We performed a comparison between Red Hat Advanced Cluster Security for Kubernetes and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Container Security."It is fairly simple. Anybody can use it."
"The agentless vulnerability scanning is great."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"The visibility PingSafe provides into the Cloud environment is a valuable feature."
"We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"Segmentation is the most powerful feature."
"It is easy to install and manage."
"The most valuable feature is the ability to share resources."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"The most valuable feature of the solution is its monitoring feature."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"I am impressed with the tool's visibility."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"It has improved functions by bringing us complete security on our clients' virtual environment."
"We find that their technical support team is always accessible and willing to assist."
"The vulnerability scanning reduces false positives by quite a bit."
"It serves its purpose and works well."
"In terms of valuable features, I would say its intrusion prevention. Each and every IP connecting to the server gets scanned so we know everyone who is accessing our server and we can block whichever IP's do not belong to us at the firewall."
"Very user-friendly interface, easy to understand."
"The most valuable feature is the virtual patching."
"There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"We've found a lot of false positives."
"I want PingSafe to integrate additional third-party resources. For example, PingSafe is compatible with Azure and AWS, but Azure AD isn't integrated with AWS. If PingSafe had that ability, it would enrich the data because how users interact with our AWS environment is crucial. All the identity-related features require improvement."
"The main area for improvement I want to see is for the platform to become less resource-intensive. Right now, it can slow down processes on the machine, and it would be a massive improvement if it were more lightweight than it currently is."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"The solution's price could be better."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"Red Hat is somewhat expensive."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The testing process could be improved."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
"Enhancements in agent performance are needed, specifically in reducing server utilization during scanning."
"There should be signature-based advanced and responsive features."
"Trend Micro is scalable if you have the budget for it."
"We'd like to have more application control."
"It would be helpful if they could send emails notifying their users about the recommended upgraded versions to address the newly discovered vulnerabilities."
"I would like to see an EDR function for the servers, as that would be useful for us."
"The default reports provided don't provide much insight."
"The tool should integrate SIM functionality. It should also improve customer support."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
Red Hat Advanced Cluster Security for Kubernetes is ranked 18th in Container Security with 10 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 81 reviews. Red Hat Advanced Cluster Security for Kubernetes is rated 8.4, while Trend Micro Deep Security is rated 8.6. The top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". On the other hand, the top reviewer of Trend Micro Deep Security writes "High availability, effective VPM, and responsive support". Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and Qualys VMDR, whereas Trend Micro Deep Security is most compared with Trend Vision One Endpoint Security, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.