We performed a comparison between BMC Helix Cloud Security and Mirantis Container Cloud based on real PeerSpot user reviews.
Find out in this report how the two Cloud Workload Protection Platforms (CWPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"Cloud Native Security offers attack path analysis."
"The agentless vulnerability scanning is great."
"We really appreciate the Slack integration. When we have an incident, we get an instant notification. We also use Joe Sandbox, which Singularity can integrate with, so we can verify if a threat is legitimate."
"It's helped free up staff time so that they can work on other projects."
"The real-time detection and response capabilities overall are great."
"The ease of use of the platform is very nice."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"Role-based security is a valuable feature."
"It's also multi-cloud. You can look at several cloud providers: AWS, Azure, or GCP."
"The best feature is time to value. With very minimal effort, you are able to have a cohesive view into your security posture on one or multiple cloud accounts, particularly if you are dealing with multicloud. If you have Azure and AWS deployments, you might have multiple subscriptions in Azure and usually multiple accounts in AWS. You may even be doing some GCP work (around Google Cloud Platform). It's very difficult to manage a common set of policies, even less reporting, across multiple subscriptions, accounts, and cloud environments. What BMC Helix Cloud Security does is provide a unified view or single pane of glass as to your baseline. Then, it also facilitates the ability for Level 1 or 2 operations support to take action and report on security vulnerabilities."
"The most valuable aspects of BMC Helix Cloud Security are its security features and regulatory compliance capabilities."
"The cool feature of Helix Cloud Security is that you can do all that — understand and remediate issues — in one dashboard, based on the different policies that are available for security, out-of-the-box."
"The features that I've found most valuable are its container security aspect. I also like its vulnerability management tools."
"You need to make an architectural runway before actually starting to implement Docker Compose, especially in a distributed environment."
"When you have Kubernetes, you can use Mirantis Container Cloud to manage your Kubernetes for easy access and security. It also helps you to manage your CI/CD system. It helps you to build a container-oriented developer workflow. So, if you're building an application in Kubernetes, it provides you with a Kubernetes engine."
"The product's most valuable feature is cloud simulation to predict application behavior on the cloud."
"It is a stable solution. It is nearly perfect. I would rate the stability a ten out of ten."
"If we compare legacy application support to Docker, it's a superior product."
"Docker is very helpful for taking the code from development and applying it to the end user."
"Now it is easier to set up the development environment and also to test the applications on the pipelines."
"This solution has cut down on our development time and allows us to spin off new instances for inner development, testing, productions, and security testing."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"There should be more documentation about the product."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"The could improve their mean time to detect."
"We are experiencing problems with Cloud Native Security reporting."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"We had a glitch in PingSafe where it fed us false positives in the past."
"I want the role-based security feature to be improved."
"BMC Helix Cloud Security has room for improvement in terms of integrating its various features."
"We've had some with issues connectors. The connectors have seemed to have caused a little bit of trouble, perhaps with the APIs trying to scan the environment. The only time I've had to reach out to tech support was for that. It seems it may not have been scanning correctly or I wasn't seeing data within a specific time. But we've set up a couple of connectors in the past couple of weeks and they actually scanned the AWS environment and we had data within about 10 minutes. It's working a lot faster and I think they're making improvements as they go."
"The UI could be more user-friendly."
"Every organization out there doesn't rely on just one control body. They use FISMA control. They may use HIPAA, CIS, PCI, or SOX, then blend them. One of the things that is now in big demand for BMC Helix Cloud Security is content. That's the next journey in its lifespan, making it easier for the community to share and collaborate on content for security controls that can be measured and remediated."
"The solution would benefit in improvements made to the storage, cleaning up information from the disk, and reading logs."
"An improvement would be automated testing."
"The solution's stability could be improved."
"Sometimes the basic support is a bit difficult if you have a firewall and cloud servers behind the firewall and then try to implement the backup solution, it is a bit difficult to do by yourself."
"There are a couple of things. Firstly, the vaultStore database within Container isn't as efficient as a standalone Container vault. This needs improvement."
"More integrations with other platforms would be beneficial."
"I feel that the product lacks to offer a proper health status of the images which are running, making it an area where improvements are required."
"The initial setup was quite complex."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
BMC Helix Cloud Security is ranked 25th in Cloud Workload Protection Platforms (CWPP) with 5 reviews while Mirantis Container Cloud is ranked 1st in Container Virtualization with 29 reviews. BMC Helix Cloud Security is rated 8.0, while Mirantis Container Cloud is rated 8.8. The top reviewer of BMC Helix Cloud Security writes "A highly scalable and straightforward solution with a knowledgeable support team". On the other hand, the top reviewer of Mirantis Container Cloud writes "An easy-to-manage solution that helps to manage web pages ". BMC Helix Cloud Security is most compared with Red Hat Advanced Cluster Security for Kubernetes, VMware Aria Operations, Threat Stack Cloud Security Platform, Greenqloud qstack and CloudBolt, whereas Mirantis Container Cloud is most compared with SUSE Rancher. See our BMC Helix Cloud Security vs. Mirantis Container Cloud report.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.