We performed a comparison between Red Hat Advanced Cluster Security for Kubernetes and CrowdStrike Falcon Cloud Security based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Features: Red Hat Advanced Cluster Security for Kubernetes receives praise for its resource-sharing capabilities, segmentation, reliable performance, and user-friendly web interface. CrowdStrike Falcon Cloud Security was lauded for its strong adherence to security best practices. It particularly excels in endpoint protection and its ability to leverage machine learning and AI. Red Hat Advanced Cluster Security for Kubernetes could improve by enhancing testing capabilities, making command line and configuration processes easier, and incorporating zero trust and access control measures. CrowdStrike Falcon Cloud Security could improve its Kubernetes and GCP support.
Service and Support: Customers using Red Hat Advanced Cluster Security for Kubernetes gave feedback and regard the support they receive as being of high quality. CrowdStrike Falcon Cloud Security users are generally content with the support team's assistance and promptness.
Ease of Deployment: Red Hat Advanced Cluster Security for Kubernetes requires considerable time and effort to deploy due to its complex configuration process. The setup for CrowdStrike Falcon Cloud Security was deemed easy, but some users struggled with the Kubernetes implementation.
Pricing: Red Hat Advanced Cluster Security for Kubernetes is moderately priced and cheaper if purchased in a bundle with other Red Hat solutions. Users consider the pricing of CrowdStrike Falcon Cloud Security to be fair, but it may be pricier than on-premises alternatives.
Comparison Results: Red Hat Advanced Cluster Security for Kubernetes is preferred over CrowdStrike Falcon Cloud Security. Red Hat offers a hybrid cloud approach and flexible integration. The solution's resource-sharing and segmentation features are highly praised. Red Hat is considered moderately priced, while CrowdStrike is seen as fair but slightly expensive.
"It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"PingSafe's most valuable feature is its unified console."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"The user interface is well-designed and easy to navigate."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"The agentless vulnerability scanning is great."
"The most valuable feature of CrowdStrike Falcon Cloud Security is its lightweight sensor, taking minimal space and not impacting server performance."
"Technical support is helpful."
"It's easy to gather insights and conduct analysis about existing threats."
"The RTR feature stands out as particularly valuable to me due to its capability to log into machines."
"The initial setup is easy ."
"CrowdStrike utilizes signatureless technology, eliminating the need for regular signature updates on endpoint systems."
"The most significant benefit is how quickly malware and other malicious attacks are detected."
"Cloud security posture management (CSPM) is most valuable."
"It is easy to install and manage."
"The technical support is good."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"The most valuable feature of the solution is its monitoring feature."
"Scalability-wise, I rate the solution a nine out of ten."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"I am impressed with the tool's visibility."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"The categorization of the results from the vulnerability assessment could be improved."
"Customized queries should be made easier to improve PingSafe."
"They need more experienced support personnel."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"They can work on policies based on different compliance standards."
"I would like additional integrations."
"There should be more documentation about the product."
"The only suggestion for improvement would be the pricing."
"CrowdStrike Falcon Cloud Security is expensive."
"Different file options should be available, and clients should be able to select from the options."
"Incorporating threat intelligence into the system would be a valuable addition."
"There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage."
"The UI part needs to be improved."
"The CrowdStrike dashboard currently lacks a username field."
"The only challenge lies in token verification."
"The solution's visibility and vulnerability prevention should be improved."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The solution's price could be better."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More CrowdStrike Falcon Cloud Security Pricing and Cost Advice →
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
CrowdStrike Falcon Cloud Security is ranked 9th in Container Security with 13 reviews while Red Hat Advanced Cluster Security for Kubernetes is ranked 16th in Container Security with 10 reviews. CrowdStrike Falcon Cloud Security is rated 8.8, while Red Hat Advanced Cluster Security for Kubernetes is rated 8.4. The top reviewer of CrowdStrike Falcon Cloud Security writes "Enhances the overall safety of our company's environment from cyber threats". On the other hand, the top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". CrowdStrike Falcon Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Wiz, Qualys VMDR and Orca Security, whereas Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, Qualys VMDR and Sysdig Secure. See our CrowdStrike Falcon Cloud Security vs. Red Hat Advanced Cluster Security for Kubernetes report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.