No more typing reviews! Try our Samantha, our new voice AI agent.

Aqua Cloud Security Platform vs DefectDojo comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Aqua Cloud Security Platform
Ranking in DevSecOps
13th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
16
Ranking in other categories
Cloud and Data Center Security (19th), Container Security (26th), Cloud Workload Protection Platforms (CWPP) (21st), Cloud-Native Application Protection Platforms (CNAPP) (19th), Software Supply Chain Security (17th)
DefectDojo
Ranking in DevSecOps
10th
Average Rating
8.0
Reviews Sentiment
6.6
Number of Reviews
1
Ranking in other categories
Vulnerability Management (42nd)
 

Mindshare comparison

As of April 2026, in the DevSecOps category, the mindshare of Aqua Cloud Security Platform is 3.9%, down from 5.2% compared to the previous year. The mindshare of DefectDojo is 4.3%, up from 1.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
DevSecOps Mindshare Distribution
ProductMindshare (%)
DefectDojo4.3%
Aqua Cloud Security Platform3.9%
Other91.8%
DevSecOps
 

Featured Reviews

Burak AKCAGUN - PeerSpot reviewer
Business Development Manager at Axoft Ukraine
A robust and cost-effective solution, excelling in scalability, on-premises support, and responsive technical support, making it well-suited for enterprises navigating stringent regulatory environment
The most crucial aspect is runtime protection, specifically image scanning before preproduction and deployment. Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment. This feature ensures that customers can identify any potential issues with the image, such as misconfigurations or vulnerabilities, before integrating it into their workloads and infrastructure. In their source pipeline, companies can identify issues before deploying changes. This is crucial because customers prefer resolving any problems or misconfigurations before the deployment process. Software change security, including GSPM Cloud, is a key feature customers seek in their infrastructure.
reviewer2267097 - PeerSpot reviewer
Integration and Solution Architect at a government with 501-1,000 employees
Easy to use with efficient vulnerability reporting and team collaboration
Use case, so all the reports from GitLeaks, DefectDojo, GitLeaks or dependency check or Trivy, they make reports, and we send this report to DefectDojo to have CVMs, Central Vulnerability Management. DefectDojo is Central Vulnerability Management. If you have a dashboard to set, we have…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"My advice would be to go for it."
"Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out, the amount of risk that we were introducing to the platform, and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access."
"The most valuable feature of Aqua Security is the scanner."
"It is a very good product from an environmental perspective."
"The ROI is clear; we could not live without it because now we are getting back a picture of the vulnerability and we are able to fix severe security and vulnerability bugs."
"Support is very helpful."
"The most helpful feature of Aqua Security is Drift Prevention, which is a feature that allows images to be immutable, and one of the main reasons we went with Aqua Security is because it provides strong protection when it comes to runtime security."
"The CSPM product is great at securing our cloud accounts and I really like the runtime protection for containers and functions too."
"With the pipeline of detection and DefectDojo, we are able to see the real vulnerabilities, and we fix them."
 

Cons

"Aqua Security lacks a lot in reporting. It provides all the open issues, but no actionable solution is provided."
"It's a bit hard to use the user roles. That was a bit confusing."
"We would like to see an improvement in the overview visibility that this solution offers."
"Aqua Security could improve the forwarding of logging into Splunk and into other tools, it should be easier."
"Aqua Security could provide more open documentation so that their learning resources can be more easily accessed and searched through online. Right now, a lot of the documentation is closed and not available to the public."
"They want to release improvements to their product to work with other servers because now they are more focused on the Kubernetes environment."
"In the next release, Aqua Security should add the ability to automatically send reports to customers."
"Sometimes I got stressed with the UI."
"We need something to notify the team responsible for a product when vulnerabilities are found."
 

Pricing and Cost Advice

"Dealing with licensing costs isn't my responsibility, but I know that the licenses don't depend on the number of users, but instead are priced according to your workload."
"Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle."
"They were reasonable with their pricing. They were pretty down-to-earth about the way they pitched their product and the way they tried to close the deal. They were one of the rare companies that approached the whole valuation in a way that made sense for our company, for our needs, and for their own requirements as well... They will accommodate your needs if they are able to understand them and they're stated clearly."
"The pricing of this solution could be improved."
"It comes at a reasonable cost."
Information not available
report
Use our free recommendation engine to learn which DevSecOps solutions are best for your needs.
885,444 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Computer Software Company
9%
Manufacturing Company
9%
Government
9%
Comms Service Provider
13%
Computer Software Company
11%
Financial Services Firm
11%
Construction Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise1
Large Enterprise10
No data available
 

Questions from the Community

What do you think of Aqua Security vs Prisma Cloud?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valuable feature and their speed of integration is very good. The initial setup was ...
What is your experience regarding pricing and costs for DefectDojo?
The pricing is great. It is much cheaper compared to other solutions. We don't want to pay for things we are able to do on our own.
What needs improvement with DefectDojo?
We need something to notify the team responsible for a product when vulnerabilities are found. We are able to attach a team or a manager for a product, however, we are not able to send them a notif...
What is your primary use case for DefectDojo?
Use case, so all the reports from GitLeaks, DefectDojo, GitLeaks or dependency check or Trivy, they make reports, and we send this report to DefectDojo to have CVMs, Central Vulnerability Managemen...
 

Also Known As

Aqua Security Platform, CloudSploit, Argon
No data available
 

Overview

 

Sample Customers

HPE Salesforce Telstra Ellie Mae Cathay Pacific HomeAway
Information Not Available
Find out what your peers are saying about GitLab, Snyk, Checkmarx and others in DevSecOps. Updated: March 2026.
885,444 professionals have used our research since 2012.