Try our new research platform with insights from 80,000+ expert users

Aqua Cloud Security Platform vs Legit Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Aqua Cloud Security Platform
Ranking in Software Supply Chain Security
9th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
16
Ranking in other categories
Cloud and Data Center Security (12th), Container Security (15th), Cloud Workload Protection Platforms (CWPP) (16th), Cloud-Native Application Protection Platforms (CNAPP) (13th), DevSecOps (8th)
Legit Security
Ranking in Software Supply Chain Security
7th
Average Rating
10.0
Reviews Sentiment
7.8
Number of Reviews
4
Ranking in other categories
Application Security Posture Management (ASPM) (5th)
 

Mindshare comparison

As of June 2025, in the Software Supply Chain Security category, the mindshare of Aqua Cloud Security Platform is 4.6%, up from 4.1% compared to the previous year. The mindshare of Legit Security is 4.8%, up from 4.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Software Supply Chain Security
 

Featured Reviews

Burak AKCAGUN - PeerSpot reviewer
A robust and cost-effective solution, excelling in scalability, on-premises support, and responsive technical support, making it well-suited for enterprises navigating stringent regulatory environment
The most crucial aspect is runtime protection, specifically image scanning before preproduction and deployment. Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment. This feature ensures that customers can identify any potential issues with the image, such as misconfigurations or vulnerabilities, before integrating it into their workloads and infrastructure. In their source pipeline, companies can identify issues before deploying changes. This is crucial because customers prefer resolving any problems or misconfigurations before the deployment process. Software change security, including GSPM Cloud, is a key feature customers seek in their infrastructure.
Tim Crothers - PeerSpot reviewer
Provides strong visibility, straightforward integration, and reduces the risk of attacks
Legit Security is a product that hyper-focuses on the various aspects of the software development pipeline. For example, if an engineer spins off a new project and stands up a new Git project, Legit automatically detects it, connects Snyk and other tools, and ensures the engineering team doesn't have to think about it. This way, we stay on top of security from the beginning. On the other hand, Legit provides a clear view of the controls around repositories. We have standards requiring code reviews and similar practices, and Legit shows us whether these are being followed. Additionally, Legit helps us identify unmaintained repositories, which often arise when engineering teams try something and leave it behind. This knowledge allows us to determine the appropriate action for these neglected projects. One area where Legit falls short is secret detection. While it functions well overall, the feature has a 10-20 percent false positive rate, requiring some manual intervention. Almost everything else works flawlessly. The true value proposition of Legit lies not in its features but in its ability to support our product security program's focus on creating guardrails instead of toll gates. Unlike traditional programs that require security reviews at specific stages, hindering development flow, we strive to partner with the product engineering team to ship secure code seamlessly within their existing workflows. Legit plays a crucial role in this by automatically notifying us of new projects, eliminating the need for manual communication. This partnership approach, enabled by Legit, allows us to work much closer with our engineering teams than ever before.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Their sandboxing service is also really good."
"Support is very helpful."
"The container security element of this product has been very valuable to our organization."
"The most valuable feature is the security."
"The most valuable feature of Aqua Security is the scanner."
"Valuable features include the ability to connect it to our Docker Hub where our images are stored, good integration with Slack, and the connection to the CV, to easily see which CVs are on each image."
"From what I understand, the initial setup is simple."
"Aqua Security helps us to check the vulnerability of image assurance and check for malware."
"Legit has had a positive effect on our overall security posture."
"We implemented Legit Security to gain visibility into all development teams and ensure that consistent controls are in place and accounted for on every route."
"Legit has increased my security posture to a level I couldn't achieve before. I don't need to worry as much about what's happening within my developer environments. I can rest assured that my vulnerabilities are being detected."
"The true value proposition of Legit lies not in its features but in its ability to support our product security program's focus on creating guardrails instead of toll gates."
 

Cons

"Since we are working from home, we would like to have the proper training for Aqua."
"The integrations on CICD could be improved. If Aqua had more plugins or container images to integrate and automate more easily on CICD, it would be better."
"The solution could improve user-friendliness."
"The user interface could be improved, especially in terms of organization and clarity."
"Aqua Security could improve the forwarding of logging into Splunk and into other tools, it should be easier."
"I would like Aqua Security to look into is the development of a web security portal."
"Sometimes I got stressed with the UI."
"We would like to see an improvement in the overview visibility that this solution offers."
"One issue is that engineering teams don't always embed secrets in the same way, making it difficult for the tool to consistently identify them."
"The one we're working on right now is the ability to dynamically rerun development teams and groups."
"Legit Security could do a little better with detecting publicly exposed keys. It's not bad. The detections that they are running get to everything eventually, but it would be great if they could increase some of that awareness."
"I would like them to have their own static code scanner, and I'd like them to have their own open-source software scanners."
 

Pricing and Cost Advice

"The pricing of this solution could be improved."
"Dealing with licensing costs isn't my responsibility, but I know that the licenses don't depend on the number of users, but instead are priced according to your workload."
"Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle."
"They were reasonable with their pricing. They were pretty down-to-earth about the way they pitched their product and the way they tried to close the deal. They were one of the rare companies that approached the whole valuation in a way that made sense for our company, for our needs, and for their own requirements as well... They will accommodate your needs if they are able to understand them and they're stated clearly."
"It comes at a reasonable cost."
"The pricing is reasonable."
report
Use our free recommendation engine to learn which Software Supply Chain Security solutions are best for your needs.
859,129 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
23%
Computer Software Company
12%
Manufacturing Company
11%
Government
9%
Computer Software Company
19%
Financial Services Firm
13%
University
13%
Pharma/Biotech Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you think of Aqua Security vs Prisma Cloud?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valuable feature and their speed of integration is very good. The initial setup was ...
What do you like most about Aqua Security?
Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment.
What is your experience regarding pricing and costs for Aqua Security?
It comes at a reasonable cost. When compared to Prisma Cloud, it is more budget-friendly.
What do you like most about Legit Security?
The true value proposition of Legit lies not in its features but in its ability to support our product security program's focus on creating guardrails instead of toll gates.
What needs improvement with Legit Security?
Legit Security's secret detection works. However, there are some limitations to its effectiveness. One issue is that engineering teams don't always embed secrets in the same way, making it difficul...
 

Also Known As

Aqua Security Platform, CloudSploit, Argon
No data available
 

Overview

 

Sample Customers

HPE Salesforce Telstra Ellie Mae Cathay Pacific HomeAway
Google, NYSE, Kraft-Hienz, Takeda Pharmaceuticals, and many other large enterprise and Fortune 500 customers. Learn more by going to: https://www.legitsecurity.com/...
Find out what your peers are saying about Aqua Cloud Security Platform vs. Legit Security and other solutions. Updated: June 2025.
859,129 professionals have used our research since 2012.