We performed a comparison between Red Hat Advanced Cluster Security for Kubernetes and Symantec Data Center Security based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Container Security."With PingSafe, it's easy to onboard new accounts."
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"We really appreciate the Slack integration. When we have an incident, we get an instant notification. We also use Joe Sandbox, which Singularity can integrate with, so we can verify if a threat is legitimate."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end."
"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"It is scalable, stable, and can detect any threat on a machine. It uses artificial intelligence and can lock down any virus."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"The technical support is good."
"The most valuable feature is the ability to share resources."
"It is easy to install and manage."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"Scalability-wise, I rate the solution a nine out of ten."
"I am impressed with the tool's visibility."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"The most valuable feature is the endpoint protection system."
"The advantage of Data Center Security is its ease of use and that it serves as a single unified platform, where I can apply all my security policies to protect that server."
"The monitoring in the management console allows us to find out what is going wrong, and it gets reports even before the user reports it."
"The tool will then detect any anomalies, such as an intruder who has breached the network, which can trigger the system lockdown feature if it's enabled and meets the defined threshold."
"The most valuable feature is the centralized console, which can handle different products that we have."
"The granularity of applying the policies is valuable."
"We use the product to prevent unauthorized access to data, systems, and servers. It provides essential features for data center security."
"The real strength lies in its straightforward approach, offering just two key policies: prevention and detection."
"We'd like to have better notifications. We'd like them to happen faster."
"There should be more documentation about the product."
"We've found a lot of false positives."
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"Scanning capabilities should be added for the dark web."
"Sometimes the Storyline ID is a bit wacky."
"Customized queries should be made easier to improve PingSafe."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The testing process could be improved."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The solution's visibility and vulnerability prevention should be improved."
"Red Hat is somewhat expensive."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
"The product blocks certain processes, even after allowlisting them."
"The support is very bad. They're not fast at all. Trend Micro's support is much better."
"A user or administrator making the policy in the DCS should have a very thorough knowledge of the operating system or policy making. You have to be very specific about the data structure."
"This solution clashes with Microsoft defender, which results in performance degradation on the machine."
"There is room for improvement in enhancing its graphical user interface for a more user-friendly experience."
"Could have better reporting capabilities and better support."
"Adding more compatibility with common products like Microsoft would be a plus."
"They need to develop a more flexible product that can be scaled such that it fits well into a small business or a bigger, enterprise-level solution."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
More Symantec Data Center Security Pricing and Cost Advice →
Red Hat Advanced Cluster Security for Kubernetes is ranked 16th in Container Security with 10 reviews while Symantec Data Center Security is ranked 12th in Cloud and Data Center Security with 11 reviews. Red Hat Advanced Cluster Security for Kubernetes is rated 8.4, while Symantec Data Center Security is rated 7.6. The top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". On the other hand, the top reviewer of Symantec Data Center Security writes "A robust solution that provides comprehensive protection for data centers, offering agentless security, powerful intrusion prevention, and a wide range of security features". Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and BMC Helix Cloud Security, whereas Symantec Data Center Security is most compared with Trend Micro Deep Security, Symantec Endpoint Security, VMware NSX, Akamai Guardicore Segmentation and Illumio.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.