We performed a comparison between Microsoft Defender for Cloud and Red Hat Advanced Cluster Security for Kubernetes based on real PeerSpot user reviews.
Find out in this report how the two Container Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"Cloud Native Security is user-friendly. Everything in the Cloud Native Security tool is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features."
"The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator."
"The ease of use of the platform is very nice."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"It is fairly simple. Anybody can use it."
"This is a platform as a service provided by Azure. We don't need to install or maintain Azure Security Center. It is a ready-made service available in Azure. This is one of the main things that we like. If you look at similar tools, we have to install, maintain, and update services. Whereas, Azure Security Center manages what we are using. This is a good feature that has helped us a lot."
"It takes very little effort to integrate it. It also gives very good visibility into what exactly is happening."
"Provides a very good view of the entire security setup of your organization."
"Using Security Center, you have a full view, at any given time, of what's deployed, and that is something that is very useful."
"Threat protection is comprehensive and simple."
"Everything is built into Azure, and if we go for cross-cloud development with Azure Arc, we can use most of the features. While it's possible to deploy and convert third-party applications, it is difficult to maintain, whereas Azure deployments to the cloud are always easier. Also, Microsoft is a big company, so they always provide enough support, and we trust the Microsoft brand."
"Defender for Cloud is a plug-and-play solution that provides continuous posture management once enabled."
"The most valuable features of this solution are the remote workforce capabilities and the general experience of the remote workforce."
"Segmentation is the most powerful feature."
"The most valuable feature of the solution is its monitoring feature."
"The most valuable feature is the ability to share resources."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"It is easy to install and manage."
"The technical support is good."
"Scalability-wise, I rate the solution a nine out of ten."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"While it is good, I think the solution's console could be improved."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"Maybe container runtime security could be improved."
"There is a bit of a learning curve for new users."
"The cost has the potential for improvement."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"There is room for improvement in the current active licensing model for PingSafe."
"Microsoft Defender could be more centralized. For example, I still need to go to another console to do policy management."
"I would suggest building a single product that addresses endpoint server protection, attack surface, and everything else in one solution. That is the main disadvantage with the product. If we are incorporating some features, we end up in a situation where this solution is for the server, and that one is for the client, or this is for identity, and that is for our application. They're not bundling it. Commercially, we can charge for different licenses, but on the implementation side, it's tough to help our end-customer understand which product they're getting."
"From a compliance standpoint, they can include some more metrics and some specific compliances such as GDPR."
"Microsoft can improve the pricing by offering a plan that is more cost-effective for small and medium organizations."
"The documentation could be much clearer."
"From my own perspective, they just need a product that is tailored to micro-segmentation so I can configure rules for multiple systems at once and manage it."
"As an analyst, there is no way to configure or create a playbook to automate the process of flagging suspicious domains."
"The documentation and implementation guides could be improved."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The solution's price could be better."
"The testing process could be improved."
"The solution's visibility and vulnerability prevention should be improved."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
Microsoft Defender for Cloud is ranked 3rd in Container Security with 46 reviews while Red Hat Advanced Cluster Security for Kubernetes is ranked 18th in Container Security with 10 reviews. Microsoft Defender for Cloud is rated 8.0, while Red Hat Advanced Cluster Security for Kubernetes is rated 8.4. The top reviewer of Microsoft Defender for Cloud writes "Provides multi-cloud capability, is plug-and-play, and improves our security posture". On the other hand, the top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". Microsoft Defender for Cloud is most compared with AWS GuardDuty, Prisma Cloud by Palo Alto Networks, Microsoft Defender XDR, Wiz and Microsoft Defender for Endpoint, whereas Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and Azure Kubernetes Service (AKS). See our Microsoft Defender for Cloud vs. Red Hat Advanced Cluster Security for Kubernetes report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.