We performed a comparison between Azure Kubernetes Service (AKS) and Wiz based on real PeerSpot user reviews.
Find out in this report how the two Container Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The UI is very good."
"The cloud misconfiguration is the most valuable feature."
"Cloud Native Security offers a valuable tool called an offensive search engine."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"PingSafe offers an intuitive user interface that lets us navigate quickly and easily."
"It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"We like how easy it is to create the resources in this solution, thanks to how easy the UI is to use."
"Azure Kubernetes Service is pretty robust in terms of scalability and auto-scaling fixes."
"Its support team resolves technical issues accurately."
"We find the container orchestration tool that this solution provides to be very valuable."
"The most valuable feature is the autoscaling and self-healing."
"The product has built-in functionality that checks whether the service is available or not. In case the service is down, the tool will create a new instance by default. Hence, the web API will be always up irrespective of the server or the situation."
"The most valuable features of AKS are the full array of capabilities and robust security."
"AKS is easy to use. We can scale up and down as needed with AKS, which saves us money on our cloud costs."
"I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we have and the applications installed on each. I like Wiz's security graph because you can use it to see the whole organization even if you have multiple accounts."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."
"The solution is very user-friendly."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The vulnerability management modules and the discovery and inventory are the most valuable features. Before using Wiz, it was a very manual process for both. After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud. We're able to correspond and understand what the vulnerability landscape looks like a lot faster."
"With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"The Automation tab is an add-on that doesn’t work properly. They provide a list of scripts that don’t work and I have asked support to assist but they won’t help. When running on various endpoints the script doesn’t work and if it does, it’s only a couple. There are a lot of useful scripts that would be beneficial to run forensics, event logs, and process lists running on the endpoint."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"I want PingSafe to integrate additional third-party resources. For example, PingSafe is compatible with Azure and AWS, but Azure AD isn't integrated with AWS. If PingSafe had that ability, it would enrich the data because how users interact with our AWS environment is crucial. All the identity-related features require improvement."
"Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
"The product’s cost could be reduced."
"There are some limitations with the tutor version, particularly in terms of using a lot of free audio. The private level also has restrictions, limiting the number of audio files you can access to just 50. If you want more, you need to contact support."
"We would like to see the addition of a service report from the server for this solution, so that we can monitor the health of server operations."
"AKS has the potential to enhance pricing by enabling us to explore ways to increase cost transparency. However, it's important to note that this refers to computation costs rather than client costs. Our objective is to optimize efficiency and minimize unnecessary expenses. Therefore, we aim to identify which services within the platform can benefit from improved consumption patterns. This is the focus of our ongoing research, with the goal of maximizing computational power within the cluster. We aim to avoid situations where resources are reserved but not utilized effectively. Additionally, our strong emphasis on security ensures that we adhere to all relevant compliance standards, bolstering our overall trustworthiness."
"The solution should improve its UI and cost."
"One area that could be improved is the Azure CLI. It would be beneficial if they could abstract some of the complexities related to deployment scripts and make them a part of Azure CLI."
"This is a fairly expensive solution, which can make it prohibitive for smaller organizations."
"The engineering team can reduce the management of the platform itself by improving the data plane part of the system to upload more management."
"One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging."
"The solution's container security could be improved."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform."
"The only thing that needs to be improved is the number of scans per day."
"The remediation workflow within the Wiz could be improved."
"Wiz's reporting capabilities could be refined a bit. They are making headway on that, but more executive-style dashboards would be nice. They just implemented a community aspect where you can share documents and feedback. This was something users had been requesting for a while. They are listening to customer feedback and making changes."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Azure Kubernetes Service (AKS) Pricing and Cost Advice →
Azure Kubernetes Service (AKS) is ranked 13th in Container Security with 32 reviews while Wiz is ranked 2nd in Container Security with 12 reviews. Azure Kubernetes Service (AKS) is rated 8.2, while Wiz is rated 9.2. The top reviewer of Azure Kubernetes Service (AKS) writes "Decreases administrative burdens and costs, has good diagnostic tools, and is easy to deploy". On the other hand, the top reviewer of Wiz writes "Multiple features help us prioritize remediation, and agentless implementation reduces overhead". Azure Kubernetes Service (AKS) is most compared with Red Hat OpenShift, CrowdStrike Falcon Cloud Security, SUSE Rancher and Qualys VMDR, whereas Wiz is most compared with Prisma Cloud by Palo Alto Networks, Orca Security, Microsoft Defender for Cloud, AWS Security Hub and Lacework. See our Azure Kubernetes Service (AKS) vs. Wiz report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.