Try our new research platform with insights from 80,000+ expert users

Aqua Cloud Security Platform vs Qualys Enterprise TruRisk Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud and Data Center Security
5th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
112
Ranking in other categories
Vulnerability Management (6th), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Compliance Management (2nd)
Aqua Cloud Security Platform
Ranking in Cloud and Data Center Security
12th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
14th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
16
Ranking in other categories
Container Security (19th), Cloud Workload Protection Platforms (CWPP) (16th), Software Supply Chain Security (10th), DevSecOps (9th)
Qualys Enterprise TruRisk P...
Ranking in Cloud and Data Center Security
15th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
20th
Average Rating
8.0
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Cloud and Data Center Security category, the mindshare of SentinelOne Singularity Cloud Security is 1.6%, up from 0.6% compared to the previous year. The mindshare of Aqua Cloud Security Platform is 0.6%, up from 0.4% compared to the previous year. The mindshare of Qualys Enterprise TruRisk Platform is 0.1%, down from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud and Data Center Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Burak AKCAGUN - PeerSpot reviewer
A robust and cost-effective solution, excelling in scalability, on-premises support, and responsive technical support, making it well-suited for enterprises navigating stringent regulatory environment
The most crucial aspect is runtime protection, specifically image scanning before preproduction and deployment. Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment. This feature ensures that customers can identify any potential issues with the image, such as misconfigurations or vulnerabilities, before integrating it into their workloads and infrastructure. In their source pipeline, companies can identify issues before deploying changes. This is crucial because customers prefer resolving any problems or misconfigurations before the deployment process. Software change security, including GSPM Cloud, is a key feature customers seek in their infrastructure.
VivekSaini - PeerSpot reviewer
Comprehensive vulnerability management improves security assessments
The platform scans the entire environment and IP range, providing comprehensive vulnerability reports along with solutions to address these vulnerabilities. Its features are extensive and it produces proper results, although there may be occasional false positives. It also categorizes risks based on severity, though further evaluation is necessary for our specific environment.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"My favorite feature is Storyline."
"I would rate SentinelOne Singularity Cloud Security a ten out of ten."
"SentinelOne Singularity Cloud Security released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. SentinelOne Singularity Cloud Security's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"The most valuable feature is the easy-to-understand user interface, which allows even non-technical users to comprehend and resolve issues."
"Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment."
"From what I understand, the initial setup is simple."
"Valuable features include the ability to connect it to our Docker Hub where our images are stored, good integration with Slack, and the connection to the CV, to easily see which CVs are on each image."
"The DTA, which stands for Dynamic Threat Analysis, allows me to analyze Docker images in a sandbox environment before deployment, helping me anticipate risks."
"The CSPM product is great at securing our cloud accounts and I really like the runtime protection for containers and functions too."
"The most valuable feature is the security."
"Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out, the amount of risk that we were introducing to the platform, and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access."
"The most valuable features are that it's easy to use and manage."
"Qualys offers versatility. It can function both with and without agents, offering flexibility in deployment. Furthermore, it provides comprehensive support for various systems such as Windows Server, Unix servers, and databases, including SQL, Oracle, and others for development."
"Qualys Enterprise TruRisk Platform is considered a good leader in its field."
 

Cons

"A two-month grace period for extended searches would be a valuable improvement."
"SentinelOne currently lacks a break glass account feature, which is critical for implementing Single Sign-On."
"There is a bit of a learning curve for new users."
"Scanning capabilities should be added for the dark web."
"In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of critical severity, whereas they are not critical or of high severity. There is a mismatch of severities."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background."
"I would like SentinelOne Singularity Cloud Security to add real-time detection of vulnerabilities and cloud misconfigurations."
"The integrations on CICD could be improved. If Aqua had more plugins or container images to integrate and automate more easily on CICD, it would be better."
"Aqua Security could improve the forwarding of logging into Splunk and into other tools, it should be easier."
"We would like to see an improvement in the overview visibility that this solution offers."
"There's room for improvement, particularly in management capabilities as it may not be comprehensive enough for all customers, and it has been lacking in the realm of cloud security posture management."
"I would like Aqua Security to look into is the development of a web security portal."
"Aqua Security could provide more open documentation so that their learning resources can be more easily accessed and searched through online. Right now, a lot of the documentation is closed and not available to the public."
"It's a bit hard to use the user roles. That was a bit confusing."
"The solution could improve user-friendliness."
"The report sometimes inaccurately identifies the corresponding operating system version."
 

Pricing and Cost Advice

"I am not involved in the pricing, but it is cost-effective."
"PingSafe is priced reasonably for our workload."
"I wasn't sure what to expect from the pricing, but I was pleasantly surprised to find that it was a little less than I thought."
"PingSafe falls within the typical price range for cloud security platforms."
"Pricing is based on modules, which was ideal for us."
"Singularity Cloud Workload Security's pricing is good."
"For pricing, it currently seems to be in line with market rates."
"The pricing is somewhat high compared to other market tools."
"Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle."
"It comes at a reasonable cost."
"The pricing of this solution could be improved."
"Dealing with licensing costs isn't my responsibility, but I know that the licenses don't depend on the number of users, but instead are priced according to your workload."
"They were reasonable with their pricing. They were pretty down-to-earth about the way they pitched their product and the way they tried to close the deal. They were one of the rare companies that approached the whole valuation in a way that made sense for our company, for our needs, and for their own requirements as well... They will accommodate your needs if they are able to understand them and they're stated clearly."
Information not available
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
Financial Services Firm
25%
Computer Software Company
13%
Manufacturing Company
10%
Government
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
SentinelOne Singularity Cloud Security is an excellent CSPM tool, but its CWPP features need improvement, and there i...
What do you think of Aqua Security vs Prisma Cloud?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valu...
What do you like most about Aqua Security?
Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar ...
What is your experience regarding pricing and costs for Aqua Security?
It comes at a reasonable cost. When compared to Prisma Cloud, it is more budget-friendly.
What needs improvement with Qualys Enterprise TruRisk Platform?
Support could be improved. Contacting support is a lengthy process for raising a case. Recently, while attempting to ...
What is your primary use case for Qualys Enterprise TruRisk Platform?
I am using all the modules on Qualys. It is a vulnerability and risk management platform. Additionally, we are using ...
 

Also Known As

PingSafe
Aqua Security Platform, CloudSploit, Argon
Qualys Cloud Platform
 

Overview

 

Sample Customers

Information Not Available
HPE Salesforce Telstra Ellie Mae Cathay Pacific HomeAway
Information Not Available
Find out what your peers are saying about Akamai, Illumio, VMware and others in Cloud and Data Center Security. Updated: April 2025.
850,028 professionals have used our research since 2012.