Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Red Hat Advanced Cluster Security for Kubernetes comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
109
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Azure Kubernetes Service (AKS)
Ranking in Container Security
15th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
38
Ranking in other categories
No ranking in other categories
Red Hat Advanced Cluster Se...
Ranking in Container Security
21st
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.1%, up from 1.0% compared to the previous year. The mindshare of Azure Kubernetes Service (AKS) is 0.7%, down from 1.0% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.4%, down from 3.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Raymond De Rooij - PeerSpot reviewer
Scalability and flexibility but needs better support
We are using Azure Kubernetes Service as a customer. I cannot detail all the products and technologies we are using There isn't one specific feature of Azure Kubernetes Service that I can name as most valuable. It's part of a strategic solution yet I don't see an advantage compared to our…
Daniel Stevens - PeerSpot reviewer
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloud Native Security offers a valuable tool called an offensive search engine."
"With PingSafe, it's easy to onboard new accounts."
"We mostly use alerts. That has been pretty good. If we use the alert system from Amazon, it is much costlier to us, so we use PingSafe."
"SentinelOne is far superior to our previous solution, Accops, due to its seamless updates, effortless maintenance, and user-friendly interface and dashboard."
"SentinelOne Singularity Cloud Security offers several valuable features, most notably the rapid vulnerability notifications that provide timely alerts regarding our infrastructure."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"The most valuable feature is the notification system, providing real-time alerts and comparisons crucial for maintaining security."
"Singularity Cloud Security offers autonomous response capabilities, automatically remediating threats and restoring affected files without manual intervention."
"The most valuable features of Azure Kubernetes Service are its integration with Kubernetes, offering similar features for a seamless experience."
"The platform's high scalability is one of its biggest advantages."
"The product serves the purpose of helping streamline our company's application deployment and scaling processes."
"It is appealing to us due to its complexity, which aligns well with our requirements."
"The integration with Azure's security capabilities is very good. The Azure managed identity and integration with the Azure application gateway for App Ingress are valuable features. Additionally, it is a very stable tool."
"The serverless capability and auto scale feature are the most valuable."
"The tool is budget-friendly."
"Integration and automation are the best features of the solution."
"The most valuable feature of the solution is its monitoring feature."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"The technical support is good."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"The most valuable feature is the ability to share resources."
"Segmentation is the most powerful feature."
"I am impressed with the tool's visibility."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
 

Cons

"They can work on policies based on different compliance standards."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"I believe the UI/UX updates for SentinelOne Singularity Cloud Security have room for improvement."
"One potential drawback is the cost of SentinelOne Singularity Cloud Security, which may be prohibitive for smaller businesses or startups, particularly those in regions with lower average incomes, such as India."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"The areas with room for improvement include the cost, which is higher compared to other security platforms. The dashboard can also be laggy."
"PingSafe can improve by eliminating 100 percent of the false positives."
"We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating."
"The application firewall is lacking some features and there is room for enhancement."
"The solution's logs have room for improvement."
"I would like to see Azure implement something like the K9 terminal for interacting with Kubernetes clusters. It's a user-friendly CLI interface."
"More control over Infra scanning can be introduced."
"Sometimes, it fails to provide specific metrics."
"There are some limitations with the tutor version, particularly in terms of using a lot of free audio. The private level also has restrictions, limiting the number of audio files you can access to just 50. If you want more, you need to contact support."
"I am not impressed with the support services from Microsoft yet."
"Azure Kubernetes Service (AKS) is more flexible but more complex to maintain."
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The support and specifications need to be up to date for the cluster technologies"
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The solution's visibility and vulnerability prevention should be improved."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
 

Pricing and Cost Advice

"PingSafe is not very expensive compared to Prisma Cloud, but it's also not that cheap. However, because of its features, it makes sense to us as a company. It's fairly priced."
"It was reasonable pricing for me."
"Pricing is based on modules, which was ideal for us."
"As a partner, we receive a discount on the licenses."
"Its pricing was a little less than other providers."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"It is cost-effective compared to other solutions in the market."
"While SentinelOne Singularity Cloud Security offers robust protection, its high cost may be prohibitive for small and medium-sized businesses."
"Azure Kubernetes Service offers a pay-as-you-go licensing model."
"We could spend as little as $25 or $30 a month on Kubernetes Services, compared to the typical $100 a month expenditure for a virtual machine."
"It is an expensive solution."
"The product is expensive."
"The cost of the solution is extremely high. Both Amazon and Azure cost extremely high. Given the basic features like when they are coming over the cluster nodes, we think over ten times before giving the solution to clients. No matter how many offerings the solution provides, it becomes so much of a burden that you are not even getting back your invested money from customers."
"The control plane is free and we only pay for the usage and time."
"You pay for what you use."
"The pricing of the solution is dependent on the choice of virtual machines, specifically the amount of memory required. There are various options available, ranging from around twenty-five to even more choices to select from. This flexibility allows you to customize the pricing based on your specific needs. From my perspective, virtual machines in the cloud tend to be slightly more expensive compared to virtual machines offered directly by data centers. However, this cost is offset by the benefits of a managed service. Taking the overall picture into account, the managed service approach is advantageous. The pricing for the platform can vary, typically ranging from three hundred euros per month to two thousand euros per month, depending on the specific requirements and setup you choose."
"It's a costly solution"
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"The pricing model is moderate, meaning it is not very expensive."
"We purchase a yearly basis license for the solution."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
847,862 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Financial Services Firm
26%
Computer Software Company
12%
Manufacturing Company
8%
Government
6%
Financial Services Firm
25%
Computer Software Company
13%
Government
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
The documentation could be better. Besides improving the documentation, obtaining a professional or partner specializ...
What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
One improvement I'd like to see is a better user interface for developers, enabling easier operation without relying ...
What is your primary use case for Azure Kubernetes Service (AKS)?
My primary use case is building and deploying solutions using multiple Azure services. I combine these services to bu...
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the b...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for th...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling,...
 

Also Known As

PingSafe
No data available
StackRox
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: March 2025.
847,862 professionals have used our research since 2012.