We performed a comparison between Microsoft Defender for Cloud and OpenShift Container Platform based on real PeerSpot user reviews.
Find out in this report how the two Container Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is that it's intuitive. It's very intuitive."
"It is very intuitive when it comes to policy administration, alerts and notifications, and ease of setting up roles at different hierarchies. It has also been good in terms of the network technology maps. It provides a good overview, but it also depends on the complexity of your network."
"The entire Defender Suite is tightly coupled, integrated, and collaborative."
"It works seamlessly on the Azure platform because it's a Microsoft app. Its setup is similar, so if you already have a Microsoft account, it just flows into it."
"The security alerts and correlated alerts are most valuable. It correlates the logs and gives us correlated alerts, which can be fed into any security information and event management (SIEM) tool. It is an analyzed correlation tool for monitoring security. It gives us alerts when there is any kind of unauthorized access, or when there is any malfunctioning in multifactor authentication (MFA). If our Azure is connected with Azure Security Center, we get to know what types of authentication are happening in our infra."
"Good compliance policies."
"It isn't a highly complex solution. It's something that a lot of analysts can use. Defender gives you a broad overview of what's happening in your environment, and it's a great solution if you're a Microsoft shop."
"The most valuable features of this solution are the remote workforce capabilities and the general experience of the remote workforce."
"More tools are available in OpenShift Container Platform to maintain and manage the clusters."
"The architecture is the best. The solution is scalable if you are on a container-based solution."
"Red Hat's security throughout the stack and software supply chain is good. It is a lightweight operating system. You don't have to worry about the security patches on the system. You can update the entire environment with security patches, which is a nice feature."
"Openshift is a very developer-friendly product."
"The tool's most valuable features include high availability, scalability, and security. Other features like advanced cluster management, advanced cluster security, and Red Hat Quay make it powerful for businesses. It also comes with features like OpenShift Virtualization."
"It’s user-friendly."
"The operating system has a live update and is more secure than any other. It's made for Atomic OS, a lightweight OS new to the market. I also like the source-to-image capabilities. The customer can directly deploy their applications from the repository. It's a highly flexible and easy way to deploy into production."
"The solution's security throughout the stack and the software supply chain is very reliable. When it was on-prem, it was by default secured by our company firewalls and security tools, and now it's in the cloud, which has its security and systems in place. This provides stability to our infrastructure."
"Microsoft can improve the pricing by offering a plan that is more cost-effective for small and medium organizations."
"The solution is quite complex. A lot of the different policies that actually get applied don't pertain to every client. If you need to have something open for a client application to work, then you get dinged for having a port open or having an older version of TLS available."
"For Kubernetes, I was using Azure Kubernetes Service (AKS). To see that whatever is getting deployed into AKS goes through the correct checks and balances in terms of affinities and other similar aspects and follows all the policies, we had to use a product called Stackrox. At a granular level, the built-in policies were good for Kubernetes, but to protect our containers from a coding point of view, we had to use a few other products. For example, from a programming point of view, we were using Checkmarx for static code analysis. For CIS compliance, there are no CIS benchmarks for AKS. So, we had to use other plugins to see that the CIS benchmarks are compliant. There are CIS benchmarks for Kubernetes on AWS and GCP, but there are no CIS benchmarks for AKS. So, Azure Security Center fell short from the regulatory compliance point of view, and we had to use one more product. We ended up with two different dashboards. We had Azure Security Center, and we had Stackrox that had its own dashboard. The operations team and the security team had to look at two dashboards, and they couldn't get an integrated piece. That's a drawback of Azure Security Center. Azure Security Center should provide APIs so that we can integrate its dashboard within other enterprise dashboards, such as the PowerBI dashboard. We couldn't get through these aspects, and we ended up giving Reader security permission to too many people, which was okay to some extent, but when we had to administer the users for the Stackrox portal and Azure Security Center, it became painful."
"The most significant areas for improvement are in the security of our identity and endpoints and the posture of the cloud environment. Better protection for our cloud users and cloud apps is always welcome."
"The solution's portal is very easy to use, but there's one key component that is missing when it comes to managing policies. For example, if I've onboarded my server and I need to specify antivirus policies, there's no option to do that on the portal. I will have to go to Intune to deploy them. That is one main aspect that is missing and it's worrisome."
"The documentation could be much clearer."
"I would suggest building a single product that addresses endpoint server protection, attack surface, and everything else in one solution. That is the main disadvantage with the product. If we are incorporating some features, we end up in a situation where this solution is for the server, and that one is for the client, or this is for identity, and that is for our application. They're not bundling it. Commercially, we can charge for different licenses, but on the implementation side, it's tough to help our end-customer understand which product they're getting."
"The product must improve its UI."
"We've encountered challenges when transitioning applications between these environments."
"The UI could be more user-friendly to drive tasks more effectively through the interface."
"Getting the solution quickly and troubleshooting quickly are both areas where I think it needs some work."
"The solution needs to introduce open ID connect integration for role-based access control."
"OpenShift Container Platform is an expensive solution, and its pricing could be improved."
"There should be a simplification of the overall cluster environment. It should require fewer resources. Just to run a simple Hello World app, it requires about seven servers, and that's just crazy. I understand that it is fully redundant, but it's prohibitively expensive to get something simple going."
"It is difficult to deploy the OpenShift cluster in a bare-metal environment."
"The initial setup can be hard."
Microsoft Defender for Cloud is ranked 10th in Container Management with 46 reviews while OpenShift Container Platform is ranked 1st in Container Management with 36 reviews. Microsoft Defender for Cloud is rated 8.0, while OpenShift Container Platform is rated 8.2. The top reviewer of Microsoft Defender for Cloud writes "Provides multi-cloud capability, is plug-and-play, and improves our security posture". On the other hand, the top reviewer of OpenShift Container Platform writes "Provides automation that speeds up our process by 30% and helps us achieve zero downtime". Microsoft Defender for Cloud is most compared with AWS GuardDuty, Prisma Cloud by Palo Alto Networks, Microsoft Defender XDR, Wiz and Microsoft Defender for Endpoint, whereas OpenShift Container Platform is most compared with Amazon EKS, VMware Tanzu Mission Control, Nutanix Kubernetes Engine NKE, Amazon Elastic Container Service and NGINX Ingress Controller. See our Microsoft Defender for Cloud vs. OpenShift Container Platform report.
See our list of best Container Management vendors.
We monitor all Container Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.