Red Hat Advanced Cluster Security for Kubernetes empowers organizations with robust capabilities in container security, vulnerability management, and workload transition, seamlessly integrated with OpenShift for optimal orchestration.

| Product | Mindshare (%) |
|---|---|
| Red Hat Advanced Cluster Security for Kubernetes | 1.7% |
| Wiz | 9.7% |
| Prisma Cloud by Palo Alto Networks | 8.0% |
| Other | 80.6% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Container Security | May 9, 2026 | Download |
| Product | Reviews, tips, and advice from real users | May 9, 2026 | Download |
| Comparison | Red Hat Advanced Cluster Security for Kubernetes vs Wiz | May 9, 2026 | Download |
| Comparison | Red Hat Advanced Cluster Security for Kubernetes vs Prisma Cloud by Palo Alto Networks | May 9, 2026 | Download |
| Comparison | Red Hat Advanced Cluster Security for Kubernetes vs SentinelOne Singularity Cloud Security | May 9, 2026 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| Wiz | 4.4 | 9.7% | 97% | 42 interviewsAdd to research |
| SentinelOne Singularity Cloud Security | 4.4 | 4.6% | 99% | 124 interviewsAdd to research |
The most valuable features of Red Hat Advanced Cluster Security for Kubernetes, include command administration, high visibility, and networking information. Users like the solution's cluster communication, group names flexibility, and web UI (Cockpit). Other noteworthy features are API integration, access control, segmentation, and resource sharing.
Users of Red Hat Advanced Cluster Security for Kubernetes say the deprecation of APIs creates issues during upgrades, making it difficult for platform maintenance personnel to identify and implement necessary changes for customer applications. Reviewers said they would like to see zero-trust access control features and improved database connectivity. The documentation for Red Hat Advanced Cluster Security is also limited, posing challenges for new users.
Red Hat Advanced Cluster Security for Kubernetes provides significant value. Users praised the product for its ability to enhance security measures and effectively protect their Kubernetes clusters. Many users also mentioned that the solution helped them save time and resources by effectively managing security risks.
The price of Red Hat Advanced Cluster Security for Kubernetes is considered average. It can be purchased separately or bundled with other Red Hat solutions like OpenShift. The bundle, including five products, is more affordable.
Red Hat Advanced Cluster Security for Kubernetes is integrated with OpenShift to automate deployment, monitoring, and ticket creation for cloud containers or clusters. It can be used to migrate workloads from monolithic applications to containers and address security issues in Openshift Kubernetes clusters. The solution is commonly used for segmentation and monitoring container behavior to detect abnormal activity.
Customers are mostly happy with Red Hat's customer service and support.
Some users said the setup process for Red Hat Advanced Cluster Security is not overly difficult or complex, but it requires some time and effort. The basic installation can be completed within an hour, but the overall deployment process may take a few weeks. The setup involves creating multiple customer resource files and specifying various configurations and images for deployment.
Red Hat Advanced Cluster Security for Kubernetes is highly scalable and suitable for small or large companies. Its straightforward access control enables easy integration and allows the solution to accommodate as many users as needed.
Red Hat Advanced Cluster Security for Kubernetes is highly praised for its stability. Users consistently mention that the product is stable, accurate, and without any lagging or latency issues.
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 81 |
| Midsize Enterprise | 61 |
| Large Enterprise | 233 |
Red Hat Advanced Cluster Security for Kubernetes stands out with its comprehensive features like authentication, authorization, and API integration. Users appreciate resource sharing, segmentation, and virtualization capabilities, all facilitated by a user-friendly Cockpit web interface and command administration. The system's strengths are visible through effective security protocols, such as secure UPI images, container networking, and built-in security features. Its advanced cluster management and monitoring ensure efficiency, while focus on vulnerability and configuration management addresses key concerns. However, improvements in documentation, web UI, and API flexibility are needed, with challenges in command line configuration and deployment also noted. Stability issues due to API deprecation and the need for enhanced zero trust, access control, and database connectivity present room for growth.
What are the key features of Red Hat Advanced Cluster Security for Kubernetes?Red Hat Advanced Cluster Security for Kubernetes is implemented across various industries to facilitate the transition from traditional monolithic applications to dynamic containerized environments. Organizations in sectors such as finance, healthcare, and technology benefit from its robust segmentation, monitoring abilities, and behavior analysis. With the integration of Istio and GRPC, industries achieve secure microservices communication and improved visibility for comprehensive threat monitoring.
Red Hat Advanced Cluster Security for Kubernetes was previously known as StackRox .
City National Bank, U.S. Department of Homeland Security
| Author info | Rating | Review Summary |
|---|---|---|
| Software Engineer at Galley | 3.5 | We use Red Hat Advanced Cluster Security for Kubernetes for container security in our company. It offers secure management and authentication features. Despite no visible cost reductions, its container connections and UPI images remain highly secure and manageable. |
| Cybersecurity Architect/System Security Engineer at General Dynamics Mission Systems–Canada | 3.5 | I use Red Hat Advanced Cluster Security for Kubernetes to monitor and scan containers. It effectively maps network communications. However, its setup process requires improvement, demanding knowledgeable users. Compared to open-source tools, Red Hat offers polished dashboards and user-friendly design. |
| Principal Infrastructure Engineer at a logistics company with 10,001+ employees | 4.5 | I find the command administration feature of Red Hat Advanced Cluster Security for Kubernetes valuable. However, the frequent API deprecations present challenges during upgrades, and the solution could benefit from improved stability to ease platform maintenance. |
| CyberSecurity Manager at a non-tech company with 11-50 employees | 4.0 | I use Red Hat Advanced Cluster Security for Kubernetes for vulnerability and configuration management. While the security features are beneficial, I would like improved policy creation and features similar to Palo Alto Prisma, particularly in IAST areas. |
| Security Administrator | 4.0 | I integrated Red Hat Advanced Cluster Security APIs using Python for automation. The intuitive web UI and secure, well-configured APIs are standout features. However, documentation is limited, and API flexibility surpasses the web UI for certain tasks. |
| Cloud Platform Engineer at a tech services company with 11-50 employees | 4.5 | I use Red Hat Advanced Cluster Security for Kubernetes to enhance monitoring and protect applications during CI/CD pipeline deployment by identifying vulnerabilities and misconfigurations. While it offers a good ROI, I believe its visibility and vulnerability prevention could be improved. |
| Enterprise Archiect/ IBM & Redhat Business Development at Cancom | 4.5 | I find Red Hat Advanced Cluster Security for Kubernetes valuable for its virtualization tools and security features integrated with OpenShift. I've considered other container security solutions, but some clients prefer using a Palo Alto firewall for security instead. |
| Owner/Full Stack Software Engineer at Maraphonic, Inc. | 4.5 | I rate this solution 9/10. Resource sharing is most valuable, though initial setup has many steps. I believe it's improving towards an easier developer experience, similar to Cloud Foundry, which is a positive direction. |