Legit Security and Apiiro are competitive offerings in the cybersecurity domain. Legit Security excels in pricing and support, while Apiiro is superior due to its robust feature set.
Features: Legit Security offers comprehensive vulnerability management, strong integration capabilities, and responsive support. Apiiro provides extensive risk assessment, adaptable policy management, and advanced automation.
Ease of Deployment and Customer Service: Legit Security ensures straightforward integration with existing platforms and maintains a responsive support team. Apiiro, despite a complex deployment process, offers robust documentation and proactive customer service.
Pricing and ROI: Legit Security is recognized for its competitive setup costs, leading to a rapid ROI with a cost-efficient model. Apiiro, requiring a higher initial investment, provides long-term value with advanced features and scalability.
| Product | Mindshare (%) |
|---|---|
| Cortex Cloud by Palo Alto Networks | 2.0% |
| Apiiro | 4.5% |
| Legit Security | 4.0% |
| Other | 89.5% |


| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
Cortex Cloud by Palo Alto Networks enhances cloud security with features like AI/ML threat detection and automated remediation, ensuring real-time protection and efficient management across cloud environments.
Cortex Cloud by Palo Alto Networks offers comprehensive cloud security posture management and runtime protection. It reduces manual tasks and accelerates incident investigation through advanced threat detection and AI-driven anomaly detection. With integration to the MITRE ATT&CK framework, it boosts threat response while reducing incident resolution time. Although users find the UI complex and pricing high, its capabilities in securing AWS, Azure, and other environments, as well as its potential integration with CyberArk, emphasize its enterprise-ready design for cloud transformation across diverse industry sectors.
What are the key features of Cortex Cloud by Palo Alto Networks?Cortex Cloud by Palo Alto Networks is deployed across industries like telecom, BFSI, and manufacturing for robust cloud security. It's leveraged for detecting misconfigurations and vulnerabilities, aiding cloud transformation and compliance with standards such as GDPR and NIST. The integration across cloud infrastructures, including AWS and Azure, supports policy creation and threat management strategies for diverse enterprises.
Apiiro fosters seamless integration of security into the software development lifecycle, enhancing compliance and risk management through continuous code risk assessments.
Apiiro addresses security challenges by providing a robust platform that continuously monitors and assesses code risks. It integrates security directly into development processes to ensure compliance and reduce risk. By leveraging this approach, teams can manage risks proactively, safeguard applications, and enhance overall development efficiency.
What features make Apiiro valuable?In industries such as finance and healthcare, Apiiro's integration improves compliance and security standards due to heightened regulatory requirements. Its risk-focused approach empowers these industries to secure data and meet stringent security requirements effectively.
Legit Security offers comprehensive solutions for managing software security risks, ensuring efficient code integration, risk reduction, and policy adherence through centralized controls and robust integration with existing tools.
Legit Security provides organizations with a powerful platform for enhancing software security. It offers a unified control panel that highlights high-risk findings and enhances security posture with risk scoring. By facilitating seamless integration with existing tools, it promotes a security shift-left approach. Centralized management helps enforce policy adherence while secret management capabilities add another layer of security. Despite some false positives in secret detection, Legit collaborates with engineering teams to ensure secure code integration.
What are the key features of Legit Security?In industries dealing with sensitive data and complex code deliveries, Legit Security is implemented to manage the entire software development lifecycle. Organizations utilize it for compliance, integrating it with other scanning tools to bolster code supply chain security and application security management. In the wake of incidents like the SolarWinds breach, the importance of securing the software delivery pipeline has been underscored, positioning Legit Security as a crucial component in protecting against similar threats.
We monitor all Software Supply Chain Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.