Try our new research platform with insights from 80,000+ expert users

Red Hat Advanced Cluster Security for Kubernetes vs Trend Micro Deep Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.6
Reviews Sentiment
8.1
Number of Reviews
92
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Red Hat Advanced Cluster Se...
Average Rating
8.2
Number of Reviews
12
Ranking in other categories
Container Security (18th)
Trend Micro Deep Security
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
88
Ranking in other categories
Virtualization Security (1st), Cloud and Data Center Security (7th)
 

Mindshare comparison

Container Security
Virtualization Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Aug 29, 2024
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Siraj Hasan - PeerSpot reviewer
Nov 2, 2023
They have lots of events for their users like seminars, courses, and workshops
Red Hat can be utilized for anything, including OpenShift, Kubernetes, dev environments, automation, banking, and many IT industries I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security. I have used Red Hat since…
Venugopal Potumudi - PeerSpot reviewer
Nov 7, 2022
Easy to implement, good integrations, and helpful technical support services
It is mainly an antivirus product for both desktops as well as servers. It has additional modules which can be enabled in fast manner. It uses the same agent and additional modules like FIM, Filing Integrity Management and ELP services.  The product is easy to implement and easy to integrate with…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"Cloud Native Security offers a valuable tool called an offensive search engine."
"It is advantageous in terms of time-saving and cost reduction."
"The management console is highly intuitive to comprehend and operate."
"The most valuable features are automated threat response, AI detection, and static and dynamic detection."
"The user interface is well-designed and easy to navigate."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"Offers easy management with authentication and authorization features"
"Scalability-wise, I rate the solution a nine out of ten."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"I am impressed with the tool's visibility."
"The most valuable feature is the ability to share resources."
"Segmentation is the most powerful feature."
"The most valuable feature is the virtual patching."
"There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice."
"It is a scalable solution. If required, we can scale it more. That's not an issue...The solution's initial setup process was straightforward."
"DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good."
"You can scale the solution to different versions."
"The solution's endpoint protection is the most valuable feature."
"Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
"The vulnerability scanning reduces false positives by quite a bit."
 

Cons

"After closing an alert in Cloud Native Security, it still shows as unresolved."
"When we request any changes, they must be reflected in the next update."
"Scanning capabilities should be added for the dark web."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"While it is good, I think the solution's console could be improved."
"Their search feature could be better."
"The solution's price could be better."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The solution's visibility and vulnerability prevention should be improved."
"I would like to see XDR features and endpoint sensor become available."
"It should have XDR and EDR integration. It would be nice if they can tie it up with an XDR or EDR."
"We are not very happy with Trend Micro Deep Security since it is not able to detect many viruses and bugs."
"Trend Micro can interact with their consultant to ensure that we receive constant training to understand their platform and how to improve it."
"In the solution, servers often go offline for various reasons, requiring us to manually check the cause or issue, such as connectivity issues, and to find out why the agent went offline."
"We'd like to have more application control."
"The licensing structure could improve."
"Their automation needs improvement."
 

Pricing and Cost Advice

"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"PingSafe is not very expensive compared to Prisma Cloud, but it's also not that cheap. However, because of its features, it makes sense to us as a company. It's fairly priced."
"PingSafe's primary advantage is its ability to consolidate multiple tools into a single user interface, but, beyond this convenience, it may not offer significant additional benefits to justify its price."
"Their pricing appears to be based simply on the number of accounts we have, which is common for cloud-based products."
"I am not involved in the pricing, but it is cost-effective."
"It was reasonable pricing for me."
"PingSafe is fairly priced."
"PingSafe falls within the typical price range for cloud security platforms."
"We purchase a yearly basis license for the solution."
"The pricing model is moderate, meaning it is not very expensive."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"It's a costly solution"
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"It is a very expensive solution. It would be nice if they lower its price. Its license is based on the machines."
"The training needs improvement. It is expensive (classroom training), and it is often hard to find answers by yourself using the documentation."
"The cost is approximately six thousand Qatari Riyal ($1650 USD) per user."
"The cost runs around forty dollars per server a month."
"It is expensive but reasonable compared to other products by Trend Micro."
"Trend Micro Deep Security is quite expensive."
"Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there."
"CrowdStrike had an advantage over Trend Micro when it came to pricing. Trend Micro had several modules, so it was a little priced up, but CrowdStrike was not. However, even CrowdStrike has increased their price now, so probably both of them are on par, but the number of modules that Trend Micro has is far more than CrowdStrike. It comes with file integrity monitoring, application control, and web reputation. It has outbound URL protection, and it also has ransomware protection for servers, whereas CrowdStrike Falcon is a straightforward solution."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
814,763 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
16%
Manufacturing Company
10%
Insurance Company
5%
Financial Services Firm
24%
Computer Software Company
14%
Government
9%
Manufacturing Company
8%
Educational Organization
38%
Computer Software Company
11%
Financial Services Firm
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I am personally not taking care of the pricing part, but when we moved from CrowdStrike to Singularity Cloud Native S...
What needs improvement with PingSafe?
They can provide some kind of alert when a new type of risk is there. There can be a specific type of alert showing t...
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the b...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for th...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling,...
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is t...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and container...
 

Also Known As

PingSafe
StackRox
Deep Security
 

Learn More

Video not available
 

Overview

 

Sample Customers

Information Not Available
City National Bank, U.S. Department of Homeland Security
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Palo Alto Networks, Wiz, SentinelOne and others in Container Security. Updated: October 2024.
814,763 professionals have used our research since 2012.