Try our new research platform with insights from 80,000+ expert users

Sysdig Secure vs XM Cyber comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 17, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Sysdig Secure
Ranking in Cloud Security Posture Management (CSPM)
18th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
12
Ranking in other categories
Container Security (13th), Cloud-Native Application Protection Platforms (CNAPP) (12th), Cloud Detection and Response (CDR) (5th), AI Observability (16th)
XM Cyber
Ranking in Cloud Security Posture Management (CSPM)
22nd
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
6
Ranking in other categories
Continuous Controls Monitoring (3rd), Vulnerability Management (32nd), Continuous Threat Exposure Management (CTEM) (4th)
 

Mindshare comparison

As of January 2026, in the Cloud Security Posture Management (CSPM) category, the mindshare of Sysdig Secure is 2.3%, up from 1.8% compared to the previous year. The mindshare of XM Cyber is 1.1%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Security Posture Management (CSPM) Market Share Distribution
ProductMarket Share (%)
Sysdig Secure2.3%
XM Cyber1.1%
Other96.6%
Cloud Security Posture Management (CSPM)
 

Featured Reviews

MM
DevSecOps Engineer at a outsourcing company with 1,001-5,000 employees
Runtime threat detection has improved and security teams prioritize real Kubernetes risks
The best feature Sysdig Secure offers is threat detection. The threat detection feature on Sysdig Secure stands out compared to other solutions I have seen or used because Sysdig sees the actual behavior inside the container or kernel and correlates it with Kubernetes infrastructure, which makes detection both earlier and more precise in a cloud-native environment. Sysdig Secure has positively impacted our organization by improving visibility into our Kubernetes environment and focusing on real risk, which has reduced alert noise, improved threat detection at runtime, and made vulnerability management more efficient by prioritizing issues that actually affect running workloads.
Stephen Owen - PeerSpot reviewer
Group CISO at a insurance company with 51-200 employees
Has significantly improved risk visibility and optimized remediation efforts across dynamic environments
We tightly integrate with APIs, consuming feeds and open source data. We have integrated with XM Cyber, and we are elevating ourselves with AI and MCP tools as we view this as a forerunner to reducing the workload for our agents and IT staff. We're pushing all our security partners to provide AI and MCP tools. Our vision is for them to offer a chat interface where a junior IT or an experienced infrastructure engineer can ask for what needs to be patched next without using an interface. Their current interface is very usable and professional, ranking in the top tier of applications. Their reporting is good, offering custom reports, and their API integration is a new capability that serves us well. We have high expectations for the next generation, such as a chat interface to ask questions. However, everything has been very good. We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments. I would like access to that and querying languages, enabling more informed business decisions. XM Cyber sees much of our estate, which is beneficial for making informed decisions, and we can harness those insights and data for business analytics. For instance, it could help us gain insights into change management—if a particular server impacts another and that server is supported by yet another server, we could glean significant insights for change management meetings.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool has the capability to conduct scans initially. It can perform scans on your virtual machines, physical machines, containers, and container images. A standout feature is its ability to scan offline container images stored in your container registry. Additionally, it can scan runtime images in your cluster or on your host machine. This allows for the detection of vulnerabilities in running containers, including loaded libraries. Notably, the tool can identify which library vulnerabilities are already present in your system. An added advantage is its capacity to take action beyond threat detection. It has the ability to block access and respond to encountered threats."
"The log monitor is the most valuable feature."
"The proactiveness of the support has been fantastic. Every time we mention something in a meeting that we're trying to do, he proactively takes that as an investigation topic and looks into it. He'll provide the solution even though we might not have asked him to investigate it."
"Sysdig Secure has many strong foundational features like compliance and benchmark, security, network access management, and vulnerability management."
"We appreciate this feature, especially when combined with CD monitoring. The implementation of requested features has been remarkable, such as scanning for compliance in CRM processes for the US government. We heavily rely on this feature to assess compliance with federal requirements."
"I have not seen any stability issues so far."
"The most valuable feature is the level of support that we get. Our solutions or customer success representative is very valuable. I see them as an extension of our security team."
"From a container-based standpoint, it offers excellent scalability to its users...I would tell those planning to use the solution that, from a container standpoint, it's excellent."
"Since implementing XM Cyber, we have improved the way we are doing patching, focusing on the choke points in our patching cycle, and it improves the way we assess the risk."
"The platform's most valuable feature is attack simulation."
"XM Cyber made it clear that browser vulnerabilities were the top priority because the platform was able to examine how vulnerabilities within our estate could be exploited and what the path would be from some bad actor in order to exploit those vulnerabilities."
"Six weeks into using XM Cyber, we saw a compelling return on investment—primarily in risk reduction, with a specific issue our other security tooling did not pick up but XM Cyber did, reducing IT remediation time and saving over 60,000 US dollars per year while significantly lowering our loss exposure amount."
"XM Cyber permits us to identify if a zero-day vulnerability can affect our infrastructure; it helps me understand the company's total risk that we have in our infrastructure and workstation vulnerability, and it permits us to identify the real impact when we have a vulnerability."
"What I personally like very much, from my experience, is that it is very reliable."
"XM Cyber permits us to identify if a zero-day vulnerability can affect our infrastructure; it helps me understand the company's total risk that we have in our infrastructure and workstation vulnerability, and it permits us to identify the real impact when we have a vulnerability."
 

Cons

"The solution needs to improve overall from a CSPM standpoint since they can't compete with Wiz or Orca."
"Sysdig Secure works well for us, but there are a few areas for improvement, such as the alerting and notification system being more flexible for complex workflows, and some dashboard and reporting features could be more customizable to match specific team needs."
"The dashboard could be more simple and show the more important issues that are detected first. We'd like to be able to set it up so more important issues show up more prominently in the dashboard."
"Perhaps, it could support more custom implementations, as our company utilizes custom implementations rather than standard ones. Configuring it requires a deep understanding and adjustment to our specific needs, which took some time. Other than that, I'm unsure about potential improvements. We were considering the possibility of compartmentalizing their tools. Currently, in Sysdig Secure, they bundle multiple features, and we are unable to use them individually. For instance, if we only need compliance scanning, we have to deploy the entire secure package. This is because of the way their agent functions, but I can't delve into more details."
"I give it an eight because of the bugs, specifically the fix version bug where sometimes there is no fix version shown, and I wish Sysdig Secure would create a customizable UI that orders features by importance to enhance user experience."
"Banks and financial institutions cannot use Sysdig Secure because it doesn't sell SaaS-hosted versions for under two hundred working nodes."
"Sysdig Secure needs to scale more for complete cloud-native coverage."
"They should make it specific with a couple of features only."
"They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks."
"There are many interesting things about XM Cyber, but the part that can be improved is the mobile exposure and the IBM i specific equipment."
"We'd like to see a cheaper price."
"XM Cyber could identify all areas of vulnerability. They could expand the identification span for different areas."
"They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks."
"We have high expectations for the next generation, such as a chat interface to ask questions."
"We have not saved any time or effort, but we can prove that the effort involved around vulnerability management has been better spent to greater effect, and we've been able to demonstrate that vulnerabilities that do represent a high risk have been remediated more rapidly and more effectively."
 

Pricing and Cost Advice

"I am always going to say that it could be a little bit cheaper. I do feel that it is a little bit on the expensive side."
"Sysdig is competitive. The quality matches the pricing. Obviously, everyone wants things to be cheaper, but if you're realistic, you acknowledge that quality service comes with a price. Sysdig is the gold standard for Kubernetes, and I wouldn't choose anything else. We live in Kubernetes. Everything is containerized, so that means a lot to us, and we're willing to make an investment."
"In comparison to other cloud solutions, it's reasonably priced. However, when compared to in-house built open-source projects, it might be considered somewhat costly. The cost depends on whether someone sees the support provided by Sysdig as an advantage or if it's deemed unnecessary. Personally, I find the support to be excellent and consider it a good value."
"It is quite costly compared to other tools."
"The solution's pricing depends on the agents...In short, the price depends on the environment of its user."
"We have to pay standard licensing fees."
report
Use our free recommendation engine to learn which Cloud Security Posture Management (CSPM) solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Computer Software Company
13%
Manufacturing Company
7%
Comms Service Provider
6%
Computer Software Company
11%
Financial Services Firm
10%
Manufacturing Company
9%
Retailer
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise5
No data available
 

Questions from the Community

What do you like most about Sysdig Secure?
The proactiveness of the support has been fantastic. Every time we mention something in a meeting that we're trying to do, he proactively takes that as an investigation topic and looks into it. He'...
What needs improvement with Sysdig Secure?
Sysdig Secure works well for us, but there are a few areas for improvement, such as the alerting and notification system being more flexible for complex workflows, and some dashboard and reporting ...
What is your primary use case for Sysdig Secure?
Our primary use case for Sysdig Secure is runtime threat detection and vulnerability management.
What do you like most about XM Cyber?
The platform's most valuable feature is attack simulation.
What is your experience regarding pricing and costs for XM Cyber?
My experience with pricing, setup cost, and licensing was that we have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the compli...
What needs improvement with XM Cyber?
There are many interesting things about XM Cyber, but the part that can be improved is the mobile exposure and the IBM i specific equipment.
 

Overview

 

Sample Customers

SAP Concur, Goldman Sachs, Worldpay, Experian, BigCommerce, Arkose Labs, Calendly, Noteable, Bloomreach. More here: https://sysdig.com/customers/
Hamburg Port Authority, Plymouth Rock Corporation
Find out what your peers are saying about Sysdig Secure vs. XM Cyber and other solutions. Updated: December 2025.
881,114 professionals have used our research since 2012.