Try our new research platform with insights from 80,000+ expert users

Amazon EKS vs Lacework FortiCNAPP comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 22, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
3.3
Amazon EKS provides cost-effective cloud solutions with substantial savings, efficient scaling, and dynamic workload management, despite some EC2 cost concerns.
Sentiment score
6.9
Lacework FortiCNAPP enhances ROI by automating monitoring, integrating with Jira, reducing personnel needs, and improving security management.
Initially, not having them resulted in an unoptimized solution. However, with these tools in place, we witnessed a reduction of costs by approximately a third—if it was $100 beforehand, we brought costs down to $25.
We have cost explorer available, and a bill forecast based on usage allows us to determine whether resources are underutilized or overutilized.
It's a fast deployment, with very good documentation, and it's really helpful.
 

Customer Service

Sentiment score
6.0
Amazon EKS support is responsive and helpful, especially for paid plans, but non-paying users may experience slower response times.
Sentiment score
7.8
Lacework FortiCNAPP's customer service is valued for proactive communication, Slack integration, and reliable technical support despite occasional delays.
We didn't need to manage etcd and those control management tools; it's totally handled from the AWS side, making it very beneficial.
I believe there should be a recovery solution available for at least a few hours so that we might bring it back.
They will set up a call, guide us, or provide solutions regarding integration with AWS or Amazon EKS.
 

Scalability Issues

Sentiment score
5.4
Amazon EKS is praised for its scalability, cost efficiency, flexibility, and effective multi-region and resource management capabilities.
Sentiment score
8.0
Lacework FortiCNAPP is praised for scalability, adaptable across various environments, with minor licensing challenges noted by users.
The ability to scale based on requirements by deploying additional containers is a strong point for Kubernetes.
This allows us to scale our applications or APIs as needed, offering reliability through the automation of scaling processes.
If any node is not ready, the cluster autoscaler ensures that it is removed from the AWS auto-scaling group and replaces it with a new node in the cluster.
 

Stability Issues

Sentiment score
6.4
Amazon EKS is praised for stability, reliability, and effective AWS support despite minor connectivity challenges, rating 8-10 by users.
Sentiment score
7.4
Lacework FortiCNAPP demonstrates stable performance with minimal issues and rare non-disruptive delays, fostering user confidence in its capabilities.
There are multiple availability zones in the regions, meaning no single point of failure.
The control plane is quite stable in Amazon EKS, and I find it to be 100% available.
We haven't faced any challenges, and it consistently delivers on its committed SLA.
 

Room For Improvement

Amazon EKS needs improvements in setup, support, integration, security, and automation to enhance functionality and user experience.
Lacework FortiCNAPP enhancements focus on visibility, IAM controls, usability, integration, and granularity in alert management and reporting.
Simplifying these will enable more people, not just those with strong foundational knowledge, to work effectively with these services.
Amazon EKS can be improved by having the maintenance of Kubernetes versions managed better, as everything is handled by the Kubernetes team and possibly a separate team at AWS.
Adding logging would be a valuable improvement.
 

Setup Cost

Amazon EKS offers a scalable, pay-as-you-go model, appealing to enterprises but potentially expensive for startups.
Lacework FortiCNAPP offers stable, competitive pricing, starting at $80,000 annually, with a unique, refined licensing structure.
The EKS service itself is free, but you will incur costs for the VMs used as nodes in that cluster.
If you want to monitor costs effectively, applying separate tools and acting accordingly in advance is essential.
The pricing structure is beneficial for large companies who pay for what they use, but it is not affordable for startups.
 

Valuable Features

Amazon EKS offers scalable, cost-effective Kubernetes management with security, ideal for cloud-native applications through easy integrations and auto-scaling.
Lacework FortiCNAPP excels with ease of use, machine learning anomaly detection, compliance reports, and seamless multi-cloud security integration.
The most beneficial aspect of Amazon EKS is that it helps manage the Kubernetes master node, so I don't need to maintain the master node, including tasks like upgrading.
The main benefits that I received from using Amazon EKS are that it is a managed cluster and offers simplicity.
By default, if you just install Amazon EKS, you can deploy your application, but to have it enterprise-ready, you have to configure a number of other things that will boost productivity.
 

Categories and Ranking

Amazon EKS
Ranking in Container Security
12th
Average Rating
8.4
Reviews Sentiment
6.1
Number of Reviews
90
Ranking in other categories
Container Management (2nd)
Lacework FortiCNAPP
Ranking in Container Security
29th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
10
Ranking in other categories
Vulnerability Management (37th), Cloud Workload Protection Platforms (CWPP) (17th), Cloud Security Posture Management (CSPM) (24th), Cloud-Native Application Protection Platforms (CNAPP) (15th), Compliance Management (9th)
 

Mindshare comparison

As of October 2025, in the Container Security category, the mindshare of Amazon EKS is 0.2%, up from 0.1% compared to the previous year. The mindshare of Lacework FortiCNAPP is 1.9%, down from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
Amazon EKS0.2%
Lacework FortiCNAPP1.9%
Other97.9%
Container Security
 

Featured Reviews

Mahesh Dash - PeerSpot reviewer
Has enabled seamless infrastructure configuration while improving identity integration and monitoring capabilities
It has been since 2019 that I started using Amazon EKS. At that time, it was completely new, and many people were not using it just yet; it started from version 1.21, and right now we are on 1.33. Recently, 1.34 has been launched, but it's not yet available in the service catalog; we can see only 1.33. A lot of improvements have been made. We had numerous add-ons to install manually because Kubernetes is a completely different service than AWS cloud provider, and everyone has opted to use it. After opting, there is an identity that you have to maintain—one at Kubernetes level and one at the AWS provider level. You have to maintain one identity at IAM level and one within the cluster, Amazon EKS. A few things do not make sense within the add-ons, many of the secret providers that read the secret from Secrets Manager and then mount it as a volume. We use a service called EBS CSI driver, which reads the secrets or sensitive data from Secrets Manager and then mounts it as a volume to the pod at runtime. However, that doesn't have a dynamic feature where, if any changes happen in the secrets, it can read and populate in the environment. Sometimes consider your RDS password or OpenSearch password rotates. Amazon EKS doesn't have that feature to read the dynamic one and consider that the password has changed overnight; there is no functionality from the provider to see the changes and then restart the pod or fetch the new value. This often leads to downtime of 12 or even 6 hours, depending on when you realize it, so that needs improvement. Nonetheless, mostly on the add-on side, they have developed a lot; earlier we were installing them manually, but now with EKS auto mode, many things VPC CLI and pod identity service—around four plugins—are installed by default, which is a good thing. However, I believe there should be some solution that is self-contained, covering generic use cases. With the 1.33 release, they have addressed most of my earlier concerns, but I am still looking for some improvements, particularly in CloudWatch monitoring. In IT, we manage two aspects: either the system or the application. Currently, the application logs and monitoring are not very robust in CloudWatch; you can only find things if you are familiar with them. Fortunately, we are familiar, as most of the monitoring involves two types of databases: one is a time series for monitoring data, and the other is an indexing solution for a streaming service. This means we need to get the logs from each node, index them, and populate them on a screen. That part remains a separate service, but if they managed it within Amazon EKS service, where the monitoring is consolidated in one place, you wouldn't need to rely on Prometheus, Grafana, or different services. It would be advantageous to have a consolidated platform for EKS, as Kubernetes is leveraged; monitoring and logging should also be integrated simply by enabling parameters or tags. This would create a self-contained platform where people can onboard and start using it. Currently, I still need to enable logging and monitoring among other things myself; that shouldn't be the case after six or seven years in the market. On a scale from 1 to 10, I would rate Amazon EKS tech support an eight. Some individuals have a deep understanding of the services and can identify potential bottlenecks, especially with load balancer endpoints and certificate management. The shift from NGINX to AWS load balancers has diminished many previous issues. However, not every support engineer meets the same level of expertise, hence why I rate it a solid eight, which I consider decent.
Carlos Vitrano - PeerSpot reviewer
Provides quick visibility and significantly reduces alerts
Its integrations with third-party SIEMs can be better. That is one of the things that we discussed with them. We have integrations, for instance, with Splunk. The data that we are receiving in Splunk is huge, and it is valid because Lacework has a bunch of data that they can provide to you. However, to be able to import the data and create alerts, we needed to do some work, so integration is one of the things that they can improve. For container security, how they scan images and how they provide results is something that they need to continue improving in terms of visibility. We already have visibility to several artifacts, but they can take that to the next level and see what else they can do. There can be better integrations with CI/CD pipelines. There can be improvements in terms of how we can take action or how we can report from the number of inventories they are providing to us.
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Computer Software Company
11%
Insurance Company
7%
Manufacturing Company
6%
Computer Software Company
15%
Financial Services Firm
13%
Manufacturing Company
7%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business32
Midsize Enterprise18
Large Enterprise38
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise4
Large Enterprise3
 

Questions from the Community

What do you like most about Amazon EKS?
The product's most valuable features are scalability, observability, and performance.
What is your experience regarding pricing and costs for Amazon EKS?
My opinion on the pricing and licensing of Amazon EKS is that it is quite varied, especially when doing projects in the African continent. It's quite expensive considering the local currency with r...
What needs improvement with Amazon EKS?
When we need to deploy the application, we require a large number of instances. Therefore, I hope and believe I will not face out-of-capacity issues in AWS, especially since I have not yet experien...
What is your experience regarding pricing and costs for Lacework?
My smaller deployments cost around 200,000 a year, which is probably not as expensive as Wiz.
What needs improvement with Lacework?
The solution lacks a cohesive data model, making extracting the necessary data from the platform challenging. It uses its own LQL query language, and each database across different layers and modul...
What is your primary use case for Lacework?
We use the tool for two main purposes: vulnerability management and monitoring. We utilize it to scan all of our IAC scripts and configurations across our AWS and GCP environments. Additionally, we...
 

Also Known As

Amazon Elastic Kubernetes Service
Polygraph, FortiCNP
 

Overview

 

Sample Customers

GoDaddy, Pearson, FICO, Intuit, Verizon, Honeywell, Logicworks, RetailMeNot, LogMeIn, Conde Nast, mercari, Trainline, Axway
J.Crew, AdRoll, Snowflake, VMWare, Iterable, Pure Storage, TrueCar, NerdWallet, and more.
Find out what your peers are saying about Amazon EKS vs. Lacework FortiCNAPP and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.