The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
SentinelOne Singularity Cloud Security ensures cloud-native security with antivirus protection, endpoint monitoring, and threat detection. Its real-time detection and automated remediation enhance productivity. Users note the need for cost reduction and improved search functionality, while praising its integrations with AWS, Azure, and GCP. Enhanced support and legacy system compatibility are desired.
As a partner, we receive a discount on the licenses.
It's a fair price for what you get. We are happy with the price as it stands.
As a partner, we receive a discount on the licenses.
It's a fair price for what you get. We are happy with the price as it stands.
The pricing is fair for what you get. I'd rate them a solid nine out of ten in terms of pricing.
I am not the one who handled the pricing. A different team worked on it, but it is pretty expensive.
The pricing is fair for what you get. I'd rate them a solid nine out of ten in terms of pricing.
I am not the one who handled the pricing. A different team worked on it, but it is pretty expensive.
Orca Security enhances cloud security through posture management and threat detection in AWS, Azure, GCP. Its agentless scanning improves visibility and compliance. Users value automated scanning, vulnerability prioritization, and Kubernetes insights. They seek improved data center integration, alert management, and private cloud support with expanded automation and education.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle.
The pricing of this solution could be improved.
Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle.
The pricing of this solution could be improved.
Trivy is an open-source product.
Trivy is an open-source product.
SUSE NeuVector, used for container security, excels in vulnerability and policy management with Kubernetes. Users appreciate features like image scanning, anti-malware, and run-time security. It's valued for network monitoring and machine learning, though image scanning, security rules, and hybrid integration need enhancement. The setup can be challenging, and VM support is limited.
Licensing fees are paid yearly.
The solution's pricing could be better. The cost of a subscription is calculated on the basis of work.
Licensing fees are paid yearly.
The solution's pricing could be better. The cost of a subscription is calculated on the basis of work.
Red Hat Advanced Cluster Security for Kubernetes is employed for container security, vulnerability management, and compliance with OpenShift. It aids in monitoring container behavior, segmenting workloads, and automating tasks. The platform supports environment scanning for vulnerabilities, offering key features like segmentation, stability, and management, though it requires performance and interface improvements.
The pricing model is moderate, meaning it is not very expensive.
Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus.
The pricing model is moderate, meaning it is not very expensive.
Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus.
Calico Cloud excels in managing and securing Kubernetes clusters, enforcing network policies, and providing visibility into network traffic. Users appreciate its capabilities in microservices communication, threat detection, compliance management, and streamlined network segmentation. They also value its robust security, scalability, observability, and efficient traffic management.
Deepfence ThreatMapper detects network threats in real-time, maps vulnerabilities in Kubernetes clusters, and safeguards cloud-native applications. Users appreciate its powerful threat detection and comprehensive scanning. The platform effectively monitors workloads, highlighting security gaps and providing actionable insights. However, users feel integration features need enhancement and documentation requires better clarity.
Users utilize CrowdSec Security Engine for real-time threat detection and mitigation. It blocks malicious IPs, provides dynamic security measures against cyber attacks, and offers comprehensive visibility into network traffic. CrowdSec's real-time collaborative threat intelligence, powerful automation, easy integration, and open-source nature are appreciated, though documentation and configuration could be improved.
Users primarily utilize Carbon Black Container for securing Kubernetes environments, monitoring container activity, and detecting threats. Its strong real-time threat detection and seamless integration with existing security systems are highly valued. However, users desire better third-party application integration, comprehensive documentation, enhanced threat detection accuracy, and improved support and updates. Performance can be sluggish during peak times.