Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Red Hat Advanced Cluster Security for Kubernetes comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
107
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Azure Kubernetes Service (AKS)
Ranking in Container Security
15th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
38
Ranking in other categories
No ranking in other categories
Red Hat Advanced Cluster Se...
Ranking in Container Security
21st
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.1%, up from 1.0% compared to the previous year. The mindshare of Azure Kubernetes Service (AKS) is 0.7%, down from 1.0% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.4%, down from 3.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Raymond De Rooij - PeerSpot reviewer
Scalability and flexibility but needs better support
We are using Azure Kubernetes Service as a customer. I cannot detail all the products and technologies we are using There isn't one specific feature of Azure Kubernetes Service that I can name as most valuable. It's part of a strategic solution yet I don't see an advantage compared to our…
Daniel Stevens - PeerSpot reviewer
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"Singularity Cloud Native Security provides us with a platform to scan instances when they are getting created, and the dashboard helps us to identify the critical issues."
"Its performance impact on the systems is low, which means there is a minimal impact on system performance compared to traditional antivirus solutions."
"Cloud Security has provided a single view to observe all workloads, prioritization for handling cloud assets, and reduced noise by distinguishing false positives effectively."
"We really appreciate the Slack integration. When we have an incident, we get an instant notification. We also use Joe Sandbox, which Singularity can integrate with, so we can verify if a threat is legitimate."
"The UI is very good."
"PingSafe provides email alerts and ranks issues based on severity, such as high, critical, etc., that help us prioritize issues."
"We find the container orchestration tool that this solution provides to be very valuable."
"I have enjoyed working with all the features."
"The most valuable features of AKS are the full array of capabilities and robust security."
"It employs high availability."
"The advantage of AKS is somewhat greater than that of Kubernetes, such as those provided by Google Cloud or AWS. However, the unique benefit offered by Microsoft is its robust CI/CD capabilities, along with the Azure feature for building workflows. When you combine the entire ecosystem, AKS becomes an excellent choice, particularly for enterprise applications."
"I don't have to furnish my own infrastructure in order to run containers or Kubernetes."
"We like how easy it is to create the resources in this solution, thanks to how easy the UI is to use."
"The platform's high scalability is one of its biggest advantages."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"Segmentation is the most powerful feature."
"Scalability-wise, I rate the solution a nine out of ten."
"I am impressed with the tool's visibility."
"The technical support is good."
"The most valuable feature of the solution is its monitoring feature."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"The most valuable feature is the ability to share resources."
 

Cons

"There's room for improvement in the graphic explorer."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"SentinelOne currently lacks a break glass account feature, which is critical for implementing Single Sign-On."
"To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal."
"One potential drawback is the cost of SentinelOne Singularity Cloud Security, which may be prohibitive for smaller businesses or startups, particularly those in regions with lower average incomes, such as India."
"PingSafe can improve by eliminating 100 percent of the false positives."
"A beneficial improvement for PingSafe would be integration with Jira, allowing for a more streamlined ticketing system."
"I would like to see Azure implement something like the K9 terminal for interacting with Kubernetes clusters. It's a user-friendly CLI interface."
"It would be nice if they could handle the management of personal information more efficiently."
"If any customer uses a traditional code, the code-level changes take a lot of time."
"We would like to see the addition of a service report from the server for this solution, so that we can monitor the health of server operations."
"The solution should improve its UI and cost."
"The initial setup is complex."
"Azure Kubernetes Service (AKS) is not up to optimal standards when it comes to capturing logs and visualization."
"There are a lot of features that should be included with the AKS."
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The solution's visibility and vulnerability prevention should be improved."
"The support and specifications need to be up to date for the cluster technologies"
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"Red Hat is somewhat expensive."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
 

Pricing and Cost Advice

"The cost for PingSafe is average when compared to other CSPM tools."
"SentinelOne is quite costly compared to other security platforms."
"SentinelOne offers excellent pricing and licensing options."
"We found it to be fine for us. Its price was competitive. It was something we were happy with. We are not a Fortune 500 company, so I do not know how pricing scales at the top end, but for our cloud environment, it works very well."
"Their pricing appears to be based simply on the number of accounts we have, which is common for cloud-based products."
"The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity."
"I am personally not taking care of the pricing part, but when we moved from CrowdStrike to PingSafe, there were some savings. The price of CrowdStrike was quite high. Compared to that, the price of PingSafe was low. PingSafe is charging based on the subscription model. If I want to add an AWS subscription, I need to pay more. It should not be based on subscription. It should be based on the number of servers that I am scanning."
"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"The solution does not cost much."
"The product follows a pay-as-you-go pricing model which is good for small enterprises. You need to pay only for the services that you use."
"It is a cost-effective solution."
"You pay for what you use."
"We could spend as little as $25 or $30 a month on Kubernetes Services, compared to the typical $100 a month expenditure for a virtual machine."
"We are facing a significant challenge regarding OEM licensing. The issue arises from the fact that certain licenses required for our own purposes are not provided by Microsoft's licensing. Consequently, we are unsure about the most suitable mobile license provisioning model offered by third-party providers."
"The pricing of the solution is same as Azure Stack."
"It is expensive compared to other vendors."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"We purchase a yearly basis license for the solution."
"The pricing model is moderate, meaning it is not very expensive."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"It's a costly solution"
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
16%
Manufacturing Company
9%
Government
5%
Financial Services Firm
26%
Computer Software Company
12%
Manufacturing Company
8%
Government
6%
Financial Services Firm
25%
Computer Software Company
14%
Government
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
The documentation could be better. Besides improving the documentation, obtaining a professional or partner specializ...
What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
One improvement I'd like to see is a better user interface for developers, enabling easier operation without relying ...
What is your primary use case for Azure Kubernetes Service (AKS)?
My primary use case is building and deploying solutions using multiple Azure services. I combine these services to bu...
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the b...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for th...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling,...
 

Also Known As

PingSafe
No data available
StackRox
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.