Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Red Hat Advanced Cluster Security for Kubernetes comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Azure Kubernetes Service (AKS)
Ranking in Container Security
19th
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
41
Ranking in other categories
No ranking in other categories
Red Hat Advanced Cluster Se...
Ranking in Container Security
20th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Container Security category, the mindshare of Azure Kubernetes Service (AKS) is 0.9%, up from 0.6% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.1%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
Azure Kubernetes Service (AKS)0.9%
Red Hat Advanced Cluster Security for Kubernetes2.1%
Other97.0%
Container Security
 

Featured Reviews

Daniel Wichinescki - PeerSpot reviewer
IT Specialist | SRE | Cloud Public and Private at Parana Banco
Has supported production deployments and simplified permission management though could reduce monitoring costs
For Azure Kubernetes Service (AKS), we only used it to orchestrate the Kubernetes pods. We didn't use the other features. We only used the environment to start our application. I utilized the automatic scaling capabilities. The integration with Azure Active Directory helped with the security of our applications. I think Amazon EKS is better. EKS is the best because there are many features to use for scaling and to control the environments.
Daniel Stevens - PeerSpot reviewer
Software Engineer at Galley
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I found the Helm deployment feature of the solution valuable."
"The most valuable feature of the solution is the diagnostic service."
"Has a good management feature monitored by the cloud service provider."
"In your experience, how has the integration of Azure Active Directory with Azure Kubernetes Service (AKS) helped enhance the security of application?"
"Its support team resolves technical issues accurately."
"The advantage of AKS is somewhat greater than that of Kubernetes, such as those provided by Google Cloud or AWS. However, the unique benefit offered by Microsoft is its robust CI/CD capabilities, along with the Azure feature for building workflows. When you combine the entire ecosystem, AKS becomes an excellent choice, particularly for enterprise applications."
"Compliance is easy right out-of-the-box with integration to Azure Security, Azure Active Directory, and Azure Policies."
"It is appealing to us due to its complexity, which aligns well with our requirements."
"I am impressed with the tool's visibility."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"It is easy to install and manage."
"Offers easy management with authentication and authorization features"
"Segmentation is the most powerful feature."
"The most valuable feature is the ability to share resources."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
 

Cons

"Azure Kubernetes Service (AKS) is not up to optimal standards when it comes to capturing logs and visualization."
"There are a lot of features that should be included with the AKS."
"AKS has the potential to enhance pricing by enabling us to explore ways to increase cost transparency. However, it's important to note that this refers to computation costs rather than client costs. Our objective is to optimize efficiency and minimize unnecessary expenses. Therefore, we aim to identify which services within the platform can benefit from improved consumption patterns. This is the focus of our ongoing research, with the goal of maximizing computational power within the cluster. We aim to avoid situations where resources are reserved but not utilized effectively. Additionally, our strong emphasis on security ensures that we adhere to all relevant compliance standards, bolstering our overall trustworthiness."
"One improvement I'd like to see is a better user interface for developers, enabling easier operation without relying heavily on command lines."
"The engineering team can reduce the management of the platform itself by improving the data plane part of the system to upload more management."
"I am not impressed with the support services from Microsoft yet."
"Sometimes, it fails to provide specific metrics."
"Configuration management and troubleshooting performance issues are difficult to solve and could be made easier."
"The solution's visibility and vulnerability prevention should be improved."
"The testing process could be improved."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"Red Hat is somewhat expensive."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
 

Pricing and Cost Advice

"The pricing of the solution is dependent on the choice of virtual machines, specifically the amount of memory required. There are various options available, ranging from around twenty-five to even more choices to select from. This flexibility allows you to customize the pricing based on your specific needs. From my perspective, virtual machines in the cloud tend to be slightly more expensive compared to virtual machines offered directly by data centers. However, this cost is offset by the benefits of a managed service. Taking the overall picture into account, the managed service approach is advantageous. The pricing for the platform can vary, typically ranging from three hundred euros per month to two thousand euros per month, depending on the specific requirements and setup you choose."
"It is expensive compared to other vendors."
"The pricing of the solution is same as Azure Stack."
"You pay for what you use."
"It is a cost-effective solution."
"The product follows a pay-as-you-go pricing model which is good for small enterprises. You need to pay only for the services that you use."
"The cost of the solution is extremely high. Both Amazon and Azure cost extremely high. Given the basic features like when they are coming over the cluster nodes, we think over ten times before giving the solution to clients. No matter how many offerings the solution provides, it becomes so much of a burden that you are not even getting back your invested money from customers."
"We could spend as little as $25 or $30 a month on Kubernetes Services, compared to the typical $100 a month expenditure for a virtual machine."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"The pricing model is moderate, meaning it is not very expensive."
"It's a costly solution"
"We purchase a yearly basis license for the solution."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
881,821 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
22%
Computer Software Company
11%
Manufacturing Company
7%
Insurance Company
6%
Financial Services Firm
28%
Computer Software Company
9%
Government
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise7
Large Enterprise22
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise4
 

Questions from the Community

What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
I am not sure about areas that could be improved.
What is your primary use case for Azure Kubernetes Service (AKS)?
I use the product for the environments in the company, specifically for the environments in production, QA, and development. I used it in the finance industry at a bank. Now I have moved to another...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for the prevention part, but currently, we need to do it manually. I hear that Palo Al...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling, and everything else.
What advice do you have for others considering Red Hat Advanced Cluster Security for Kubernetes?
The tool's policy management supports our company's compliance efforts since any corporate entity or enterprise must follow specific regulations, which include periodic analysis and configuration r...
 

Also Known As

No data available
StackRox
 

Overview

 

Sample Customers

Information Not Available
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: December 2025.
881,821 professionals have used our research since 2012.