Coming October 25: PeerSpot Awards will be announced! Learn more

SUSE NeuVector vs Tigera comparison

Cancel
You must select at least 2 products to compare!
SUSE Logo
1,248 views|881 comparisons
Tigera Logo
796 views|548 comparisons
Comparison Buyer's Guide
Executive Summary

We performed a comparison between SUSE NeuVector and Tigera based on real PeerSpot user reviews.

Find out in this report how the two Container Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.

To learn more, read our detailed SUSE NeuVector vs. Tigera report (Updated: August 2022).
632,611 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
  • "Licensing fees are paid yearly."
  • More SUSE NeuVector Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Container Security solutions are best for your needs.
    632,611 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The initial setup is quite good, it's straightforward.
    Top Answer:Our work has expanded. We are not only working with Kubernetes. We are also working with IaaS VMS, but NeuVector doesn't support virtual machines. We are looking for options that would support both. I… more »
    Ask a question

    Earn 20 points

    Ranking
    9th
    out of 24 in Container Security
    Views
    1,248
    Comparisons
    881
    Reviews
    1
    Average Words per Review
    307
    Rating
    8.0
    16th
    out of 24 in Container Security
    Views
    796
    Comparisons
    548
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    NeuVector
    Tigera Canal
    Learn More
    Overview

    SUSE NeuVector is a full lifecycle container security solution that helps your organization secure its container infrastructures, manage Kubernetes security risks, and block threats. The NeuVector continuous container security and compliance platform simplifies data protection from pipeline to production, enforces compliance, and provides complete visibility and automated controls for protection against known and unknown threats. In addition, NeuVector is the only Kubernetes-native container security solution that offers a comprehensive risk profile of known vulnerabilities and also delivers immediate protection from all vulnerabilities.

    SUSE NeuVector Features

    SUSE NueVector has many valuable key features. Some of the most useful ones include:

    • Container incident detection and prevention
    • Network security
    • Runtime security
    • Supply chain security
    • Container firewall
    • Host and platform security
    • Cloud-native automation and integration
    • Resource monitoring
    • Visualization and reporting
    • High availability
    • Security
    • Vulnerability management
    • Compliance and auditing
    • Alerting
    • Logging and Response

    SUSE NeuVector Benefits

    There are many benefits to implementing NeuVector. Some of the biggest advantages the solution offers include:

    • Deep packet inspection (DPI): NeuVector applies DPI to identify attacks, detect sensitive data, or verify application access to further reduce the attack surface. Only network layer analysis enables security to detect and verify the allowed protocols, helping security teams enforce business policy.
    • Real-time protection: NeuVector provides inspection, segmentation, and protection of all traffic into and out of a container. This includes container to container traffic, and ingress from external sources to containers, as well as egress from containers to external applications and the internet. The solution aims to protect your applications from internal application level attacks such as DDoS and DNS.
    • Capture packets for debugging and threat investigation: WIth NeuVector, you can view summary connection data and drill down into actual packet details for each container, as they scale up and down. When a threat is detected, NeuVector is able to automatically capture and display the packet info, making it easy for you to investigate.
    • Automated security policies: The NeuVector solution allows you to automate the creation of security policies to protect application workloads in production. The solution also enables you to automate and maintain run-time security policies using Kubernetes custom resource definitions (CRDs), and gives you the option to declare an application security policy at any stage in the pipeline.
    • Compliance: NeuVector offers detection capabilities and security policy enforcement that prevent PHI and PII exposure, exceed requirements, and simplify reporting for PCI-DSS, GDPR, HIPAA, and more. The solution helps you track critical vulnerabilities and compliance violations so you can quickly identify any that require immediate patching or followup alerts. It also makes it possible for you to manage vulnerability and compliance scan results, with no required integration to external workflow tools.

    Reviews from Real Users

    A Platform Solution Architect at a tech services company says, “The solution is feature-rich, easy to set up, and has good support.”

    Tigera is solving the networking and security problems inherent in deploying and enforcing policy in large private, public, and hybrid enterprise clouds. Tigera’s founders combine extensive networking and security experience with a track record of engagement with the cloud native, open source developer and user communities. With this as a starting point, Tigera has worked with those communities to create Canal, the combination and refinement of two existing cloud networking solutions – Project Calico and Flannel.

    Canal provides a software-based networking solution with built-in secure, fine-grained policy control. Canal is targeted at enterprises that are embracing the cloud native model for private, public and hybrid cloud deployments. The Tigera team originated and maintains Project Calico, and is collaborating with CoreOS to maintain Flannel and integrate it with Calico under the Canal umbrella.
    Tigera is based in San Francisco and is backed by leading Silicon Valley investors.

    Offer
    Learn more about SUSE NeuVector
    Learn more about Tigera
    Sample Customers
    Figo, Clear Review, Arvato Bertelsmann, Experian, Chime
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm11%
    Comms Service Provider11%
    Retailer8%
    VISITORS READING REVIEWS
    Computer Software Company31%
    Comms Service Provider11%
    Educational Organization8%
    Financial Services Firm7%
    Company Size
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise10%
    Large Enterprise67%
    VISITORS READING REVIEWS
    Small Business29%
    Midsize Enterprise11%
    Large Enterprise61%
    Buyer's Guide
    Container Security
    August 2022
    Find out what your peers are saying about Snyk, Palo Alto Networks, F5 and others in Container Security. Updated: August 2022.
    632,611 professionals have used our research since 2012.

    SUSE NeuVector is ranked 9th in Container Security with 1 review while Tigera is ranked 16th in Container Security. SUSE NeuVector is rated 8.0, while Tigera is rated 0.0. The top reviewer of SUSE NeuVector writes "Feature-rich, easy to set up, and has good support". On the other hand, SUSE NeuVector is most compared with Aqua Security, Prisma Cloud by Palo Alto Networks, Sysdig Secure, Red Hat Advanced Cluster Security for Kubernetes and Qualys Container Security, whereas Tigera is most compared with Prisma Cloud by Palo Alto Networks, Wiz, Sysdig Secure, Aqua Security and Styra.

    See our list of best Container Security vendors.

    We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.