Trivy surpasses its competitors by offering comprehensive vulnerability scanning across containers, code, and cloud infrastructure, with rapid results and easy integration, empowering developers to efficiently secure applications without compromising performance or simplicity.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
SentinelOne Singularity Cloud Security ensures cloud-native security with antivirus protection, endpoint monitoring, and threat detection. Its real-time detection and automated remediation enhance productivity. Users note the need for cost reduction and improved search functionality, while praising its integrations with AWS, Azure, and GCP. Enhanced support and legacy system compatibility are desired.
As a partner, we receive a discount on the licenses.
It's a fair price for what you get. We are happy with the price as it stands.
As a partner, we receive a discount on the licenses.
It's a fair price for what you get. We are happy with the price as it stands.
The pricing is competitive and provides a lower TCO (total cost of ownership) for achieving application security.
I believe pricing is better compared to other commercial tools.
The pricing is competitive and provides a lower TCO (total cost of ownership) for achieving application security.
I believe pricing is better compared to other commercial tools.
Veracode is a cloud-based application security platform that enables organizations to detect, mitigate, and prevent vulnerabilities throughout the software development lifecycle while supporting scalability and integration with DevOps workflows.
Its complexity makes it quite expensive, but it’s all worth it, with all the engineering in the background.
The pricing is pretty high.
Its complexity makes it quite expensive, but it’s all worth it, with all the engineering in the background.
The pricing is pretty high.
The pricing is fair for what you get. I'd rate them a solid nine out of ten in terms of pricing.
I am not the one who handled the pricing. A different team worked on it, but it is pretty expensive.
The pricing is fair for what you get. I'd rate them a solid nine out of ten in terms of pricing.
I am not the one who handled the pricing. A different team worked on it, but it is pretty expensive.
Orca Security enhances cloud security through posture management and threat detection in AWS, Azure, GCP. Its agentless scanning improves visibility and compliance. Users value automated scanning, vulnerability prioritization, and Kubernetes insights. They seek improved data center integration, alert management, and private cloud support with expanded automation and education.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
The solution's pricing depends on the agents...In short, the price depends on the environment of its user.
It is quite costly compared to other tools.
The solution's pricing depends on the agents...In short, the price depends on the environment of its user.
It is quite costly compared to other tools.
Aikido Security enhances security management with advanced analytics and threat detection. Valuable features include real-time insights and comprehensive reporting. Users appreciate efficient data handling but identify room for improvement in integration capabilities. Aikido Security addresses critical vulnerabilities effectively, aligning with enterprise needs.
SUSE NeuVector, used for container security, excels in vulnerability and policy management with Kubernetes. Users appreciate features like image scanning, anti-malware, and run-time security. It's valued for network monitoring and machine learning, though image scanning, security rules, and hybrid integration need enhancement. The setup can be challenging, and VM support is limited.
Licensing fees are paid yearly.
The solution's pricing could be better. The cost of a subscription is calculated on the basis of work.
Licensing fees are paid yearly.
The solution's pricing could be better. The cost of a subscription is calculated on the basis of work.
Red Hat Advanced Cluster Security for Kubernetes is employed for container security, vulnerability management, and compliance with OpenShift. It aids in monitoring container behavior, segmenting workloads, and automating tasks. The platform supports environment scanning for vulnerabilities, offering key features like segmentation, stability, and management, though it requires performance and interface improvements.
The pricing model is moderate, meaning it is not very expensive.
Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus.
The pricing model is moderate, meaning it is not very expensive.
Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus.
As you scale your operations, AKS becomes more cost-effective.
We could spend as little as $25 or $30 a month on Kubernetes Services, compared to the typical $100 a month expenditure for a virtual machine.
As you scale your operations, AKS becomes more cost-effective.
We could spend as little as $25 or $30 a month on Kubernetes Services, compared to the typical $100 a month expenditure for a virtual machine.
Tenable.io Container Security helps organizations manage container vulnerabilities in environments like Docker and integrates with CI/CD in DevOps. It provides protection for cloud workloads and emphasizes real-time visibility and misconfiguration detection. Users seek improved integration, reduced false positives, and expanded vulnerability testing capabilities.
It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders.
I rate the product’s pricing a six out of ten.
It's best to be an institutional buyer and directly contact the sales team as they can provide over-the-top discounts for bulk orders.
I rate the product’s pricing a six out of ten.
Users appreciate Anchore Enterprise for scanning container images for security vulnerabilities and compliance issues. They value its CI/CD pipeline integration, automated assessments, detailed reporting, policy enforcement, and comprehensive analysis. While scalability and deployment ease are praised, users also note the need for better stability, performance, and more in-depth documentation.
CoreOS Clair is open-source and free of charge.
CoreOS Clair is open-source and free of charge.
Deepfence ThreatMapper detects network threats in real-time, maps vulnerabilities in Kubernetes clusters, and safeguards cloud-native applications. Users appreciate its powerful threat detection and comprehensive scanning. The platform effectively monitors workloads, highlighting security gaps and providing actionable insights. However, users feel integration features need enhancement and documentation requires better clarity.