Veracode and Amazon EKS serve different aspects of software development and deployment, with Veracode focusing on application security and Amazon EKS on container orchestration. Amazon EKS appears to have the upper hand due to its seamless scalability and integration within the AWS ecosystem.
Features: Veracode includes robust security scanning, compliance reporting, and application vulnerability assessment. Amazon EKS offers scalability, tight integration with AWS services, and streamlined container orchestration capabilities.
Room for Improvement: Veracode can improve with a more intuitive dashboard, better user interaction, and clearer documentation. Amazon EKS could benefit from easier cluster management, enhanced documentation, and simplified operational processes.
Ease of Deployment and Customer Service: Veracode is known for a straightforward deployment process but has mixed reviews on customer support responsiveness. Amazon EKS is praised for extensive documentation aiding deployment but sometimes lacks in customer support quality.
Pricing and ROI: Veracode users find setup costs reasonable but suggest more competitive pricing. Amazon EKS is seen as relatively expensive, justified by its comprehensive features and high ROI through integration with AWS.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
The scanners of Veracode bring status of the weaknesses in the current infrastructure. It scans and provides reports regarding the servers, the network, and the applications running on those servers.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
We have a paid subscription that provides priority support.
Amazon's technical support is quite good, especially for those who purchase support services.
Having to know what questions to ask is essential.
They are very responsive and quick to help with queries within our scope.
They respond very quickly since security is something critical.
The responsiveness and quality of documentation from Veracode are notable compared to other tools we are currently using.
As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
The ability to scale based on requirements by deploying additional containers is a strong point for Kubernetes.
This allows us to scale our applications or APIs as needed, offering reliability through the automation of scaling processes.
It can scale very well according to needs, and it doesn't have any issues with scalability.
Cloud solutions are easier to scale than on-premise solutions.
It has a good capacity to scale effectively.
In my experience, there has been 100 percent uptime.
SentinelOne Singularity Cloud is incredibly reliable.
The cloud console is very resilient.
Amazon EKS is very stable, and when properly configured, I rate it ten out of ten.
If the Veracode server is down, we experience many issues during the scan.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
Simplifying these will enable more people, not just those with strong foundational knowledge, to work effectively with these services.
A UI could help generate config files, simplifying the process for developers who are not architects.
Currently, some third-party plugins, like certain network plugins such as CNI, Calico CNI, or Cilium, are not fully supported.
If it could be integrated directly with code repositories such as Bitbucket or GitHub, without the need to create a pipeline to upload and decode code, it would simplify the code scan process significantly.
We had issues with scanning large applications. Scanning took a lot of time, so we kept it outside the DevOps pipeline to avoid delaying deployments.
A nice addition would be if it could be extended for scenarios with custom cleansers.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
The pricing structure is beneficial for large companies who pay for what they use, but it is not affordable for startups.
Now, it stands at six or seven due to optimizing our workload.
It's not the most expensive solution.
If there's a security gap, you'll never know the cost or effect.
Pricing-wise, I find it a bit expensive because it's based on the number of users requesting access to Veracode.
The real-time detection and response capabilities of SentinelOne Singularity Cloud impressive because it is a platform that uses artificial intelligence to determine what is normal and what is abnormal and can lock down any virus it may encounter.
We were shown how ransomware can be immediately stopped in real-time. That was huge.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
The most beneficial aspect of Amazon EKS is that it helps manage the Kubernetes master node, so I don't need to maintain the master node, including tasks like upgrading.
The scalability is excellent, allowing us to efficiently handle customer experiences and improve operational efficiency.
Now, with the serverless option, you can deploy everything and AWS handles the infrastructure.
It offers confidence by preventing exposure to vulnerabilities and helps ensure that we are not deploying vulnerable code into production.
The best features in Veracode include static analysis and the early detection of vulnerable libraries; it integrates with tools such as Jenkins.
It fixes issues directly in the IDE while you're doing it.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal manual intervention. Securing containerized applications and virtual machines, it excels in threat intelligence and endpoint protection. However, improvements are needed in performance during high workload periods, and more integrations with third-party tools and better documentation would be beneficial. Users often find the installation process complex, support response times slow, and the dashboard's navigation unintuitive.
What are the key features of SentinelOne Singularity Cloud Security?In specific industries, SentinelOne Singularity Cloud Security is implemented to safeguard critical data and infrastructure. Organizations in finance, healthcare, and technology depend on its real-time threat detection and automated response to protect sensitive information. Its ability to secure containerized applications and virtual machines is particularly valuable in dynamic environments where rapid scaling is necessary.
Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed Kubernetes service. Customers such as Intel, Snap, Intuit, GoDaddy, and Autodesk trust EKS to run their most sensitive and mission critical applications because of its security, reliability, and scalability.
EKS is the best place to run Kubernetes for several reasons. First, you can choose to run your EKS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Second, EKS is deeply integrated with services such as Amazon CloudWatch, Auto Scaling Groups, AWS Identity and Access Management (IAM), and Amazon Virtual Private Cloud (VPC), providing you a seamless experience to monitor, scale, and load-balance your applications. Third, EKS integrates with AWS App Mesh and provides a Kubernetes native experience to consume service mesh features and bring rich observability, traffic controls and security features to applications. Additionally, EKS provides a scalable and highly-available control plane that runs across multiple availability zones to eliminate a single point of failure.
EKS runs upstream Kubernetes and is certified Kubernetes conformant so you can leverage all benefits of open source tooling from the community. You can also easily migrate any standard Kubernetes application to EKS without needing to refactor your code.
Veracode is a leading provider of application security solutions, offering tools to identify, mitigate, and prevent vulnerabilities across the software development lifecycle. Its cloud-based platform integrates security into DevOps workflows, helping organizations ensure that their code remains secure and compliant with industry standards.
Veracode supports multiple application security testing types, including static analysis (SAST), dynamic analysis (DAST), software composition analysis (SCA), and manual penetration testing. These tools are designed to help developers detect vulnerabilities early in development while maintaining speed in deployment. Veracode also emphasizes scalability, offering features for enterprises that manage a large number of applications across different teams. Its robust reporting and analytics capabilities allow organizations to continuously monitor their security posture and track progress toward remediation.
What are the key features of Veracode?
What benefits should users consider in Veracode reviews?
Veracode is widely adopted in industries like finance, healthcare, and government, where compliance and security are critical. It helps these organizations maintain strict security standards while enabling rapid development through its integration with Agile and DevOps methodologies.
Veracode helps businesses secure their applications efficiently, ensuring they can deliver safe and compliant software at scale.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.