We performed a comparison between Microsoft Defender for Cloud and OpenShift Container Platform based on real PeerSpot user reviews.
Find out in this report how the two Container Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution's robust security posture is the most valuable feature."
"Technical support is helpful."
"When we started out, our secure score was pretty low. We adopted some of the recommendations that Security Center set out and we were able to make good progress on improving it. It had been in the low thirties and is now in the upper eighties."
"The product has given us more insight into potential avenues for attack paths."
"The solution is very easy to deploy."
"Provides a very good view of the entire security setup of your organization."
"It's quite a good product. It helps to understand the infections and issues you are facing."
"Defender is a robust platform for dealing with many kinds of threats. We're protected from various threats, like viruses. Attacks can be easily minimized with this solution defending our infrastructure."
"The platform is easy to scale as it supports Windows worker node."
"OpenShift provides tools that tell me everything I have on a container, and I can make it on-premise or on a cloud infrastructure."
"The console or the GUI of OpenShift is awesome. You can do a lot of things from there. You can perform administration tasks as well as development tasks."
"The auto scalability feature, which is based on smart agendas, determined from pre-prepared rules is the most valuable feature. You can also create different routes for deployment. Deployment types can be provided with an identifier, such as an ARB deployment. This really helped in rolling out releases without disrupting services for the end-users."
"I think it's a pretty scalable tool...The solution's technical support has been pretty good."
"The banking transactions, inquiries, and account opening have been the most valuable."
"The solution is stable. However, it depends on the integrations of the solution on how stable it will be, such as what tools you integrate with."
"The most valuable feature for me in the OpenShift Container Platform is the option to manage different containers and environments and also being able to switch among them."
"Another thing is that Defender for Cloud uses more resources than CrowdStrike, which my current company uses. Defender for Cloud has two or three processes running simultaneously that consume memory and processor time. I had the chance to compare that with CrowdStrike a few days ago, which was significantly less. It would be nice if Defender were a little lighter. It's a relatively large installation that consumes more resources than competitors do."
"Azure Security Center takes a long time to update, compared to the on-premises version of Microsoft Defender."
"Sometimes, it's very difficult to determine when I need Microsoft Defender for Cloud for a special resource group or certain kinds of products. That's not an issue directly with the product, though."
"The product must improve its UI."
"The remediation process could be improved."
"The solution could improve by being more intuitive and easier to use requiring less technical knowledge."
"For Kubernetes, I was using Azure Kubernetes Service (AKS). To see that whatever is getting deployed into AKS goes through the correct checks and balances in terms of affinities and other similar aspects and follows all the policies, we had to use a product called Stackrox. At a granular level, the built-in policies were good for Kubernetes, but to protect our containers from a coding point of view, we had to use a few other products. For example, from a programming point of view, we were using Checkmarx for static code analysis. For CIS compliance, there are no CIS benchmarks for AKS. So, we had to use other plugins to see that the CIS benchmarks are compliant. There are CIS benchmarks for Kubernetes on AWS and GCP, but there are no CIS benchmarks for AKS. So, Azure Security Center fell short from the regulatory compliance point of view, and we had to use one more product. We ended up with two different dashboards. We had Azure Security Center, and we had Stackrox that had its own dashboard. The operations team and the security team had to look at two dashboards, and they couldn't get an integrated piece. That's a drawback of Azure Security Center. Azure Security Center should provide APIs so that we can integrate its dashboard within other enterprise dashboards, such as the PowerBI dashboard. We couldn't get through these aspects, and we ended up giving Reader security permission to too many people, which was okay to some extent, but when we had to administer the users for the Stackrox portal and Azure Security Center, it became painful."
"Agent features need to be improved. They support agents through Azure Arc or Workbench. Sometimes, we are not able to get correct signals from the machines on which we have installed these agents. We are not able to see how many are currently reporting to Azure Security Center, and how many are currently not reporting. For example, we have 1,000 machines, and we have enrolled 1,000 OMS agents on these machines to collect the log. When I look at the status, even though at some places, it shows that it is connected, but when I actually go and check, I'm not getting any alerts from those. There are some discrepancies on the agent, and the agent features are not up to the mark."
"I want to see more incorporation of native automation features; then, we could write a code, deploy it directly to OpenShift, and allow it to take care of the automated process. Using this method, we could write one application and have elements copy/pasted to other applications in the development process."
"Setting up OpenShift isn't easy. I rate it three out of ten for ease of setup. We're deploying it in three phases. They're in the second phase now. The total deployment time will be five months. We expect to complete the deployment this March. There are 13 people on three teams working on this deployment."
"OpenShift Container Platform needs to work on integrations."
"OpenShift has a pretty steep learning curve. It's not an easy tool to use. It's not only OpenShift but Kubernetes itself. The good thing is that Red Hat provides specific targeted training. There are five or six pieces of training where you can get certifications. The licenses for OpenShift are pretty expensive, so they could be cheaper because the competition isn't sleeping, and Red Hat must take that into account."
"The complexity of the installation could be reduced. While we got the necessary support, the instructions could be clearer."
"We've encountered challenges when transitioning applications between these environments."
"There is room for improvement with integration."
"The support costs are too high."
Microsoft Defender for Cloud is ranked 10th in Container Management with 46 reviews while OpenShift Container Platform is ranked 1st in Container Management with 36 reviews. Microsoft Defender for Cloud is rated 8.0, while OpenShift Container Platform is rated 8.2. The top reviewer of Microsoft Defender for Cloud writes "Provides multi-cloud capability, is plug-and-play, and improves our security posture". On the other hand, the top reviewer of OpenShift Container Platform writes "Provides automation that speeds up our process by 30% and helps us achieve zero downtime". Microsoft Defender for Cloud is most compared with AWS GuardDuty, Prisma Cloud by Palo Alto Networks, Microsoft Defender XDR, Wiz and Microsoft Defender for Endpoint, whereas OpenShift Container Platform is most compared with Amazon EKS, VMware Tanzu Mission Control, Nutanix Kubernetes Engine NKE, Amazon Elastic Container Service and NGINX Ingress Controller. See our Microsoft Defender for Cloud vs. OpenShift Container Platform report.
See our list of best Container Management vendors.
We monitor all Container Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.