Try our new research platform with insights from 80,000+ expert users

Check Point CloudGuard CNAPP vs Red Hat Advanced Cluster Security for Kubernetes comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
112
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Check Point CloudGuard CNAPP
Ranking in Container Security
7th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
71
Ranking in other categories
Vulnerability Management (9th), Cloud and Data Center Security (9th), Cloud Workload Protection Platforms (CWPP) (6th), Cloud Security Posture Management (CSPM) (5th), Cloud-Native Application Protection Platforms (CNAPP) (5th), Data Security Posture Management (DSPM) (4th), Compliance Management (6th)
Red Hat Advanced Cluster Se...
Ranking in Container Security
21st
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.4%, up from 1.0% compared to the previous year. The mindshare of Check Point CloudGuard CNAPP is 2.1%, down from 2.2% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.4%, down from 3.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Bart Coddens - PeerSpot reviewer
Evolved cloud security with active monitoring but needs interface consistency
The user interface needs work. Sometimes, it is a transition from the old tool to the new CNAPP Two that I currently have, and remnants of the old environment can still be detected. I require consistency in the user interface to ensure everything is streamlined into the same look and feel. More work is needed in fine-tuning the threat data towards your CSPM and activity logs, aligning them with business intelligence, which requires a cohesive console interface. My assessment of CloudGuard CDRs in intrusion detection and threat hunting capabilities is that it still needs some work. All the threat data that comes in, you need to fine tune it a bit.
Daniel Stevens - PeerSpot reviewer
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Overall, I would rate it a ten on ten for cloud security."
"As a frequently audited company, we value SentinelOne Singularity Cloud Security's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security."
"It saves us time based on savings on manual activities."
"Cloud Native Security's evidence-based reporting allows us to prioritize issues by understanding their impact, helping us resolve the most important problems first."
"The most valuable feature is the easy-to-understand user interface, which allows even non-technical users to comprehend and resolve issues."
"The UI is responsive and user-friendly."
"It is advantageous in terms of time-saving and cost reduction."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"I can take proactive actions based on an alert without having to interact with the platform directly."
"It presents a real-time database that is always updated."
"Most of the features are pretty valuable, whether that's a description of the attacks or the attack graph showing the vulnerabilities. If a single tool does all this work, the value is centralizing all these functions on a single tool. These are the cloud-native applications we talk about — containers, Kubernetes, and cloud infrastructure — and all those things are the primary focus of the CNAPP solution."
"The most valuable features are the ability to create pipeline rules, the enhanced NetOps security, and the deep visibility across our entire infrastructure."
"Checkpoint posture management gives you visibility across your entire cloud infrastructure, so it helps you with management, maintenance, and compliance. With visibility across all these cloud platforms, you can protect against compromised credentials or identity theft."
"The product allows us to enhance the security of the implementations we have."
"It helps us to analyze vulnerabilities way before they get installed in production and the web. It gives us more security in the production environment."
"The reporting is quite good. It is the most powerful aspect of this solution."
"I am impressed with the tool's visibility."
"The most valuable feature is the ability to share resources."
"It is easy to install and manage."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"The most valuable feature of the solution is its monitoring feature."
"Offers easy management with authentication and authorization features"
"The technical support is good."
 

Cons

"The cost has the potential for improvement."
"I personally use the SentinelOne Singularity Cloud Security daily, and I have noticed that the dashboard occasionally gets stuck, potentially due to internet issues. It could benefit from enhancements to be more robust and smoother."
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"The documentation could be better."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"SentinelOne Singularity Cloud Security can improve by eliminating 100 percent of the false positives."
"The Singularity Cloud Security console is experiencing delays in clearing resolved issues, which can take over an hour to be removed from the display."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"The dashboard customization has room for improvement."
"Especially with cloud security, there's too much clutter on the screen and too many things going on."
"I don't have any notes for improvements."
"The guidelines to implement or to link with the clouds are not complete."
"One feature of the product that I would like to enhance is the possibility to connect to vulnerability management platforms so that the issues that emerge from the scans can then be ingested directly into the vulnerability management process."
"The user interface could be improved. Sometimes, the visibility is not immediately available for the environment. We have the native servers that come with the solutions, but we cannot see them in the Check Point log. Another issue is with the integrated file monitoring. It would make sense to have stuff like file integrity monitoring and malware scanning available within this module because we don't want to integrate another product."
"In general, for the product to be successful, they need to improve security, and configuration detection."
"I would like to see improvements in the vulnerability assessments in terms of how the solution discovers vulnerabilities or compromised workloads. Also, customizable reports would be nice."
"The testing process could be improved."
"Red Hat is somewhat expensive."
"The solution's visibility and vulnerability prevention should be improved."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The solution's price could be better."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The support and specifications need to be up to date for the cluster technologies"
 

Pricing and Cost Advice

"SentinelOne offers excellent pricing and licensing options."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"SentinelOne Singularity Cloud Security is on the costlier side."
"The tool is cost-effective."
"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at."
"Their pricing appears to be based simply on the number of accounts we have, which is common for cloud-based products."
"The features included in PingSafe justify its price point."
"Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges."
"The tool's pricing is moderate. Its licensing costs are yearly."
"In the beginning, the price of Dome9 was cheap, whereas now it is not."
"Check Point CloudGuard Posture Management is expensive."
"It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution."
"From a pricing perspective, they are pretty expensive."
"The price is on the higher end."
"Everything in this field is very expensive."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"We purchase a yearly basis license for the solution."
"It's a costly solution"
"The pricing model is moderate, meaning it is not very expensive."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
Computer Software Company
15%
Financial Services Firm
14%
Manufacturing Company
8%
Educational Organization
5%
Financial Services Firm
24%
Computer Software Company
13%
Government
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
SentinelOne Singularity Cloud Security is an excellent CSPM tool, but its CWPP features need improvement, and there i...
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the b...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for th...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling,...
 

Also Known As

PingSafe
Check Point CloudGuard Posture Management, Dome9, Check Point CloudGuard Workload Protection, Check Point CloudGuard Intelligence
StackRox
 

Overview

 

Sample Customers

Information Not Available
Symantec, Citrix, Car and Driver, Virgin, Cloud Technology Partners
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Check Point CloudGuard CNAPP vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.