... Read review
Seller Details
Company Website
Year Founded
2021
HQ Location
Kirkland, WA
Twitter
@chainguard_dev
6,079 Twitter followers
LinkedIn® Page
www.linkedin.com
538 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mend.io features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Security Auditing
    Average: 8.2
    8.3
    Network Segmentation
    Average: 7.7
    7.5
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Vivek Kumar S.
    VS
    Interface and flow of the application.Also the simplicity Read review
    Meer T.
    MT
    The best thing is the security and easy to use. The mend bot offers couple of qualities to protect your projects against several security protocols... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mend
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts
    Twitter
    @Mend_io
    11,425 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    283 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Mend.io features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.1
Security Auditing
Average: 8.2
8.3
Network Segmentation
Average: 7.7
7.5
Workload Protection
Average: 7.9
Vivek Kumar S.
VS
Interface and flow of the application.Also the simplicity Read review
Meer T.
MT
The best thing is the security and easy to use. The mend bot offers couple of qualities to protect your projects against several security protocols... Read review
Seller Details
Seller
Mend
Year Founded
2011
HQ Location
Boston, Massachusetts
Twitter
@Mend_io
11,425 Twitter followers
LinkedIn® Page
www.linkedin.com
283 employees on LinkedIn®
(87)4.7 out of 5
12th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    Security Auditing
    Average: 8.2
    8.5
    Network Segmentation
    Average: 7.7
    7.9
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
    AJ T.
    AT
    Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,659 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
0.0
Security Auditing
Average: 8.2
8.5
Network Segmentation
Average: 7.7
7.9
Workload Protection
Average: 7.9
HH
It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
AJ T.
AT
Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,659 Twitter followers
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
(106)4.1 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Security Auditing
    Average: 8.2
    7.7
    Network Segmentation
    Average: 7.7
    7.7
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Logistics and Supply Chain
    UL
    Strong cloud security – It catches misconfigurations and vulnerabilities fast. Easy to use – The dashboard is clean and gives clear... Read review
    Verified User in Computer Networking
    UC
    Gets the job done and has a good user interface. Smooth user experience and is usually free from any bugs. Support and implementation are also good... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,614 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,946 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Enterprise
  • 31% Mid-Market
Cortex Cloud features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Security Auditing
Average: 8.2
7.7
Network Segmentation
Average: 7.7
7.7
Workload Protection
Average: 7.9
Verified User in Logistics and Supply Chain
UL
Strong cloud security – It catches misconfigurations and vulnerabilities fast. Easy to use – The dashboard is clean and gives clear... Read review
Verified User in Computer Networking
UC
Gets the job done and has a good user interface. Smooth user experience and is usually free from any bugs. Support and implementation are also good... Read review
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,614 Twitter followers
LinkedIn® Page
www.linkedin.com
17,946 employees on LinkedIn®
(37)4.4 out of 5
Optimized for quick response
11th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico O

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 35% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Calico Cloud features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Security Auditing
    Average: 8.2
    9.2
    Network Segmentation
    Average: 7.7
    8.7
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in International Trade and Development
    AI
    1. Detailed network policy control 2. Scalability and efficiency 3. Effortless management 4. Prompt support 5. Seamless Integration Read review
    Verified User in Computer Software
    AC
    Very easy to integrate into kubernetes, deployment is quick and painless. Tigera support is knowledgeable and helpful. The network security... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tigera
    Company Website
    Year Founded
    2016
    HQ Location
    San Jose, CA
    Twitter
    @tigeraio
    1,965 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    128 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico O

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 35% Enterprise
  • 35% Mid-Market
Calico Cloud features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
8.8
Security Auditing
Average: 8.2
9.2
Network Segmentation
Average: 7.7
8.7
Workload Protection
Average: 7.9
Verified User in International Trade and Development
AI
1. Detailed network policy control 2. Scalability and efficiency 3. Effortless management 4. Prompt support 5. Seamless Integration Read review
Verified User in Computer Software
AC
Very easy to integrate into kubernetes, deployment is quick and painless. Tigera support is knowledgeable and helpful. The network security... Read review
Seller Details
Seller
Tigera
Company Website
Year Founded
2016
HQ Location
San Jose, CA
Twitter
@tigeraio
1,965 Twitter followers
LinkedIn® Page
www.linkedin.com
128 employees on LinkedIn®
(44)4.5 out of 5
14th Easiest To Use in Container Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Security Auditing
    Average: 8.2
    7.9
    Network Segmentation
    Average: 7.7
    9.2
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abdurrahman A.
    AA
    This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
    Mandira G.
    MG
    I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,140 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    85 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
ARMO Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.2
Security Auditing
Average: 8.2
7.9
Network Segmentation
Average: 7.7
9.2
Workload Protection
Average: 7.9
Abdurrahman A.
AA
This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
Mandira G.
MG
I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
Seller Details
Seller
ARMO
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,140 Twitter followers
LinkedIn® Page
www.linkedin.com
85 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 62% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetScaler features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Shubham G.
    SG
    The best function of Citrix Web App Firewall is its user friendly interface which enables anyone to use the product hassle free. Read review
    Verified User in Pharmaceuticals
    UP
    Application performance acceleration is one of the feature of it. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @cloudsoftware
    118 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,224 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide including eBay, IKEA, and Aria — and more than 90 percent

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 62% Enterprise
  • 29% Mid-Market
NetScaler features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Shubham G.
SG
The best function of Citrix Web App Firewall is its user friendly interface which enables anyone to use the product hassle free. Read review
Verified User in Pharmaceuticals
UP
Application performance acceleration is one of the feature of it. Read review
Seller Details
HQ Location
Fort Lauderdale, FL
Twitter
@cloudsoftware
118 Twitter followers
LinkedIn® Page
www.linkedin.com
10,224 employees on LinkedIn®
(95)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

    Users
    • CTO
    • CEO
    Industries
    • Mechanical or Industrial Engineering
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 42% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wallarm API Security Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Security Auditing
    Average: 8.2
    9.6
    Network Segmentation
    Average: 7.7
    10.0
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VS
    perimeter scanner and attack rechecker allow us to be 100% sure there is no backdoor or unknown entries and every vulnerability is highlighted and... Read review
    DL
    - Amazing firewall that can work as a standalone proxy server, filter all incoming HTTP requests and block attacks - Supports integration with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wallarm
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, California
    Twitter
    @wallarm
    3,212 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    179 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protect any API. In any environment. Against any threats. Wallarm is the platform security teams choose to protect cloud-native APIs. The Wallarm platform gives teams the ability to detect and bloc

Users
  • CTO
  • CEO
Industries
  • Mechanical or Industrial Engineering
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 42% Small-Business
Wallarm API Security Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.7
Security Auditing
Average: 8.2
9.6
Network Segmentation
Average: 7.7
10.0
Workload Protection
Average: 7.9
VS
perimeter scanner and attack rechecker allow us to be 100% sure there is no backdoor or unknown entries and every vulnerability is highlighted and... Read review
DL
- Amazing firewall that can work as a standalone proxy server, filter all incoming HTTP requests and block attacks - Supports integration with... Read review
Seller Details
Seller
Wallarm
Company Website
Year Founded
2016
HQ Location
San Francisco, California
Twitter
@wallarm
3,212 Twitter followers
LinkedIn® Page
www.linkedin.com
179 employees on LinkedIn®
(10)4.9 out of 5
9th Easiest To Use in Container Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudanix features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Security Auditing
    Average: 8.2
    8.1
    Network Segmentation
    Average: 7.7
    9.6
    Workload Protection
    Average: 7.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Anurag  G.
    AG
    The tool gives you a detailed insight about threats and vulnerabilities while taking a very basic access of your account and without fetching... Read review
    Raghav A.
    RA
    Overall, Cloudanix is a robust, reliable tool for any organization looking to strengthen their cloud infrastructure’s security, compliance, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cloudanix
    Year Founded
    2020
    HQ Location
    Sunnyvale, CA
    Twitter
    @cloudanix
    101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Small-Business
Cloudanix features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
9.3
Security Auditing
Average: 8.2
8.1
Network Segmentation
Average: 7.7
9.6
Workload Protection
Average: 7.9
Anurag  G.
AG
The tool gives you a detailed insight about threats and vulnerabilities while taking a very basic access of your account and without fetching... Read review
Raghav A.
RA
Overall, Cloudanix is a robust, reliable tool for any organization looking to strengthen their cloud infrastructure’s security, compliance, and... Read review
Seller Details
Seller
Cloudanix
Year Founded
2020
HQ Location
Sunnyvale, CA
Twitter
@cloudanix
101 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 69% Enterprise
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Telecommunications
    UT
    The capability of deep dive into any OSI Layer's protocol to match your pre-configured triggers for abnormal network pattern and potential issue... Read review
    Verified User in Telecommunications
    AT
    EAsy to use, intuitive platform, drill downs Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,867 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    752 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 69% Enterprise
  • 26% Mid-Market
ExtraHop features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Telecommunications
UT
The capability of deep dive into any OSI Layer's protocol to match your pre-configured triggers for abnormal network pattern and potential issue... Read review
Verified User in Telecommunications
AT
EAsy to use, intuitive platform, drill downs Read review
Seller Details
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,867 Twitter followers
LinkedIn® Page
www.linkedin.com
752 employees on LinkedIn®