Try our new research platform with insights from 80,000+ expert users

Amazon EKS vs Red Hat Advanced Cluster Security for Kubernetes comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Amazon EKS
Ranking in Container Security
12th
Average Rating
8.4
Reviews Sentiment
6.1
Number of Reviews
90
Ranking in other categories
Container Management (2nd)
Red Hat Advanced Cluster Se...
Ranking in Container Security
22nd
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Container Security category, the mindshare of Amazon EKS is 0.2%, up from 0.1% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.2%, down from 2.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
Amazon EKS0.2%
Red Hat Advanced Cluster Security for Kubernetes2.2%
Other97.6%
Container Security
 

Featured Reviews

Mahesh Dash - PeerSpot reviewer
Has enabled seamless infrastructure configuration while improving identity integration and monitoring capabilities
It has been since 2019 that I started using Amazon EKS. At that time, it was completely new, and many people were not using it just yet; it started from version 1.21, and right now we are on 1.33. Recently, 1.34 has been launched, but it's not yet available in the service catalog; we can see only 1.33. A lot of improvements have been made. We had numerous add-ons to install manually because Kubernetes is a completely different service than AWS cloud provider, and everyone has opted to use it. After opting, there is an identity that you have to maintain—one at Kubernetes level and one at the AWS provider level. You have to maintain one identity at IAM level and one within the cluster, Amazon EKS. A few things do not make sense within the add-ons, many of the secret providers that read the secret from Secrets Manager and then mount it as a volume. We use a service called EBS CSI driver, which reads the secrets or sensitive data from Secrets Manager and then mounts it as a volume to the pod at runtime. However, that doesn't have a dynamic feature where, if any changes happen in the secrets, it can read and populate in the environment. Sometimes consider your RDS password or OpenSearch password rotates. Amazon EKS doesn't have that feature to read the dynamic one and consider that the password has changed overnight; there is no functionality from the provider to see the changes and then restart the pod or fetch the new value. This often leads to downtime of 12 or even 6 hours, depending on when you realize it, so that needs improvement. Nonetheless, mostly on the add-on side, they have developed a lot; earlier we were installing them manually, but now with EKS auto mode, many things VPC CLI and pod identity service—around four plugins—are installed by default, which is a good thing. However, I believe there should be some solution that is self-contained, covering generic use cases. With the 1.33 release, they have addressed most of my earlier concerns, but I am still looking for some improvements, particularly in CloudWatch monitoring. In IT, we manage two aspects: either the system or the application. Currently, the application logs and monitoring are not very robust in CloudWatch; you can only find things if you are familiar with them. Fortunately, we are familiar, as most of the monitoring involves two types of databases: one is a time series for monitoring data, and the other is an indexing solution for a streaming service. This means we need to get the logs from each node, index them, and populate them on a screen. That part remains a separate service, but if they managed it within Amazon EKS service, where the monitoring is consolidated in one place, you wouldn't need to rely on Prometheus, Grafana, or different services. It would be advantageous to have a consolidated platform for EKS, as Kubernetes is leveraged; monitoring and logging should also be integrated simply by enabling parameters or tags. This would create a self-contained platform where people can onboard and start using it. Currently, I still need to enable logging and monitoring among other things myself; that shouldn't be the case after six or seven years in the market. On a scale from 1 to 10, I would rate Amazon EKS tech support an eight. Some individuals have a deep understanding of the services and can identify potential bottlenecks, especially with load balancer endpoints and certificate management. The shift from NGINX to AWS load balancers has diminished many previous issues. However, not every support engineer meets the same level of expertise, hence why I rate it a solid eight, which I consider decent.
Daniel Stevens - PeerSpot reviewer
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Amazon EKS is a major tool for our application functionality and job purposes; it helps us at the orchestration level, allowing us to not worry about the entire deployment and service migration."
"The integration of Kubernetes with the AWS ecosystem is the best feature that Amazon EKS provides."
"The solution's performance is good."
"I like the scalability they're currently providing. Integration was very easy. It was a good experience."
"The solution has very good basic features."
"Amazon EKS helps significantly with the development process because I can rest without worries about outages; if an outage occurs, Amazon EKS automatically replaces nodes, which helps with automation in the development lifecycle."
"The product's most valuable features are scalability, observability, and performance."
"The main benefits from using Amazon EKS include it being a well-tested product that we can use to deploy our workload; its management system is very efficient, we can deploy things very easily and resolve our issues efficiently, and it has deep AWS integration and a managed control plane."
"It is easy to install and manage."
"Offers easy management with authentication and authorization features"
"The technical support is good."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"Scalability-wise, I rate the solution a nine out of ten."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"I am impressed with the tool's visibility."
"Segmentation is the most powerful feature."
 

Cons

"In comparison, the latency is a bit high with Amazon EKS. When we were researching about a year ago, Google offers almost forty milliseconds delay to Mongolia, as Amazon EKS in Hong Kong offers sixty milliseconds delay."
"Improvement is needed in reducing the complexity of using EKS. While services like EC2 are user-friendly, EKS and ECS present a steep learning curve with significant responsibilities."
"If that support is added within Amazon EKS itself to check all the config maps and everything within the UI itself, that would be very beneficial."
"Amazon EKS needs to improve customer operations and technical support."
"There is room for improvement in making Amazon EKS less error-prone when writing on the YAML file."
"We have not automated patches to be applied for the Amazon EKS cluster because it will resolve live production services."
"Amazon EKS could improve in its pricing model, particularly for medium-sized customers who might find the support costs high."
"I would like Amazon EKS to be easier to configure on various environments like Windows or Linux installations"
"The testing process could be improved."
"The solution's price could be better."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The solution's visibility and vulnerability prevention should be improved."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The support and specifications need to be up to date for the cluster technologies"
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
 

Pricing and Cost Advice

"The solution is quite costly and developers will start exploring other solutions or moving their workloads to other clouds if costs aren't reduced."
"Cloud based pay-as-you-go pricing"
"Amazon EKS is expensive."
"The price can be a problem for small-sized businesses."
"I would like a cheaper version of it."
"The tool's pricing is good."
"My company paid for the license."
"Amazon EKS has fair pricing. It's better in terms of pricing than other platforms."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"The pricing model is moderate, meaning it is not very expensive."
"We purchase a yearly basis license for the solution."
"It's a costly solution"
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Computer Software Company
11%
Insurance Company
7%
Manufacturing Company
6%
Financial Services Firm
27%
Computer Software Company
10%
Government
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business32
Midsize Enterprise18
Large Enterprise38
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise4
 

Questions from the Community

What do you like most about Amazon EKS?
The product's most valuable features are scalability, observability, and performance.
What is your experience regarding pricing and costs for Amazon EKS?
My opinion on the pricing and licensing of Amazon EKS is that it is quite varied, especially when doing projects in the African continent. It's quite expensive considering the local currency with r...
What needs improvement with Amazon EKS?
When we need to deploy the application, we require a large number of instances. Therefore, I hope and believe I will not face out-of-capacity issues in AWS, especially since I have not yet experien...
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security.
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for the prevention part, but currently, we need to do it manually. I hear that Palo Al...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling, and everything else.
 

Also Known As

Amazon Elastic Kubernetes Service
StackRox
 

Overview

 

Sample Customers

GoDaddy, Pearson, FICO, Intuit, Verizon, Honeywell, Logicworks, RetailMeNot, LogMeIn, Conde Nast, mercari, Trainline, Axway
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Amazon EKS vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.