Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Trivy comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
109
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Azure Kubernetes Service (AKS)
Ranking in Container Security
15th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
38
Ranking in other categories
No ranking in other categories
Trivy
Ranking in Container Security
16th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.1%, up from 1.0% compared to the previous year. The mindshare of Azure Kubernetes Service (AKS) is 0.7%, down from 1.0% compared to the previous year. The mindshare of Trivy is 5.5%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Raymond De Rooij - PeerSpot reviewer
Scalability and flexibility but needs better support
We are using Azure Kubernetes Service as a customer. I cannot detail all the products and technologies we are using There isn't one specific feature of Azure Kubernetes Service that I can name as most valuable. It's part of a strategic solution yet I don't see an advantage compared to our…
Utsav Sharma - PeerSpot reviewer
Maintain operational efficiency by detecting misconfigurations and vulnerabilities
The vulnerability scanning feature is excellent as it supports various container capabilities like Docker and Sharma. It also offers repository scanning in the source code domain, allowing pre-push code scans. The misconfiguration detection works well for CloudFormation, Docker files, and Terraform. Its compliance support, like NIST, ensures that configurations align with standards. Trivy helps me significantly detect misconfigurations missed by the ops engineers or in Terraform by the naked eye. It ensures that my deployments are free of misconfigurations and vulnerabilities.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"Cloud Native Security offers attack path analysis."
"The user interface is well-designed and easy to navigate."
"The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"PingSafe's most valuable feature is its unified console."
"As a frequently audited company, we value PingSafe's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security."
"The solution is a managed Kubernetes, so much of the maintenance in the control plane is handled automatically by the cloud service provider."
"It is appealing to us due to its complexity, which aligns well with our requirements."
"The product has built-in functionality that checks whether the service is available or not. In case the service is down, the tool will create a new instance by default. Hence, the web API will be always up irrespective of the server or the situation."
"The product’s most valuable features are ease of use and automation."
"Compliance is easy right out-of-the-box with integration to Azure Security, Azure Active Directory, and Azure Policies."
"We like how easy it is to create the resources in this solution, thanks to how easy the UI is to use."
"I have enjoyed working with all the features."
"The integration with Azure's security capabilities is very good. The Azure-managed identity and integration with the Azure application gateway for App Ingress are valuable features. Additionally, it is a very stable tool."
"I rate Trivy a nine out of ten."
"Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images."
"One of the great features of Trivy is that it helps me scan items such as AWS credentials and GCP service accounts."
"It's customizable, allowing me to add any rules and format HTML templates as I wish."
"I can see vulnerabilities in the images of any applications deployed in the Kubernetes environment or as container applications."
"I appreciate Trivy for being open-source and not requiring any payment."
"Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images."
"Trivy is particularly useful for checking if Docker images have critical vulnerabilities before they reach production."
 

Cons

"I would like additional integrations."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"With Cloud Native Security, we can't selectively enable or disable alerts based on our specific use case."
"The categorization of the results from the vulnerability assessment could be improved."
"They could generally give us better comprehensive rules."
"SentinelOne Singularity Cloud Security is an excellent CSPM tool, but its CWPP features need improvement, and there is scope for more application security posture management features."
"SentinelOne currently lacks a break glass account feature, which is critical for implementing Single Sign-On."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"Sometimes, it fails to provide specific metrics."
"AKS could enhance its functionality by introducing a blueprint feature that streamlines and expedites the process. With a blueprint, users can leverage pre-defined configurations, including some common survey elements, reducing the need for extensive customization and allowing us to focus on our core business activities. Additionally, if the blueprint covers security aspects, it would be greatly beneficial, as it eliminates the need for us to build security expertise from scratch. Currently, we encounter challenges during cloud onboarding, security implementation, and adapting to Kubernetes. Although Microsoft may not consider these as their direct responsibility, providing a blueprint similar to what they offer to developers would be highly advantageous."
"One area that could be improved is the Azure CLI. It would be beneficial if they could abstract some of the complexities related to deployment scripts and make them a part of Azure CLI."
"More control over Infra scanning can be introduced."
"One improvement I'd like to see is a better user interface for developers, enabling easier operation without relying heavily on command lines."
"There is room for improvement in automation processes, as well."
"It would be nice if they could handle the management of personal information more efficiently."
"Azure Kubernetes Service (AKS) is not up to optimal standards when it comes to capturing logs and visualization."
"The reporting could be a little better. When integrating Trivy with CI, the interpretation of the reports could be improved."
"Currently, the container image scanning is static. A dynamic scanning capability during runtime would be a significant advantage."
"In our CI/CD pipelines, Trivy lacks built-in functionality for report analysis."
"The only problem is that Trivy does not support reporting features such as generating reports in CSV, which is useful for auditing and reporting."
"For malware detection, I need to use two tools: Trivy as my anomaly scanner and ClamAV. I am integrating these two tools into the CI pipeline. If both malware and anomaly detection could be managed by one tool, I would not need to depend on two tools. That would be my suggestion."
"One drawback I have observed with Trivy is the difficulty in building or integrating a UI, particularly for an operator in the NetSuite example."
"A dynamic scanning capability during runtime would be a significant advantage."
"For malware detection, I need to use two tools: Trivy as my anomaly scanner and ClamAV. I am integrating these two tools into the CI pipeline. If both malware and anomaly detection could be managed by one tool, I would not need to depend on two tools."
 

Pricing and Cost Advice

"Their pricing appears to be based simply on the number of accounts we have, which is common for cloud-based products."
"While SentinelOne Singularity Cloud Security offers robust protection, its high cost may be prohibitive for small and medium-sized businesses."
"PingSafe falls within the typical price range for cloud security platforms."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"PingSafe is priced reasonably for our workload."
"I would rate the cost a seven out of ten with ten being the most costly."
"The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity."
"It is an expensive solution."
"We are facing a significant challenge regarding OEM licensing. The issue arises from the fact that certain licenses required for our own purposes are not provided by Microsoft's licensing. Consequently, we are unsure about the most suitable mobile license provisioning model offered by third-party providers."
"The product follows a pay-as-you-go pricing model which is good for small enterprises. You need to pay only for the services that you use."
"The solution does not cost much."
"The product is expensive in terms of scalability."
"Azure Kubernetes Service (AKS) is an expensive solution"
"Azure Kubernetes Service offers a pay-as-you-go licensing model."
"It is not expensive."
Information not available
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Financial Services Firm
26%
Computer Software Company
12%
Manufacturing Company
8%
Government
6%
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
The documentation could be better. Besides improving the documentation, obtaining a professional or partner specializ...
What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
One improvement I'd like to see is a better user interface for developers, enabling easier operation without relying ...
What is your primary use case for Azure Kubernetes Service (AKS)?
My primary use case is building and deploying solutions using multiple Azure services. I combine these services to bu...
What needs improvement with Trivy?
One drawback I have observed with Trivy is the difficulty in building or integrating a UI, particularly for an operat...
What is your primary use case for Trivy?
The main use case for Trivy is to scan Docker images or packages for CVEs, specifically for vulnerabilities. I use th...
What advice do you have for others considering Trivy?
I rate Trivy an eight out of ten. This rating reflects its open-source nature, comprehensive scanning capabilities, a...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Trivy and other solutions. Updated: March 2025.
846,617 professionals have used our research since 2012.