Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Red Hat Advanced Cluster Security for Kubernetes comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
2nd
Average Rating
8.6
Reviews Sentiment
7.9
Number of Reviews
106
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Azure Kubernetes Service (AKS)
Ranking in Container Security
12th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
38
Ranking in other categories
No ranking in other categories
Red Hat Advanced Cluster Se...
Ranking in Container Security
20th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.1%, up from 1.1% compared to the previous year. The mindshare of Azure Kubernetes Service (AKS) is 1.0%, down from 1.5% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.5%, down from 3.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Raymond De Rooij - PeerSpot reviewer
Scalability and flexibility but needs better support
We are using Azure Kubernetes Service as a customer. I cannot detail all the products and technologies we are using There isn't one specific feature of Azure Kubernetes Service that I can name as most valuable. It's part of a strategic solution yet I don't see an advantage compared to our…
Daniel Stevens - PeerSpot reviewer
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The visibility is the best part of the solution."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"The most valuable features of PingSafe are cloud misconfiguration, Kubernetes, and IaC scanning."
"We liked the search bar in PingSafe. It is a global search. We were able to get some insights from there."
"I recommend SentinelOne due to its high-security capabilities, which are essential to safeguard data and systems from potential threats."
"It is scalable, stable, and can detect any threat on a machine. It uses artificial intelligence and can lock down any virus."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"The user-friendliness is the most valuable feature."
"Has a good management feature monitored by the cloud service provider."
"We are not yet fully public cloud-native, however, Azure Kubernetes Service promises interesting scalability and flexibility for the future."
"It employs high availability."
"The integration with Azure's security capabilities is very good. The Azure managed identity and integration with the Azure application gateway for App Ingress are valuable features. Additionally, it is a very stable tool."
"The tool is budget-friendly."
"I have enjoyed working with all the features."
"The solution is a managed Kubernetes, so much of the maintenance in the control plane is handled automatically by the cloud service provider."
"It is easy to deploy."
"Offers easy management with authentication and authorization features"
"Segmentation is the most powerful feature."
"The technical support is good."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"Scalability-wise, I rate the solution a nine out of ten."
"I am impressed with the tool's visibility."
"The most valuable feature of the solution is its monitoring feature."
 

Cons

"It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background."
"PingSafe filtering has some areas that cause problems, and to achieve single sign-on functionality, a break-glass feature, which is currently unavailable, is necessary."
"They need more experienced support personnel."
"Crafting customized policies can be tricky."
"We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating."
"They can work on policies based on different compliance standards."
"I would like additional integrations."
"It would be really helpful if the solution improves its agent deployment process."
"The product’s cost could be reduced."
"The product needs to support a UI dashboard. I have to execute every single command to check the status of services which takes time."
"There are a lot of features that should be included with the AKS."
"AKS could enhance its functionality by introducing a blueprint feature that streamlines and expedites the process. With a blueprint, users can leverage pre-defined configurations, including some common survey elements, reducing the need for extensive customization and allowing us to focus on our core business activities. Additionally, if the blueprint covers security aspects, it would be greatly beneficial, as it eliminates the need for us to build security expertise from scratch. Currently, we encounter challenges during cloud onboarding, security implementation, and adapting to Kubernetes. Although Microsoft may not consider these as their direct responsibility, providing a blueprint similar to what they offer to developers would be highly advantageous."
"The solution should improve its UI and cost."
"It just loses out because you have less access to it programmatically, with less technical or customizable access."
"The application firewall is lacking some features and there is room for enhancement."
"It can be tough to access the servers when onboarding."
"The testing process could be improved."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The solution's visibility and vulnerability prevention should be improved."
"The solution's price could be better."
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"Red Hat is somewhat expensive."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
 

Pricing and Cost Advice

"SentinelOne provided competitive pricing compared to other vendors, and we are satisfied with the deal."
"PingSafe's pricing is good because it provides us with a solution."
"PingSafe is fairly priced."
"As a partner, we receive a discount on the licenses."
"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"We found it to be fine for us. Its price was competitive. It was something we were happy with. We are not a Fortune 500 company, so I do not know how pricing scales at the top end, but for our cloud environment, it works very well."
"PingSafe falls within the typical price range for cloud security platforms."
"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"The solution does not cost much."
"Azure Kubernetes Service (AKS) is an expensive solution"
"The product is expensive in terms of scalability."
"The product is expensive."
"The pricing of the solution is same as Azure Stack."
"Azure Kubernetes Service offers a pay-as-you-go licensing model."
"We could spend as little as $25 or $30 a month on Kubernetes Services, compared to the typical $100 a month expenditure for a virtual machine."
"The cost of the solution is extremely high. Both Amazon and Azure cost extremely high. Given the basic features like when they are coming over the cluster nodes, we think over ten times before giving the solution to clients. No matter how many offerings the solution provides, it becomes so much of a burden that you are not even getting back your invested money from customers."
"We purchase a yearly basis license for the solution."
"It's a costly solution"
"The pricing model is moderate, meaning it is not very expensive."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
842,388 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Financial Services Firm
26%
Computer Software Company
13%
Manufacturing Company
8%
Government
6%
Financial Services Firm
25%
Computer Software Company
14%
Government
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of criti...
What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
One improvement I'd like to see is a better user interface for developers, enabling easier operation without relying ...
What is your primary use case for Azure Kubernetes Service (AKS)?
My primary use case is building and deploying solutions using multiple Azure services. I combine these services to bu...
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the b...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for th...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling,...
 

Also Known As

PingSafe
No data available
StackRox
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: March 2025.
842,388 professionals have used our research since 2012.