Try our new research platform with insights from 80,000+ expert users

Aqua Cloud Security Platform vs Qualys TotalCloud comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
3rd
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
118
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Cloud Security Posture Management (CSPM) (3rd), Compliance Management (2nd), AI Software Development (1st), AI Observability (2nd)
Aqua Cloud Security Platform
Ranking in Container Security
25th
Ranking in Cloud Workload Protection Platforms (CWPP)
21st
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
19th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
16
Ranking in other categories
Cloud and Data Center Security (19th), Software Supply Chain Security (17th), DevSecOps (13th)
Qualys TotalCloud
Ranking in Container Security
13th
Ranking in Cloud Workload Protection Platforms (CWPP)
9th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
8th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
36
Ranking in other categories
Vulnerability Management (13th), Cloud Security Posture Management (CSPM) (9th), SaaS Security Posture Management (SSPM) (2nd)
 

Mindshare comparison

As of February 2026, in the Cloud-Native Application Protection Platforms (CNAPP) category, the mindshare of SentinelOne Singularity Cloud Security is 5.7%, up from 3.0% compared to the previous year. The mindshare of Aqua Cloud Security Platform is 3.3%, down from 4.7% compared to the previous year. The mindshare of Qualys TotalCloud is 1.6%, up from 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud-Native Application Protection Platforms (CNAPP) Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security5.7%
Qualys TotalCloud1.6%
Aqua Cloud Security Platform3.3%
Other89.4%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
Burak AKCAGUN - PeerSpot reviewer
Business Development Manager at Axoft Ukraine
A robust and cost-effective solution, excelling in scalability, on-premises support, and responsive technical support, making it well-suited for enterprises navigating stringent regulatory environment
The most crucial aspect is runtime protection, specifically image scanning before preproduction and deployment. Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment. This feature ensures that customers can identify any potential issues with the image, such as misconfigurations or vulnerabilities, before integrating it into their workloads and infrastructure. In their source pipeline, companies can identify issues before deploying changes. This is crucial because customers prefer resolving any problems or misconfigurations before the deployment process. Software change security, including GSPM Cloud, is a key feature customers seek in their infrastructure.
AN
Cyber Security Specialist at UBS Financial
A centralized tool for vulnerability and misconfiguration management in a multiple cloud environment
Qualys TotalCloud provides written explanations to help guide the remediation paths and eliminate cyber risk. We are using TruRisk for the remediations. The TruRisk shows anything critical, and we can then focus on that. We also assess manually whether an asset is a critical target or not. Qualys TotalCloud provides a single, prioritized view of risk. We are using CIS-CAT standards to harden our clouds, such as AWS, Google Cloud, and Azure. We are able to analyze the scans and identify which policies have failed and how we can remediate them. We can customize policies as per our organization's requirements. That is very helpful for us. With the TruRisk Insights feature, security has significantly improved. In six months of using it, we see that everything is under control. We've solved many problems related to asset management, cloud configuration, and the new asset identification. If an application team has onboarded any cloud asset, we can see that. We have that information now.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We use the infrastructure as code scanning, which is good."
"I would definitely recommend SentinelOne Singularity Cloud Security for infrastructure security."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"SentinelOne Singularity Cloud Security is excellent, and I highly recommend it."
"The UI is responsive and user-friendly."
"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"The solution was very user-friendly."
"The container security element of this product has been very valuable to our organization."
"Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment."
"Valuable features include the ability to connect it to our Docker Hub where our images are stored, good integration with Slack, and the connection to the CV, to easily see which CVs are on each image."
"The most valuable feature is the security."
"The CSPM product is great at securing our cloud accounts and I really like the runtime protection for containers and functions too."
"Their sandboxing service is also really good."
"Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out, the amount of risk that we were introducing to the platform, and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access."
"I appreciate Qualys TotalCloud's ability to onboard any type of device with ease, including containers."
"I found the initial setup user-friendly."
"We were able to realize its benefits within 24 to 48 hours."
"Its excellent graphical interface makes the scanning process simple."
"Once you have your vulnerabilities fixed and your patches pushed out using Qualys TotalCloud, then you are able to eliminate threats and cyber risk."
"One of the features I appreciate is the ability to generate daily reports without relying on anyone else."
"The most valuable feature of Qualys TotalCloud is the visibility it provides."
"The best part I like is the on-demand scans."
 

Cons

"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"I would like SentinelOne Singularity Cloud Security's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"Crafting customized policies can be tricky."
"Once all components, including the cloud piece and container runtime piece, integrate further and incorporate an AI layer for better comprehension, it will greatly enhance the utility of Singularity Cloud Security."
"The categorization of the results from the vulnerability assessment could be improved."
"SentinelOne Singularity Cloud Security is an excellent CSPM tool, but its CWPP features need improvement, and there is scope for more application security posture management features."
"While SentinelOne Singularity Cloud Security offers real-time response, there is room for improvement in alert accuracy."
"The integrations on CICD could be improved. If Aqua had more plugins or container images to integrate and automate more easily on CICD, it would be better."
"The solution could improve user-friendliness."
"Since we are working from home, we would like to have the proper training for Aqua."
"We would like to see an improvement in the overview visibility that this solution offers."
"It's a bit hard to use the user roles. That was a bit confusing."
"In the next release, Aqua Security should add the ability to automatically send reports to customers."
"They want to release improvements to their product to work with other servers because now there are more focused on the Kubernetes environment. They need to improve the normal servers. I would like to have more options."
"Aqua Security could improve the forwarding of logging into Splunk and into other tools, it should be easier."
"The support is not up to the mark and seems to be overburdened."
"There should be improvement from a dashboard perspective when collecting and showcasing data to lead management."
"TotalCloud could improve its scanning of niche devices like Wi-Fi dongles and USB modems because they are often untested."
"In a future release, I suggest that zero-day vulnerabilities should be predicted in advance using AI technologies. The system is not 100% secure yet, so proactive threat hunting could be enhanced to be more proactive than the current system."
"It is already perfect, but they can bring some newer dashboards and customization options for the dashboard. It would be great to be able to include on-prem assets on the dashboard."
"I think Qualys TotalCloud needs to improve its handling of zero-day vulnerabilities and supply chain management because modern ransomware attacks not only target prime critical infrastructures but also the supply chain system."
"The system is not 100% secure yet, so proactive threat hunting could be enhanced to be more proactive than the current system."
"TotalCloud could improve the classification of vulnerabilities. Specifically, it could enhance the categorization of what aspects fall under patches resolved by OS or software updates and what pertains to configuration adjustments."
 

Pricing and Cost Advice

"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"It's a fair price for what you get. We are happy with the price as it stands."
"PingSafe is less expensive than other options."
"SentinelOne provided competitive pricing compared to other vendors, and we are satisfied with the deal."
"It was reasonable pricing for me."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"I am personally not taking care of the pricing part, but when we moved from CrowdStrike to PingSafe, there were some savings. The price of CrowdStrike was quite high. Compared to that, the price of PingSafe was low. PingSafe is charging based on the subscription model. If I want to add an AWS subscription, I need to pay more. It should not be based on subscription. It should be based on the number of servers that I am scanning."
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"Dealing with licensing costs isn't my responsibility, but I know that the licenses don't depend on the number of users, but instead are priced according to your workload."
"It comes at a reasonable cost."
"The pricing of this solution could be improved."
"Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle."
"They were reasonable with their pricing. They were pretty down-to-earth about the way they pitched their product and the way they tried to close the deal. They were one of the rare companies that approached the whole valuation in a way that made sense for our company, for our needs, and for their own requirements as well... They will accommodate your needs if they are able to understand them and they're stated clearly."
"The pricing is comparable. It is built into our other product, so I cannot piecemeal it. It is a part of our subscription."
"Qualys TotalCloud is cost-efficient and was selected for its value compared to other products."
"The cost is high, but it meets our organizational needs."
"It isn't cheap, but it's reasonable. It helps us to manage things with very few resources."
"Qualys TotalCloud offers good pricing that is affordable and competitive with the market. Our partnership also provides us with additional benefits."
"Qualys TotalCloud is expensive, but it offers a premier solution with no headaches."
"While Qualys TotalCloud's pricing is currently acceptable, it is becoming increasingly expensive and may soon be considered overpriced."
"As a middle management member, I do not have direct pricing knowledge, but based on the knowledge from our meetings, its pricing is competitive."
report
Use our free recommendation engine to learn which Cloud-Native Application Protection Platforms (CNAPP) solutions are best for your needs.
881,707 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
Financial Services Firm
23%
Computer Software Company
10%
Manufacturing Company
10%
Government
9%
Financial Services Firm
16%
Manufacturing Company
11%
Computer Software Company
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise22
Large Enterprise54
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise1
Large Enterprise10
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise25
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
Regarding the downsides of cloud security, I do not have much negative to discuss about cloud security, because it is...
What do you think of Aqua Security vs Prisma Cloud?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valu...
What is your experience regarding pricing and costs for Qualys TotalCloud?
Pricing compared to competitor tools is high. My costs depend on asset subscriptions. Pricing remains constant regard...
What needs improvement with Qualys TotalCloud?
From a downside perspective, the UI is not user-friendly and feels dated compared to other tools like Prisma Cloud. T...
What is your primary use case for Qualys TotalCloud?
I use Qualys TotalCloud for cloud security posture management across AWS and Google Cloud. I use this tool for compli...
 

Also Known As

PingSafe
Aqua Security Platform, CloudSploit, Argon
Qualys TotalCloud with FlexScan
 

Overview

 

Sample Customers

Information Not Available
HPE Salesforce Telstra Ellie Mae Cathay Pacific HomeAway
Information Not Available
Find out what your peers are saying about Aqua Cloud Security Platform vs. Qualys TotalCloud and other solutions. Updated: December 2025.
881,707 professionals have used our research since 2012.