[go: up one dir, main page]

Introducing G2.ai, the future of software buying.Try now
Aikido Security
Sponsored
Aikido Security
Visit Website
Product Avatar Image
Falco

By Sysdig

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Falco and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
Aikido Security
Sponsored
Aikido Security
Visit Website
It's been two months since this profile received a new review
Leave a Review

Falco Reviews & Product Details

Falco Product Details
Aikido Security
Sponsored
Aikido Security
Visit Website
Product Avatar Image

Have you used Falco before?

Answer a few questions to help the Falco community

Falco Reviews (3)

Reviews

Falco Reviews (3)

4.0
3 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
View Filters
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Bikash s.
BS
DevOps Engineer
Enterprise (> 1000 emp.)
"Enhancing Kubernetes Security with Falco: A Comprehensive Review"
What do you like best about Falco?

Ease of Integration: Falco integrates seamlessly with Kubernetes and container environments. Makes it easy to deploy as a DaemonSet across the cluster.

Customizable Rules: The ability to customize search rules helps teams tailor security reviews to their specific needs. Helps reduce false positives At the same time it guarantees that important events are recorded.

Detailed notifications: When Falco detects an issue, it provides a detailed notification with context about the event. Help security teams quickly understand and respond to potential threats.

Community Support: As an open source project, Falco benefits from a lively community that actively contributes to its development. It provides a wealth of resources, plugins, and shared experiences…

Extensive coverage: Review various aspects of the Kubernetes ecosystem, including network activity. File access and configuration changes Provides a holistic view of security within a cluster Review collected by and hosted on G2.com.

What do you dislike about Falco?

Configuration Complexity: Although Falco provides customizable rules, setting up and fine-tuning these rules can be complex, especially for organizations with specific or intricate security requirements. New users might find the initial configuration overwhelming.

Resource Consumption: As a DaemonSet running on each node, Falco can consume a noticeable amount of system resources, which might impact performance, especially in resource-constrained environments. This can be a concern for large clusters with many nodes. Review collected by and hosted on G2.com.

Anussha H.
AH
Cyber Security Analyst
Small-Business (50 or fewer emp.)
"A Good security toolfor linux systems"
What do you like best about Falco?

It is really good for linux systems and is a cloud native security tool so it is quite good at the scalability front. It is very good looking when it comes to UI and does house a lot of securty tools within it. Review collected by and hosted on G2.com.

What do you dislike about Falco?

The only issue I faced was to the integration of Falco using API. It is much difficult as it isn't REST API. Hence, there is a learning curve involved when it comes to using this tool. Review collected by and hosted on G2.com.

Mansi S.
MS
Software Engineer TDP-ll
Mid-Market (51-1000 emp.)
"Falco - Deep visibility"
What do you like best about Falco?

As a security analyst. I like its powerful intrusion detection feature that detects suspicious activities.

Also, its container and Kubernetes are a big support for organizations operating in cloud infrastructure.

It is open-source so can be used for free. Review collected by and hosted on G2.com.

What do you dislike about Falco?

Falcon sometimes releases unnecessary alerts due to its default settings.

Also, people with little knowledge in security field will find it hard to operate. Review collected by and hosted on G2.com.

There are not enough reviews of Falco for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Dynatrace Logo
Dynatrace
4.5
(1,341)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
2
Wiz Logo
Wiz
4.7
(710)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
Lacework FortiCNAPP Logo
Lacework FortiCNAPP
4.4
(382)
Lacework FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
4
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
5
Orca Security Logo
Orca Security
4.6
(221)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
6
AlgoSec Logo
AlgoSec
4.5
(195)
AlgoSec is a business-driven security management solution.
7
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(186)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
8
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(167)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
9
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
10
Snyk Logo
Snyk
4.5
(123)
Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.