Docker vs Legit Security comparison

Cancel
You must select at least 2 products to compare!
Docker Logo
53 views|48 comparisons
100% willing to recommend
Legit Security Logo
324 views|161 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Docker and Legit Security based on real PeerSpot user reviews.

Find out in this report how the two Software Supply Chain Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Docker vs. Legit Security Report (Updated: May 2024).
772,649 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Containerization is the most valuable feature. I can communicate to the Docker containers using other containers.""It is neat and very flexible.""Feature-wise, Docker is very user-friendly...The solution's initial setup process was straightforward.""The solution's most valuable feature is the Dockerfile, which makes the life of developers easy. Developers get a real understanding of container creation.""The lift and shift creates a lightweight image.""The most valuable feature of Docker is its integration with other solutions, such as KVM and AlmaLinux.""The most valuable feature is that it is cost-saving.""The solution is stable."

More Docker Pros →

"Legit has increased my security posture to a level I couldn't achieve before. I don't need to worry as much about what's happening within my developer environments. I can rest assured that my vulnerabilities are being detected.""The true value proposition of Legit lies not in its features but in its ability to support our product security program's focus on creating guardrails instead of toll gates.""Legit has had a positive effect on our overall security posture.""We implemented Legit Security to gain visibility into all development teams and ensure that consistent controls are in place and accounted for on every route."

More Legit Security Pros →

Cons
"One item that could be improved is the overall stability of Docker.""We would like to see improvement in adding the node into the Docker Swarm cluster, as at present it is a little tricky and requires a lot of manual steps.""The volumes for persistent storage could be more user friendly right out of the box.""Docker can improve the integration with Microsoft Windows. It does not support native installations.""The command line interface could be more intuitive. I constantly struggle with it.""We'd like knowledge transfer to be easier.""Unfortunately, base images are not currently available.""They should provide proper documentation to understand the solution's cgroup process."

More Docker Cons →

"I would like them to have their own static code scanner, and I'd like them to have their own open-source software scanners.""Legit Security could do a little better with detecting publicly exposed keys. It's not bad. The detections that they are running get to everything eventually, but it would be great if they could increase some of that awareness.""The one we're working on right now is the ability to dynamically rerun development teams and groups.""One issue is that engineering teams don't always embed secrets in the same way, making it difficult for the tool to consistently identify them."

More Legit Security Cons →

Pricing and Cost Advice
  • "Docker is a free open-source solution. However, there is the Docker Enterprise which is a paid solution."
  • "There is a license needed to use Docker."
  • "We are using the open-source version of the solution."
  • "Docker is a free open-source solution."
  • "The current cost for us is nothing as an open source."
  • "This is an open-source solution, so there are no licensing costs."
  • "Docker is cost-effective and open-source."
  • "For commercial use, it's about $30 per month. The license itself isn't expensive, but if there are many users, the price becomes high."
  • More Docker Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Software Supply Chain Security solutions are best for your needs.
    772,649 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:We are using Docker to host applications.
    Top Answer:Since Docker is an open-source solution, it is free of cost.
    Top Answer:We are facing multiple issues with the solution's stability.
    Top Answer:The true value proposition of Legit lies not in its features but in its ability to support our product security program's focus on creating guardrails instead of toll gates.
    Top Answer:Legit Security's secret detection works. However, there are some limitations to its effectiveness. One issue is that engineering teams don't always embed secrets in the same way, making it difficult… more »
    Ranking
    Views
    53
    Comparisons
    48
    Reviews
    40
    Average Words per Review
    394
    Rating
    8.6
    Views
    324
    Comparisons
    161
    Reviews
    4
    Average Words per Review
    1,416
    Rating
    10.0
    Comparisons
    Learn More
    Legit Security
    Video Not Available
    Overview

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development – desktop and cloud. Docker’s comprehensive end to end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle.

    Legit Security provides application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attack. The platform’s unified application security control plane and automated SDLC discovery and analysis capabilities provide visibility and security control over rapidly changing environments and allow security issues to be prioritized based on context and business criticality to improve security team efficiency and effectiveness.

    Sample Customers
    Information Not Available
    Google, NYSE, Kraft-Hienz, Takeda Pharmaceuticals, and many other large enterprise and Fortune 500 customers. Learn more by going to: https://www.legitsecurity.com/...
    Top Industries
    REVIEWERS
    Financial Services Firm21%
    Energy/Utilities Company10%
    Non Profit10%
    Insurance Company7%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Insurance Company11%
    Financial Services Firm9%
    University7%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Financial Services Firm11%
    Pharma/Biotech Company11%
    University10%
    Company Size
    REVIEWERS
    Small Business36%
    Midsize Enterprise7%
    Large Enterprise57%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise17%
    Large Enterprise61%
    VISITORS READING REVIEWS
    Small Business32%
    Midsize Enterprise16%
    Large Enterprise52%
    Buyer's Guide
    Docker vs. Legit Security
    May 2024
    Find out what your peers are saying about Docker vs. Legit Security and other solutions. Updated: May 2024.
    772,649 professionals have used our research since 2012.

    Docker is ranked 5th in Software Supply Chain Security with 40 reviews while Legit Security is ranked 7th in Software Supply Chain Security with 4 reviews. Docker is rated 8.6, while Legit Security is rated 10.0. The top reviewer of Docker writes "Easy to deploy with an impressive networking feature". On the other hand, the top reviewer of Legit Security writes "Correlates information based on the integrations I have, which is extremely helpful". Docker is most compared with Mirantis Container Runtime, Rancher Labs, VMware Tanzu Mission Control and Nutanix Kubernetes Engine NKE, whereas Legit Security is most compared with Snyk, Ox Security, Cycode and Cider. See our Docker vs. Legit Security report.

    See our list of best Software Supply Chain Security vendors.

    We monitor all Software Supply Chain Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.