We performed a comparison between Azure Kubernetes Service (AKS) and CrowdStrike Falcon Cloud Security based on real PeerSpot user reviews.
Find out in this report how the two Container Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is fairly simple. Anybody can use it."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"PingSafe's most valuable feature is its unified console."
"The visibility is the best part of the solution."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"The tool identifies issues quickly."
"The UI is responsive and user-friendly."
"The real-time detection and response capabilities overall are great."
"The most valuable feature is the autoscaling and self-healing."
"Its support team resolves technical issues accurately."
"Integration and automation are the best features of the solution."
"The most valuable feature of the solution is the diagnostic service."
"Compliance is easy right out-of-the-box with integration to Azure Security, Azure Active Directory, and Azure Policies."
"The most valuable features of AKS are the full array of capabilities and robust security."
"The solution is a managed Kubernetes, so much of the maintenance in the control plane is handled automatically by the cloud service provider."
"Has a good management feature monitored by the cloud service provider."
"The most valuable feature of Falcon Cloud Security is its comprehensive threat-hunting ability."
"Technical support is helpful."
"Cloud security posture management (CSPM) is most valuable."
"It is fully cloud-based, so we don't need to invest in third-party agents repeatedly."
"The most valuable features of CrowdStrike Falcon Cloud Security are Cloud Security Posture Management and Cloud Workload Protection, offering more visibility and protection across our cloud environment."
"It's easy to gather insights and conduct analysis about existing threats."
"The most significant benefit is how quickly malware and other malicious attacks are detected."
"The immediate mitigation of potential threats and instant alerts are valuable."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"We've found a lot of false positives."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"While PingSafe offers real-time response, there is room for improvement in alert accuracy."
"PingSafe's current documentation could be improved to better assist customers during the cluster onboarding process."
"Their search feature could be better."
"We don't get any notifications from PingSafe when the clusters are down."
"There are a lot of features that should be included with the AKS."
"Sometimes, it fails to provide specific metrics."
"I would like to see the stability get more synchronized."
"The product needs to support a UI dashboard. I have to execute every single command to check the status of services which takes time."
"The product’s cost could be reduced."
"AKS has the potential to enhance pricing by enabling us to explore ways to increase cost transparency. However, it's important to note that this refers to computation costs rather than client costs. Our objective is to optimize efficiency and minimize unnecessary expenses. Therefore, we aim to identify which services within the platform can benefit from improved consumption patterns. This is the focus of our ongoing research, with the goal of maximizing computational power within the cluster. We aim to avoid situations where resources are reserved but not utilized effectively. Additionally, our strong emphasis on security ensures that we adhere to all relevant compliance standards, bolstering our overall trustworthiness."
"Azure Kubernetes Service (AKS) is not up to optimal standards when it comes to capturing logs and visualization."
"More control over Infra scanning can be introduced."
"It gets the work done, but the main problem with the solution is that if you remediate anything, it takes 45 days for you to get any of the features displayed on the dashboard. This is the real weakness of CrowdStrike. Their customer support is also not ready to help with it. If you remediate any cloud vulnerability that they are giving you, such as removing a host from your organization, it takes around 45 days for them to remove it from their console."
"The CrowdStrike dashboard currently lacks a username field."
"CrowdStrike Falcon Cloud Security is expensive."
"Different file options should be available, and clients should be able to select from the options."
"There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage."
"Customers would benefit it CrowdStrike adopted some of SentinelOne's technologies."
"Incorporating threat intelligence into the system would be a valuable addition."
"The only challenge lies in token verification."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Azure Kubernetes Service (AKS) Pricing and Cost Advice →
More CrowdStrike Falcon Cloud Security Pricing and Cost Advice →
Azure Kubernetes Service (AKS) is ranked 13th in Container Security with 34 reviews while CrowdStrike Falcon Cloud Security is ranked 9th in Container Security with 15 reviews. Azure Kubernetes Service (AKS) is rated 8.4, while CrowdStrike Falcon Cloud Security is rated 8.6. The top reviewer of Azure Kubernetes Service (AKS) writes "Decreases administrative burdens and costs, has good diagnostic tools, and is easy to deploy". On the other hand, the top reviewer of CrowdStrike Falcon Cloud Security writes "Enhances the overall safety of our company's environment from cyber threats". Azure Kubernetes Service (AKS) is most compared with Red Hat OpenShift, SUSE Rancher, Qualys VMDR and Tenable.io Container Security, whereas CrowdStrike Falcon Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Wiz, Qualys VMDR and Snyk. See our Azure Kubernetes Service (AKS) vs. CrowdStrike Falcon Cloud Security report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.