No more typing reviews! Try our Samantha, our new voice AI agent.

Amazon EKS vs Red Hat Advanced Cluster Security for Kubernetes comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Amazon EKS
Ranking in Container Security
12th
Average Rating
8.4
Reviews Sentiment
6.2
Number of Reviews
96
Ranking in other categories
Container Management (1st)
Red Hat Advanced Cluster Se...
Ranking in Container Security
20th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Container Security category, the mindshare of Amazon EKS is 0.5%, up from 0.1% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 1.7%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Mindshare Distribution
ProductMindshare (%)
Amazon EKS0.5%
Red Hat Advanced Cluster Security for Kubernetes1.7%
Other97.8%
Container Security
 

Featured Reviews

Mahesh Dash - PeerSpot reviewer
DevOps Consultant at US Contract | Freelancer
Has enabled seamless infrastructure configuration while improving identity integration and monitoring capabilities
It has been since 2019 that I started using Amazon EKS. At that time, it was completely new, and many people were not using it just yet; it started from version 1.21, and right now we are on 1.33. Recently, 1.34 has been launched, but it's not yet available in the service catalog; we can see only 1.33. A lot of improvements have been made. We had numerous add-ons to install manually because Kubernetes is a completely different service than AWS cloud provider, and everyone has opted to use it. After opting, there is an identity that you have to maintain—one at Kubernetes level and one at the AWS provider level. You have to maintain one identity at IAM level and one within the cluster, Amazon EKS. A few things do not make sense within the add-ons, many of the secret providers that read the secret from Secrets Manager and then mount it as a volume. We use a service called EBS CSI driver, which reads the secrets or sensitive data from Secrets Manager and then mounts it as a volume to the pod at runtime. However, that doesn't have a dynamic feature where, if any changes happen in the secrets, it can read and populate in the environment. Sometimes consider your RDS password or OpenSearch password rotates. Amazon EKS doesn't have that feature to read the dynamic one and consider that the password has changed overnight; there is no functionality from the provider to see the changes and then restart the pod or fetch the new value. This often leads to downtime of 12 or even 6 hours, depending on when you realize it, so that needs improvement. Nonetheless, mostly on the add-on side, they have developed a lot; earlier we were installing them manually, but now with EKS auto mode, many things VPC CLI and pod identity service—around four plugins—are installed by default, which is a good thing. However, I believe there should be some solution that is self-contained, covering generic use cases. With the 1.33 release, they have addressed most of my earlier concerns, but I am still looking for some improvements, particularly in CloudWatch monitoring. In IT, we manage two aspects: either the system or the application. Currently, the application logs and monitoring are not very robust in CloudWatch; you can only find things if you are familiar with them. Fortunately, we are familiar, as most of the monitoring involves two types of databases: one is a time series for monitoring data, and the other is an indexing solution for a streaming service. This means we need to get the logs from each node, index them, and populate them on a screen. That part remains a separate service, but if they managed it within Amazon EKS service, where the monitoring is consolidated in one place, you wouldn't need to rely on Prometheus, Grafana, or different services. It would be advantageous to have a consolidated platform for EKS, as Kubernetes is leveraged; monitoring and logging should also be integrated simply by enabling parameters or tags. This would create a self-contained platform where people can onboard and start using it. Currently, I still need to enable logging and monitoring among other things myself; that shouldn't be the case after six or seven years in the market. On a scale from 1 to 10, I would rate Amazon EKS tech support an eight. Some individuals have a deep understanding of the services and can identify potential bottlenecks, especially with load balancer endpoints and certificate management. The shift from NGINX to AWS load balancers has diminished many previous issues. However, not every support engineer meets the same level of expertise, hence why I rate it a solid eight, which I consider decent.
Daniel Stevens - PeerSpot reviewer
Software Engineer at Galley
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I can use the autoscaling feature to manage and scale up infrastructure."
"EKS has security features that you can't find in competing solutions."
"I would recommend Amazon EKS to other organizations because it provides simple configuration, easy management, safety, granular access, and vast monitoring capabilities where we can easily monitor our clusters using CloudWatch."
"The solution's performance is good."
"Through Amazon EKS, we can have the blue-green deployment very easily."
"We recommend Amazon Cloud Services for its reliable support and minimum downtime."
"The deployment process for Amazon EKS is straightforward; you don't have to do anything basically, you just have to get the right image and the normal operation for Amazon EKS."
"The main benefit of using Amazon EKS is that it makes work more efficient and enables faster delivery."
"Offers easy management with authentication and authorization features"
"The most valuable feature of the solution is its monitoring feature."
"Segmentation is the most powerful feature."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"Scalability-wise, I rate the solution a nine out of ten."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"I am impressed with the tool's visibility."
"The most valuable feature is the ability to share resources."
 

Cons

"I encountered problems with the product’s documentation."
"One limitation I have found with using Amazon EKS is that there is a very big learning curve."
"Improvement is needed in reducing the complexity of using EKS."
"In comparison, the latency is a bit high with Amazon EKS. When we were researching about a year ago, Google offers almost forty milliseconds delay to Mongolia, as Amazon EKS in Hong Kong offers sixty milliseconds delay."
"There is room for improvement for Amazon EKS because we initially had some issues getting the logging out of it, since what they're providing into CloudTrail is what we get."
"The only important thing that needs to be improved is the EKS dashboard. It could be more user-friendly."
"They should enhance the Jira integration."
"Amazon EKS is not a solution that can be fully managed through automation, making it an area of concern where improvement is required."
"The testing process could be improved."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"Red Hat is somewhat expensive."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The support and specifications need to be up to date for the cluster technologies"
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
 

Pricing and Cost Advice

"The product is available at such a huge scale in the market since the resources that are offered under the tool are competitively priced and available at a much cheaper rate compared to other solutions."
"Amazon EKS is expensive."
"The solution is cheaper than one of its competitors."
"The tool's pricing is good."
"The price could be cheaper. I would rate it as seven out of ten."
"The product pricing depends on the specific requirements."
"The solution is quite costly and developers will start exploring other solutions or moving their workloads to other clouds if costs aren't reduced."
"The solution is pricey. The tool's pricing is monthly."
"The pricing model is moderate, meaning it is not very expensive."
"It's a costly solution"
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"We purchase a yearly basis license for the solution."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
20%
Computer Software Company
9%
Government
6%
Manufacturing Company
6%
Financial Services Firm
29%
Computer Software Company
8%
Government
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business36
Midsize Enterprise18
Large Enterprise49
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise4
 

Questions from the Community

What is your experience regarding pricing and costs for Amazon EKS?
Pricing for Amazon EKS is quite good, because you can choose the instances which are running under the hood. If you wanted to use smaller machine types, you can control your cost quite well. You ar...
What needs improvement with Amazon EKS?
One limitation I have found with using Amazon EKS is that there is a very big learning curve. It is very complicated to use the tool. I have used Google's GKE which offers an easier framework becau...
What advice do you have for others considering Amazon EKS?
Overall, Amazon EKS is a very good tool to use and it is commonly used in the industry. However, GKE is easier to use and some of the management is abstracted away, which is not the case with Amazo...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for the prevention part, but currently, we need to do it manually. I hear that Palo Al...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling, and everything else.
What advice do you have for others considering Red Hat Advanced Cluster Security for Kubernetes?
The tool's policy management supports our company's compliance efforts since any corporate entity or enterprise must follow specific regulations, which include periodic analysis and configuration r...
 

Also Known As

Amazon Elastic Kubernetes Service
StackRox
 

Overview

 

Sample Customers

GoDaddy, Pearson, FICO, Intuit, Verizon, Honeywell, Logicworks, RetailMeNot, LogMeIn, Conde Nast, mercari, Trainline, Axway
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Amazon EKS vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.