We use Aqua Security for securing our container applications, particularly when it comes to the runtime stage.
There are about five of us from the security side of my company who directly use this solution.
We use Aqua Security for securing our container applications, particularly when it comes to the runtime stage.
There are about five of us from the security side of my company who directly use this solution.
The most helpful feature of Aqua Security is Drift Prevention, which is a feature that allows images to be immutable. In addition, one of the main reasons we went with Aqua Security is because it provides strong protection when it comes to runtime security.
Aqua Security could provide more open documentation so that their learning resources can be more easily accessed and searched through online. Right now, a lot of the documentation is closed and not available to the public. I would be much happier if they chose to share more documentation and resources when it comes to their knowledge base.
As for extra features that I would like to see, source code scanning is on the top of my list. To be clear, I don't mean code scanning in terms of source code composition, but rather I would like to see more in the way of code analysis that tells you whether the code you're writing adheres to the current best practices or not.
I have been using Aqua Security for about a year now.
In terms of stability, I would give Aqua Security 4/5 stars.
I would give the scalability a 5/5 stars because it basically scales by itself. It's just the licensing that restricts your usage.
The technical support is sometimes quick and responsive, but at other times it may take a bit longer to get assistance.
Neutral
Aqua Security is one of the first solutions I have used for container security, however I have also taken a look at ACS from Red Hat, Snyk, and Prisma from Palo Alto.
We went with Aqua Security mainly because we believe they offer the strongest protection in terms of runtime security.
The setup was a little complex but not too complicated. The difficulty level lies somewhere in the middle between easy and hard.
We implemented Aqua Security mostly by ourselves, but we also took advice from a consultant. Our implementation strategy mainly involved the use of Java forms with manifest files, then we slowly deployed one component at a time.
In all, the basic deployment took just a few hours, but there is always more work to be done afterwards in terms of configuration, integrations, and properly getting started with it in our environment. It's hard to put a number on the hours required, but it probably took a few days to get everything configured and ready to be used.
Dealing with licensing costs isn't my responsibility, but I know that the licenses don't depend on the number of users, but instead are priced according to your workload.
I would rate Aqua Security a seven out of ten.
Aqua Security allows us to check for vulnerabilities in the CI/CD pipeline, so application teams can remediate issues before going into production.
Aqua Security helps us to check the vulnerability of image assurance and check for malware.
In the next release, Aqua Security should add the ability to automatically send reports to customers.
I've been using Aqua Security for between two to three years.
Aqua Security's stability is very good.
Aqua Security can be scaled up and down depending on your needs.
Aqua Security's technical support is usually quite responsive.
Positive
There were some challenges with the initial setup.
We used an in-house team.
Aqua Security is the most advanced solution in the market for container security. I would rate it as eight out of ten.
I'm using it for workload protection. So, in most cases, for protecting containers, verifying Kubernetes configurations, cloud configurations, and identifying security misconfigurations, vulnerabilities, and risks.
I use it to demonstrate to customers because I'm a sales engineer. Many customers want to protect their workloads and applications.
For example, when I am using a Docker image with multiple vulnerabilities, I need to know which vulnerabilities are inside. Then I create security policies to allow or deny the deployment of containers from this image and also create a security policy for runtime. This way, when the application is running in the wild, we can guarantee that the security blocks any kind of exploitation.
There are many features that I really like. For example, the runtime policies are very easy to configure, and they are scalable across all environments. The DTA, which stands for Dynamic Threat Analysis, allows me to analyze Docker images in a sandbox environment before deployment, helping me anticipate risks.
The user interface could be improved, especially in terms of organization and clarity. Additionally, more comprehensive examples for deployments and feature usage would be helpful.
Maybe more plugins or something that makes it easier to integrate with CICD pipelines or interact with APIs.
I've been using it for about three years. I'm using the SaaS version.
I would rate the stability an eight out of ten.
It is a scalable solution. I would rate the scalability a ten out of ten.
The customer service and support are good.
Positive
The initial setup was very straightforward.
For me, it's a fair price.
I would definitely recommend using the solution. It's a very scalable solution with multiple features that help us protect our cloud environment effectively.
Overall, I would rate the solution a nine out of ten.
Our primary use case is to sequelize all of the ACD and to review the images.
The most valuable features are that it's easy to use and manage.
They want to release improvements to their product to work with other servers because now there are more focused on the Kubernetes environment. They need to improve the normal servers. I would like to have more options.
It is stable.
Scalability is pretty good. It's easy to scale.
In my company, three or four people use this product.
They aren't so good. They don't always follow up with the problems. Support needs improvement, they should be more proactive. They're not always as helpful as we want them to be.
The initial setup was straightforward. The first time you deploy you, you need support but after that, it's easy to understand the documentation that they provide. After two or three times it's easy.
It takes around one week to get all of the environments in place but to do a PoC is only two days.
I would rate it a nine out of ten.
My advice would be to go for it. This solution solves a lot of problems. I would recommend it.
Aqua focuses more on Kubernetes and Docker but they don't have the option to have an environment with other servers so I would like for them to provide more options. There should be more integration with the cloud.
The most valuable feature is the security. Our clientele cares about the speed of the integration especially if they're doing digital transformation. If you compare it to other container security Aqua is not as caught up in terms of the migration.
We work with another Philippine company that will be providing local support, but our company has more traction with the executives of our clientele. We'd rather have the same skillset or improve our skillsets to be trained by our Aqua counterpart. We haven't done any trainings apart from a webinar. Since we are working from home, we would like to have the proper training for Aqua.
I have been using Aqua Security for two years.
Our client has around 5,000 users.
I'm the person who manages technical support. I have contacted the team in Singapore. They're pretty good. The person who has been helping us is very knowledgable.
We previously used Alcide. Aqua gives us more features and is more solid in terms of security. Aqua is more of a market share leader. There is more of a technology advantage.
The initial setup was straightforward. We spent around 12 days on the planning during our POC. Planning, testing, and mitigation took around 10-12 days.
Aqua is a bit expensive so you have to really justify going for it or not.
The deployment should be improved. After this pandemic, half of the workforce has been working from so we need to provide our clients a solution that will have an easier deployment.
I would rate it a seven out of ten.
We use Aqua Security for the container security features.
We use Aqua Security across the software development lifecycle.
We find the Docker and Kubernetes support for container security most valuable.
I would like Aqua Security to look into is the development of a web security portal. That is what I want them to look into next.
We have thousands of dedicated users. They are pharmacists, healthcare providers, doctors, insurance companies, etc. They are the end users. On our staff are the administrators.
The technical support is good. Whenever we open a ticket, the people are quite helpful about it.
Setup was initially complex before the 3.9 version. We were on version 3.7 and it has been a challenge compared to version 3.11. Deployment was done once or twice in a week.
We are using an in-house regiment. For deployment, we are using automation.
We used a reseller to provide quality. He's the guy who we bought the license from initially. He managed the implementation.
I would rate this product between 7 and 8 out of 10 for container security features.
We used Aqua Security to address our container security concerns since we were using Docker in production. There was a clear blind spot that needed to be addressed and Aqua Security was able to fill that gap by providing visibility into the container images and the runtime aspect of our container platform.
Based on the rollout, we were able to gain pretty fast visibility into what was going on in our environment and integrate with existing automation and logging solutions we had in place. We were able to create detections and integrate as well with our existing security infra.
Previously, we had no visibility into the inner platform that was being operated. We didn't know the vulnerabilities the container images introduced, we didn't know how they were behaving at runtime. We were not able to restrict things as far as access goes, as far as the amount of risk we wanted to take with containers. Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out - the amount of risk that we were introducing to the platform - and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access.
We were able to define policies around containers so we could enforce our rules and restrictions to provide a more secure environment.
The most important feature was the ability to integrate with the existing platform.
There were two other aspects to it, the visibility that it provided to us and the enforcement. Once we were able to see what was going on in our platform, through Aqua Security's enforcement policies, we were able to define the constraints or the limits to secure the environment in a better way.
Since we were able to work with them closely and provide suggestions to them, and they would take action right away, we didn't have much else for them to improve on.
However, perhaps the network visibility side could be improved, although I think they've taken action on that, based on the latest releases. They might have already improved the process on the network visibility aspect.
We didn't have any issues regarding stability. The only problem was the network monitoring side and it wasn't really a primary goal for us. We had other mechanisms to gain network visibility, so that wasn't an issue that blocked us at any point.
We didn't have any problems with scalability. Their architecture provided the means to scale as the enterprise grew, so we were actually expanding the rollout with Aqua Security. The way they architected it, you could actually have a single command-and-control center and have multiple gateways into various environments that rolled up to the command center. That way, even if you had thousands of environments, you could just segment them up and manage them individually through a central location, rather than having a huge blob of things that wouldn't scale properly. The federated, distributed approach they provided let us scale throughout the enterprise.
One of the great aspects of Aqua Security was their technical support. They understood the issues we were reporting and they were able to take action right away. Mostly, it was not that things that were breaking, it was more things that we needed for our environment specifically. They were able to understand and take action and get something deployed within a week, which was something we hadn't seen in a lot of vendors in quite a while.
We weren't using any solution before that was providing us with visibility into our container platforms. We looked at other solutions out there and, based on various aspects, including customer service and technical support, we picked Aqua Security. The technical support and customer service aspects were what led us to pick Aqua Security over the competitors.
We were able to deploy, test, and roll it out in a short amount of time. The Aqua Security team was really supportive and were able to address our unique needs right away. They were able to address certain issues that showed up as bugs in their code but they were resolved really fast. They had really great customer service.
The setup was straightforward compared to their competitors, whose setup failed. The Aqua Security setup went smoothly and we were surprised that it actually went off without any issues. The installation instructions they had provided were straightforward and we didn't require much assistance for the initial rollout. The way they packaged it, it was straightforward to install and manage at the same time. It wasn't complex at all.
I'm not sure if I can place any numeric values on ROI but, considering that we went from zero security to having full visibility and the ability to create policies to enforce our requirements, I think it was a reasonable investment. Going from zero to, say, 80 to 90 percent capabilities was a good deal.
When we chose it there weren't many solution providers so their pricing might have been something that smaller environments, smaller shops, might have balked at. For larger environments, it wasn't a problem because it's a choice between having no security for containers and having security.
It was a price point that made sense to us, compared to not having a solution that would provide us with the visibility and the enforcement policy aspects, to lock things down. They were reasonable with their pricing. They were pretty down-to-earth about the way they pitched their product and the way they tried to close the deal. They were one of the rare companies that approached the whole valuation in a way that made sense for our company, for our needs, and for their own requirements as well.
They were a good company to work with, to sum it up. Given the customer service, technical aspects, and pricing, the offer made sense to us and we went forward with them.
Regarding licensing, they will accommodate your needs if they are able to understand them and they're stated clearly. If your needs are on the visibility side, Aqua Security will be able to accommodate that and not price the full solution. If you need the full solution, they will provide pricing accordingly. Based on the needs and the environment, they will be able to come up with a licensing structure that will accommodate whatever the requirements are.
There were only a few players in the field, two of them being more equal to each other, Aqua Security and a competitor. But at the time, the competitor's product wouldn't even install properly on our PoC systems, and when we said, "Hey, look, your product isn't installing," they just pointed us to more documentation and said we should download the latest version. So they weren't really offering any technical support or any other type of customer service resources to even resolve the initial hurdle. That was a red flag right off the bat: "Hey, look, this competitor is not willing to work with us to even gain the initial foothold."Aqua Security, on the other hand, helped us even though there was no issue. They spent a lot of time explaining how to properly roll it out, properly configure it, etc.
First off, know your environment. Know your rollout. If you're in the planning stage, make sure you design things properly and, once you have that in place, once you know your own infrastructure, then talk with Aqua Security to find the best solution that works for you, whether you need visibility or whether you need enforcement capabilities.
If you need to integrate the logs which are in your existing infrastructure, it would be quite useful to involve Aqua Security earlier so they can properly address the issues that need to be solved in the infrastructure.
Work with them earlier in the design phase, if it's still being designed. If it's an existing infrastructure, talk to them but know your environment, for your own sake and to make things easier for Aqua Security to provide a better fitting solution so nobody's time is wasted. You can get more bang for your buck or more value out of the deal if you know your environment.
The main reasons we chose Aqua Security were the visibility it provided into the container platform and the great customer service. Both aspects: The visibility they provided, compared to the other solutions - their technical abilities were further ahead - and the customer service aspect of it. They were able to work with us closely and address our problems in a prompt manner.
The solution they provided, from all aspects, was great. They understood our needs, delivered solutions, and remedied any issues that we brought up in a timely manner. They surprised us on many occasions by having things delivered in a couple of days. The scalability of it and the ease of deployment made it a great solution for us.
We're using it for the Image Vulnerability Scanning. We have an on-premise solution, so for us, vulnerability scanning is most important. Part of our platform spins up Docker containers and uses Docker internally. We're not a SaaS company, so it's not in the cloud and, therefore, it's very important for us to deploy at the customer's environment. It's very important that we deploy Docker images, that we see the vulnerabilities because we deploy in the customer's environment.
Until now, we didn't have vulnerability management for our Docker images. We tried to use Docker Hub for the vulnerability, but it wasn't suitable, and I'm not sure if it is even supported today. We needed a way to understand which images are vulnerable and which are not, and to do so automatically. Aqua gives us the ability to automatically scan those images, to schedule jobs to trigger scans, and get the vulnerabilities for the Docker images so we can track them, and understand what we need to patch and where to patch.
It definitely saves us time. We didn't really have a way to do it before. It's basically impossible to do it manually when you have a fleet of Docker images. You have to have some third-party service for scanning.
Aqua improved our application security. It has given us visibility into the vulnerability of those images.
Overall, it gives us good vulnerability management.
Something we would like to see is a better way to automatically fetch old Tags from an image. That might be something they have improved. We're not sure if they have added that feature or not yet. It's something that would be a nice-to-have.
The stability is good. I do remember that we had emails about some maintenance or a failure, maybe once or twice, during the year. But they didn't really impact us because it's a job that runs for us in a scheduled manner, once a week. For our needs, the SLA is not critical because it's a scheduled job. We don't need a very high SLA.
It works for our scale. We don't push it to extraordinary extremes, but for our scale, it has worked fine.
Tech support is good and fast. We haven't needed tech support much, maybe two or three times a year. We used it most initially, during the setup. And we needed it to renew our license.
We didn't have a previous solution. We went with Aqua because it seemed to be an enterprise company in terms of security, one of the leaders in the field, so we tried them first. It gave us the value that we needed. They made a very good impression with their knowledge of security around containers. It seemed to be a company focused on that, security first for containers, unlike Docker. That was an advantage to us.
The initial setup was straightforward. Not much configuration was needed. It didn't take us a long time to set it up and we got support from them for specific questions. It was done in about half a day.
Since ours is not a complex use case, we didn't have a particular strategy for the setup. We don't have a complex environment. We did it ourselves. It's very easy to implement.
As I said, manually checking vulnerability is not really feasible. We had to have some kind of solution. The ROI is clear. We could not live without it. Now we are getting back a picture of the vulnerability and we are able to fix severe security/vulnerability bugs.
I know there are some open-source solutions, and we haven't tried those, but I believe that Aqua Enterprise is superior to open-source. We looked at the Docker Hub option. It seemed like it was half-baked at the time. There is also Twistlock, but I haven't tried it out. We found what we needed with Aqua and we didn't have a need to compare it with other solutions.
They gave us access to their executive team, specifically, the CTO. I had met him long ago at a Docker conference. He gave us full support and technical support. He was very technically oriented. He helped us with the setups, technically, and we're still in touch today. When I need help he is there.
In terms of the number of users of the solution, for us, it's just the people who maintain the Docker images, two or three people: the head of DevOps and the Director of Engineering. It's just vulnerability management, we don't need many people to access the platform. Once we integrate it with Slack, we'll have visibility for all the users. But day-to-day, they don't need to access the platform, they'll just want to consume the reports. In terms of maintenance, it's very low. One person will get along fine. In our company, it is done by DevOps.
Usage is going up automatically because we're increasing Docker images all the time, so the usage is increasing by default.
Regarding the extent to which we are using all the capabilities of the solution, the parts which are not relevant for vulnerability scanning are not relevant for us. We haven't explored what else Aqua can do. It's not part of our scope. I'm sure other companies are using the vast amount of features it has but we only need the vulnerability management.
I rate it at ten out of ten. For our needs, it's a complete solution.