Try our new research platform with insights from 80,000+ expert users

Aqua Cloud Security Platform vs Trellix Cloud Workload Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
118
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Observability (2nd)
Aqua Cloud Security Platform
Ranking in Cloud Workload Protection Platforms (CWPP)
21st
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
16
Ranking in other categories
Cloud and Data Center Security (19th), Container Security (26th), Cloud-Native Application Protection Platforms (CNAPP) (19th), Software Supply Chain Security (17th), DevSecOps (13th)
Trellix Cloud Workload Secu...
Ranking in Cloud Workload Protection Platforms (CWPP)
25th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Cloud Workload Protection Platforms (CWPP) category, the mindshare of SentinelOne Singularity Cloud Security is 4.4%, up from 2.4% compared to the previous year. The mindshare of Aqua Cloud Security Platform is 2.1%, down from 3.3% compared to the previous year. The mindshare of Trellix Cloud Workload Security is 0.5%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Workload Protection Platforms (CWPP) Mindshare Distribution
ProductMindshare (%)
SentinelOne Singularity Cloud Security4.4%
Aqua Cloud Security Platform2.1%
Trellix Cloud Workload Security0.5%
Other93.0%
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
Burak AKCAGUN - PeerSpot reviewer
Business Development Manager at Axoft Ukraine
A robust and cost-effective solution, excelling in scalability, on-premises support, and responsive technical support, making it well-suited for enterprises navigating stringent regulatory environment
The most crucial aspect is runtime protection, specifically image scanning before preproduction and deployment. Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment. This feature ensures that customers can identify any potential issues with the image, such as misconfigurations or vulnerabilities, before integrating it into their workloads and infrastructure. In their source pipeline, companies can identify issues before deploying changes. This is crucial because customers prefer resolving any problems or misconfigurations before the deployment process. Software change security, including GSPM Cloud, is a key feature customers seek in their infrastructure.
Madan Mohan - PeerSpot reviewer
Director Operations at SOFTPRO PLUS
Easy policy designing and highly scalable solution
The customers really want protection against unauthorized applications running on their servers. They should avoid installing any unknown source and use Trellix Cloud Workload Security for the best solution in workload security. It includes DNS with ransomware protection. With this, they can have complete protection for their servers. Additionally, any solution working with the database should implement change control. So, if any changes are made on the database side, they should be resolved and verified to ensure they are not made by any unknown source. This is the best solution we suggest to customers who want granular control to protect their servers. It's easy to deploy with a single agent. Overall, I would rate the solution a nine out of ten because policy designing is very easy too. And the manageability is very easy. You can easily manage it through EPO and deploy policies within five to ten minutes. No issues with that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"SentinelOne Singularity Cloud Security offers comprehensive security posture management."
"The UI and the widgets are what I personally appreciate. I find it easy to use."
"SentinelOne stands out with its responsiveness to feature requests for Singularity Cloud Security."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"Overall, I would rate it a ten on ten for cloud security."
"Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"Aqua Security helps us to check the vulnerability of image assurance and check for malware."
"Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out, the amount of risk that we were introducing to the platform, and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access."
"The most valuable features are that it's easy to use and manage."
"The CSPM product is great at securing our cloud accounts and I really like the runtime protection for containers and functions too."
"The most valuable feature of Aqua Security is the scanner."
"Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment."
"The solution was very user-friendly."
"The DTA, which stands for Dynamic Threat Analysis, allows me to analyze Docker images in a sandbox environment before deployment, helping me anticipate risks."
"The most valuable feature is the application control."
"The discovery feature is the most valuable. After you integrate your cloud environment, maybe an Azure or AWS, or a private environment hosted on VMware, it automatically starts discovering the number of servers that are running on that cloud and the number of services that you have done. It is a beautiful feature because, from a security standpoint, it is difficult to identify which VM is compliant or not when you keep on provisioning a number of VMs in the cloud. It also checks for compliance. It checks whether a system is compliant and whether antivirus is installed on a VM. If an antivirus is installed, it checks whether the antivirus is updated to the latest signature package or not. All these things are beautifully done by McAfee Cloud Workload Security. For communicating with the McAfee server, you need to install an agent on the VM. McAfee Cloud Workload Security gives you a direct opportunity to install an agent on a Windows machine. If you have a Windows cloud, you can directly push that agent onto the VM through your McAfee portal. It provides you a single dashboard view of all servers present in the cloud. It shows the servers on which the antivirus is already installed as well as the servers for which the antivirus installation is still pending. This dashboard view is a much-needed thing. It also has a centralized management, which makes it easy to use."
 

Cons

"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"There is room for improvement in application security posture management features, and SentinelOne Singularity Cloud Security is on the costlier side."
"In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of critical severity, whereas they are not critical or of high severity. There is a mismatch of severities."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"We had a glitch in SentinelOne Singularity Cloud Security where it fed us false positives in the past."
"There is scope for more application security posture management features. Additionally, the runtime protection needs attention."
"We are experiencing problems with Cloud Native Security reporting."
"I would like to see the map feature improve. It's good, but it isn't fully developed. It lets us use custom resources and policies but does not allow us to perform some actions. I would also like more custom integration and runtime security for Kubernetes."
"The user interface could be improved, especially in terms of organization and clarity."
"In the next release, Aqua Security should add the ability to automatically send reports to customers."
"Since we are working from home, we would like to have the proper training for Aqua."
"They want to release improvements to their product to work with other servers because now there are more focused on the Kubernetes environment. They need to improve the normal servers. I would like to have more options."
"Aqua Security lacks a lot in reporting."
"I would like Aqua Security to look into is the development of a web security portal."
"There's room for improvement, particularly in management capabilities as it may not be comprehensive enough for all customers, and it has been lacking in the realm of cloud security posture management."
"The integrations on CICD could be improved. If Aqua had more plugins or container images to integrate and automate more easily on CICD, it would be better."
"There is room for improvement in the pricing model."
"Its vulnerability assessment is not the best. We cannot identify the vulnerabilities that are related to the operating system by using McAfee Cloud Workload Security. I wish McAfee would add a vulnerability assessment tool that will not only identify the vulnerability but will also be able to generate a report so that the required patching can be done for the servers. Currently, McAfee Cloud Workload Security only integrates with AWS and Azure. If it can also integrate with GCP, Alibaba, and other cloud services available in the market, it would be good because not all people are using Azure and AWS."
 

Pricing and Cost Advice

"The features included in PingSafe justify its price point."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"It is a little expensive. I would rate it a four out of ten for pricing."
"SentinelOne Singularity Cloud Security is on the costlier side."
"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"As a partner, we receive a discount on the licenses."
"SentinelOne offers excellent pricing and licensing options."
"Pricing is based on modules, which was ideal for us."
"It comes at a reasonable cost."
"Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle."
"They were reasonable with their pricing. They were pretty down-to-earth about the way they pitched their product and the way they tried to close the deal. They were one of the rare companies that approached the whole valuation in a way that made sense for our company, for our needs, and for their own requirements as well... They will accommodate your needs if they are able to understand them and they're stated clearly."
"The pricing of this solution could be improved."
"Dealing with licensing costs isn't my responsibility, but I know that the licenses don't depend on the number of users, but instead are priced according to your workload."
"It is not an expensive product. I am in the Indian market, and it is one of the most reliable and cost-effective solutions."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
Financial Services Firm
22%
Computer Software Company
10%
Manufacturing Company
9%
Government
9%
Comms Service Provider
20%
Government
12%
Computer Software Company
8%
Outsourcing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business49
Midsize Enterprise22
Large Enterprise55
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise1
Large Enterprise10
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
I do not see room for improvement in SentinelOne Singularity Cloud Security. In the future, I would like to see the i...
What do you think of Aqua Security vs Prisma Cloud?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valu...
Ask a question
Earn 20 points
 

Also Known As

PingSafe
Aqua Security Platform, CloudSploit, Argon
McAfee Cloud Workload Security
 

Overview

 

Sample Customers

Information Not Available
HPE Salesforce Telstra Ellie Mae Cathay Pacific HomeAway
Information Not Available
Find out what your peers are saying about Aqua Cloud Security Platform vs. Trellix Cloud Workload Security and other solutions. Updated: March 2026.
884,873 professionals have used our research since 2012.