We performed a comparison between Azure Kubernetes Service (AKS) and Red Hat OpenShift based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Container Security."We noted immediate benefits from using the solution."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"Cloud Native Security is a tool that has good monitoring features."
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"As a frequently audited company, we value PingSafe's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security."
"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"The mean time to detect has been reduced."
"It is a stable solution."
"Its support team resolves technical issues accurately."
"Compliance is easy right out-of-the-box with integration to Azure Security, Azure Active Directory, and Azure Policies."
"I found the Helm deployment feature of the solution valuable."
"The serverless capability and auto scale feature are the most valuable."
"It employs high availability."
"The most valuable feature is the autoscaling and self-healing."
"The most valuable features of AKS are the full array of capabilities and robust security."
"I like OCP, and the management UI is better than the open-source ones."
"The solution provides a lot of flexibility to the application team for running their applications in the container platform, without needing to monitor the entire infrastructure all the time. It automatically scales and automatically self-heals. There is also a mechanism to alert the team in case it is over-committing or overutilizing the application."
"The company had a product called device financing, where the company worked as a partner with Google. It allowed customers to take mobile phones on loan or via credit. When we migrated those services to OpenShift in February last year, we were able to sell over 100,000 devices in a single day, which was very good."
"This solution helps us to account for peak seasons involving higher demand than usual. It also gives us confidence in the security of our overall systems."
"The most valuable feature of OpenShift is the security context constraint (SCC). The solution’s security throughout the stack is good. And security context constraints provide port-level security. It's a granular level of control, where you can give privileges to certain users to work on certain applications."
"Valuable features include auto-recreate of pod if pod fails; fast rollback, with one click, to previous version."
"Two stand-out features are the security model and value-add features that don't exist in Upstream Kubernetes."
"The product's initial setup is very easy, especially compared to AWS."
"We can customize security policies but lack auditing capabilities."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"PingSafe can improve by eliminating 100 percent of the false positives."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"We had a glitch in PingSafe where it fed us false positives in the past."
"Its integration functions could be enhanced."
"AKS could enhance its functionality by introducing a blueprint feature that streamlines and expedites the process. With a blueprint, users can leverage pre-defined configurations, including some common survey elements, reducing the need for extensive customization and allowing us to focus on our core business activities. Additionally, if the blueprint covers security aspects, it would be greatly beneficial, as it eliminates the need for us to build security expertise from scratch. Currently, we encounter challenges during cloud onboarding, security implementation, and adapting to Kubernetes. Although Microsoft may not consider these as their direct responsibility, providing a blueprint similar to what they offer to developers would be highly advantageous."
"This is a fairly expensive solution, which can make it prohibitive for smaller organizations."
"We would like to see the addition of a service report from the server for this solution, so that we can monitor the health of server operations."
"The initial setup of AKS is complicated. The setup depends on the cluster, nodes, and lots of other things. There are also lots of extremely critical small devices. Moreover, you will have to pay them even while setting up the solution. It is not like you setup first and then pay for it."
"Unfortunately, when a microservice fails, Azure can take up to 60 seconds to broadcast an alert to the monitoring agents."
"I would like to see the stability get more synchronized."
"It can be tough to access the servers when onboarding."
"One area for improvement is the documentation. They need to make it a little bit more user-friendly. Also, if you compare certain features and the installation process with Rancher, Rancher is simpler."
"Some of the storage services and integrations with third-party tools should be made possible."
"The solution needs to support the new features in Kubernetes more quickly."
"The tool lacks some features to make it compliant with Kubernetes"
"The interface could be simplified a bit more."
"The solution only offers support for one server."
"There are challenges related to additional security layers, connectivity compliance for endpoints, and integration."
"My team has found some bugs in OpenShift due to continuous integration, and this is an area for improvement in the platform. RedHat should fix the bugs. Another area for improvement in OpenShift is that upgrading clusters can be challenging, resulting in downtime. Application support also needs improvement in OpenShift because the platform doesn't support all applications in the cloud. I'd like upgraded storage in the next release of OpenShift, especially when I need to do a DR exercise. It would also be good if the platform allows mirroring with another cluster, or more portability in terms of moving applications to another cluster."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Azure Kubernetes Service (AKS) Pricing and Cost Advice →
Azure Kubernetes Service (AKS) is ranked 13th in Container Security with 32 reviews while Red Hat OpenShift is ranked 4th in PaaS Clouds with 54 reviews. Azure Kubernetes Service (AKS) is rated 8.2, while Red Hat OpenShift is rated 8.4. The top reviewer of Azure Kubernetes Service (AKS) writes "Decreases administrative burdens and costs, has good diagnostic tools, and is easy to deploy". On the other hand, the top reviewer of Red Hat OpenShift writes "Provides us with the flexibility and efficiency of cloud-native stacks while enabling us to meet regulatory constraints". Azure Kubernetes Service (AKS) is most compared with CrowdStrike Falcon Cloud Security, SUSE Rancher, Qualys VMDR and Tenable.io Container Security, whereas Red Hat OpenShift is most compared with Amazon AWS, Pivotal Cloud Foundry, Microsoft Azure, Google Cloud and Oracle Cloud Infrastructure (OCI).
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.