Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Red Hat Advanced Cluster Security for Kubernetes comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.6
Reviews Sentiment
7.8
Number of Reviews
103
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Azure Kubernetes Service (AKS)
Ranking in Container Security
14th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
38
Ranking in other categories
No ranking in other categories
Red Hat Advanced Cluster Se...
Ranking in Container Security
20th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.0%, up from 0.9% compared to the previous year. The mindshare of Azure Kubernetes Service (AKS) is 0.7%, down from 1.0% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.3%, down from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Raymond De Rooij - PeerSpot reviewer
Scalability and flexibility but needs better support
We are using Azure Kubernetes Service as a customer. I cannot detail all the products and technologies we are using There isn't one specific feature of Azure Kubernetes Service that I can name as most valuable. It's part of a strategic solution yet I don't see an advantage compared to our…
Daniel Stevens - PeerSpot reviewer
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Singularity Cloud's ability to create custom correlation searches and reduce noise is highly valuable."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"Cloud Native Security is user-friendly. Everything in the Cloud Native Security tool is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features."
"SentinelOne Singularity Cloud Security has improved our security posture."
"It is advantageous in terms of time-saving and cost reduction."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"The agentless vulnerability scanning is great."
"The user-friendliness is the most valuable feature."
"We are not yet fully public cloud-native, however, Azure Kubernetes Service promises interesting scalability and flexibility for the future."
"Compliance is easy right out-of-the-box with integration to Azure Security, Azure Active Directory, and Azure Policies."
"The integration with Azure's security capabilities is very good. The Azure managed identity and integration with the Azure application gateway for App Ingress are valuable features. Additionally, it is a very stable tool."
"It employs high availability."
"I don't have to furnish my own infrastructure in order to run containers or Kubernetes."
"The platform's high scalability is one of its biggest advantages."
"The setup was straightforward and it took one hour to deploy."
"Containerization of the applications is the most valuable feature."
"The most valuable feature is the ability to share resources."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"The technical support is good."
"It is easy to install and manage."
"Offers easy management with authentication and authorization features"
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"Scalability-wise, I rate the solution a nine out of ten."
 

Cons

"There should be more documentation about the product."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments."
"The areas with room for improvement include the cost, which is higher compared to other security platforms. The dashboard can also be laggy."
"They need more experienced support personnel."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"While SentinelOne offers robust security features, its higher cost may present a challenge for budget-conscious organizations."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"Azure Kubernetes Service (AKS) is more flexible but more complex to maintain."
"Configuration management and troubleshooting performance issues are difficult to solve and could be made easier."
"The engineering team can reduce the management of the platform itself by improving the data plane part of the system to upload more management."
"There is room for improvement in automation processes, as well."
"I would like to see the stability get more synchronized."
"This is a fairly expensive solution, which can make it prohibitive for smaller organizations."
"Azure Kubernetes Service (AKS) is not up to optimal standards when it comes to capturing logs and visualization."
"The technical support could be faster."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The support and specifications need to be up to date for the cluster technologies"
"Red Hat is somewhat expensive."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The testing process could be improved."
 

Pricing and Cost Advice

"PingSafe falls within the typical price range for cloud security platforms."
"Pricing is based on modules, which was ideal for us."
"PingSafe is not very expensive compared to Prisma Cloud, but it's also not that cheap. However, because of its features, it makes sense to us as a company. It's fairly priced."
"The features included in PingSafe justify its price point."
"PingSafe falls somewhere in the middle price range, neither particularly cheap nor expensive."
"Their pricing appears to be based simply on the number of accounts we have, which is common for cloud-based products."
"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"It was reasonable pricing for me."
"The price of AKS is expensive. We pay approximately $10,000 monthly."
"It is not expensive."
"As you scale your operations, AKS becomes more cost-effective."
"The product is expensive."
"I like the pricing and find it to be in the mid-range, and I would rate it as five out of ten."
"The solution does not cost much."
"You pay for what you use."
"The pricing of the solution is dependent on the choice of virtual machines, specifically the amount of memory required. There are various options available, ranging from around twenty-five to even more choices to select from. This flexibility allows you to customize the pricing based on your specific needs. From my perspective, virtual machines in the cloud tend to be slightly more expensive compared to virtual machines offered directly by data centers. However, this cost is offset by the benefits of a managed service. Taking the overall picture into account, the managed service approach is advantageous. The pricing for the platform can vary, typically ranging from three hundred euros per month to two thousand euros per month, depending on the specific requirements and setup you choose."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"The pricing model is moderate, meaning it is not very expensive."
"It's a costly solution"
"We purchase a yearly basis license for the solution."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Financial Services Firm
26%
Computer Software Company
13%
Manufacturing Company
8%
Government
6%
Financial Services Firm
25%
Computer Software Company
15%
Government
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven.
What needs improvement with PingSafe?
From my personal experience, the alerting system needs to be faster. If something happens in our infrastructure, the ...
What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
One improvement I'd like to see is a better user interface for developers, enabling easier operation without relying ...
What is your primary use case for Azure Kubernetes Service (AKS)?
My primary use case is building and deploying solutions using multiple Azure services. I combine these services to bu...
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the b...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for th...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling,...
 

Also Known As

PingSafe
No data available
StackRox
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: January 2025.
838,713 professionals have used our research since 2012.