Try our new research platform with insights from 80,000+ expert users

Amazon EKS vs ExtraHop Reveal(x) 360 comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
109
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Amazon EKS
Ranking in Container Security
13th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
48
Ranking in other categories
Container Management (2nd)
ExtraHop Reveal(x) 360
Ranking in Container Security
25th
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
3
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (19th), Network Traffic Analysis (NTA) (9th), Extended Detection and Response (XDR) (24th)
 

Mindshare comparison

As of April 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.1%, up from 1.0% compared to the previous year. The mindshare of Amazon EKS is 0.1%, up from 0.0% compared to the previous year. The mindshare of ExtraHop Reveal(x) 360 is 0.2%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Rock Wang - PeerSpot reviewer
Managing complex environments effortlessly while focusing on growth
The most beneficial aspect of Amazon EKS is that it helps manage the Kubernetes master node, so I don't need to maintain the master node, including tasks like upgrading. This allows me to focus on business code. If using services like Fargate, I only need to maintain my workload, simply uploading code that will be deployed to the Kubernetes cluster. This is especially beneficial for startup companies that lack the technical resources to manage the Kubernetes cluster. Furthermore, Amazon EKS allows me to utilize Kubernetes cluster-level expansion. If there’s insufficient resource on a machine, the cluster can automatically expand to add new nodes.
Maksym Toporkov - PeerSpot reviewer
A competitive choice for network detection and response with exceptional user interface, ease of implementation and minimal false positives
The NDR feature analyzes network traffic, creating records with connection details. While these records offer insights, there's a limitation in investigating payloads directly. ExtraHop provides an option for an additional server to save payloads, but its temporary storage has constraints. Unlike some competitors, it lacks an automatic payload-saving feature for each detection, presenting an improvement opportunity. Suggested enhancement involves the main sensor prompting payload storage for specific detections, streamlining the investigation process, and contributing to a more efficient workflow. A drawback includes packet storage limitations for payload data, necessitating timely extraction for thorough investigations.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"PingSafe offers security solutions for both Kubernetes and CI/CD pipelines."
"The cloud misconfiguration is the most valuable feature."
"PingSafe's most valuable feature is its unified console."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"The management console is highly intuitive to comprehend and operate."
"The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator."
"We mostly use alerts. That has been pretty good. If we use the alert system from Amazon, it is much costlier to us, so we use PingSafe."
"I would rate SentinelOne Singularity Cloud Security a nine out of ten."
"AWS EKS provides flexibility and scalability compared to on-premises Kubernetes."
"The most valuable features of Amazon EKS are its auto scaling ability and the ability for service discovery."
"The serverless capability of Amazon EKS is quite valuable."
"The feature that I have found most valuable is that it is very user-friendly."
"Amazon EKS is very scalable."
"It's the best option for medium or large enterprises."
"The most valuable features of Amazon EKS are its scalability features."
"The solution is easy to use."
"It is very easy to collect and handle data in ExtraHop Reveal(X) Cloud. Integration with Big Data is also easy. Many of our customers integrate it with Big Data platforms like Splunk or Elastic. It is also easy to handle and easy to understand."
"It is scalable."
"It stands out for its intuitive and efficient user interface, robust detection capabilities with minimal false positives, and the ability to handle encrypted traffic, making it a valuable asset for network security and management."
 

Cons

"A vulnerability alert would appear, and we'd fix it, but then the same alert would return the next day."
"We can customize security policies but lack auditing capabilities."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"The documentation could be better."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments."
"They can work on policies based on different compliance standards."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"I'd like improved traffic handling and additional application details within the system."
"The connectivity could be better."
"I'm having difficulty getting my AWS clusters to communicate with my local machine."
"It is very cumbersome to assign permissions to users to interact with a cluster."
"The main thing to improve with Amazon EKS is the price. However, these services can be very expensive. For example, in countries like Turkey, the cost is too high. That's why we offer our cloud solutions locally. We developed hybrid solutions, but their prices are still very high."
"Amazon EKS is predominately public. However, the government has started to have a lot of interest in Kubernetes and is receiving more education on Kubernetes and Amazon EKS. If we can have the security of Amazon EKS align with the security that is set out by the government it would be much better."
"I believe the initial setup could be a better experience and faster customer support."
"The dashboard needs to be more user-friendly."
"They can include integration with SAP. Currently, no vendor provides network performance monitoring in the SAP market. It is a very big market. We have around 400 customers for SAP in Korea. In the USA, there are more than 10,000 customers."
"A drawback includes bucket storage limitations for payload data, necessitating timely extraction for thorough investigations."
"There needs to be more support."
 

Pricing and Cost Advice

"Its pricing is okay. It is in line with what other providers were providing. It is not cheap. It is not expensive."
"Pricing is based on modules, which was ideal for us."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"It is cost-effective compared to other solutions in the market."
"The pricing is somewhat high compared to other market tools."
"Singularity Cloud Workload Security's pricing is good."
"PingSafe is fairly priced."
"PingSafe's primary advantage is its ability to consolidate multiple tools into a single user interface, but, beyond this convenience, it may not offer significant additional benefits to justify its price."
"The solution is more expensive than other competitors and does not require a license."
"The price could be cheaper. I would rate it as seven out of ten."
"The solution is quite costly and developers will start exploring other solutions or moving their workloads to other clouds if costs aren't reduced."
"The product pricing depends on the specific requirements."
"The solution is pricey. The tool's pricing is monthly."
"I would like a cheaper version of it."
"Amazon EKS is expensive."
"Amazon EKS is quite pricey, but the functionality it provides is worth it."
"When compared to other solutions, it aligns with the market average, indicating a competitive pricing level."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
847,625 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Financial Services Firm
22%
Computer Software Company
13%
Manufacturing Company
7%
Insurance Company
6%
Financial Services Firm
10%
Insurance Company
8%
University
8%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
The documentation could be better. Besides improving the documentation, obtaining a professional or partner specializ...
What do you like most about Amazon EKS?
The product's most valuable features are scalability, observability, and performance.
What is your experience regarding pricing and costs for Amazon EKS?
The pricing structure is beneficial for large companies who pay for what they use, but it is not affordable for start...
What needs improvement with Amazon EKS?
There is room for improvement in making Amazon EKS ( /products/amazon-eks-reviews ) less error-prone when writing on ...
What do you like most about ExtraHop Reveal(x) 360?
It stands out for its intuitive and efficient user interface, robust detection capabilities with minimal false positi...
What needs improvement with ExtraHop Reveal(x) 360?
The NDR feature analyzes network traffic, creating records with connection details. While these records offer insight...
What advice do you have for others considering ExtraHop Reveal(x) 360?
I recommend prioritizing demos over POCs when engaging with vendors. Organizing POCs involves significant time and re...
 

Also Known As

PingSafe
Amazon Elastic Kubernetes Service
ExtraHop Reveal(X) Cloud, Reveal(X) Cloud
 

Overview

 

Sample Customers

Information Not Available
GoDaddy, Pearson, FICO, Intuit, Verizon, Honeywell, Logicworks, RetailMeNot, LogMeIn, Conde Nast, mercari, Trainline, Axway
Wizards of the Coast
Find out what your peers are saying about Amazon EKS vs. ExtraHop Reveal(x) 360 and other solutions. Updated: March 2025.
847,625 professionals have used our research since 2012.