Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Red Hat Advanced Cluster Security for Kubernetes comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (4th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Azure Kubernetes Service (AKS)
Ranking in Container Security
15th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
38
Ranking in other categories
No ranking in other categories
Red Hat Advanced Cluster Se...
Ranking in Container Security
20th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.4%, up from 1.0% compared to the previous year. The mindshare of Azure Kubernetes Service (AKS) is 0.7%, down from 1.0% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.4%, down from 3.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Raymond De Rooij - PeerSpot reviewer
Scalability and flexibility but needs better support
We are using Azure Kubernetes Service as a customer. I cannot detail all the products and technologies we are using There isn't one specific feature of Azure Kubernetes Service that I can name as most valuable. It's part of a strategic solution yet I don't see an advantage compared to our…
Daniel Stevens - PeerSpot reviewer
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"All the features we use are equal and get the job done."
"Cloud Native Security's evidence-based reporting allows us to prioritize issues by understanding their impact, helping us resolve the most important problems first."
"My favorite feature is Storyline."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"The UI is very good."
"SentinelOne stands out with its responsiveness to feature requests for Singularity Cloud Security."
"SentinelOne Singularity Cloud Security has saved up to 50 percent in engineering time."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"Containerization of the applications is the most valuable feature."
"The most valuable feature is the autoscaling and self-healing."
"The most valuable features of AKS are rollback updates, high availability, easy management, speedy execution and deployment."
"We find the container orchestration tool that this solution provides to be very valuable."
"The advantage of AKS is somewhat greater than that of Kubernetes, such as those provided by Google Cloud or AWS. However, the unique benefit offered by Microsoft is its robust CI/CD capabilities, along with the Azure feature for building workflows. When you combine the entire ecosystem, AKS becomes an excellent choice, particularly for enterprise applications."
"Has a good management feature monitored by the cloud service provider."
"The most valuable features of Azure Kubernetes Service are its integration with Kubernetes, offering similar features for a seamless experience."
"AKS is easy to use. We can scale up and down as needed with AKS, which saves us money on our cloud costs."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"Scalability-wise, I rate the solution a nine out of ten."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"I am impressed with the tool's visibility."
"Segmentation is the most powerful feature."
"The most valuable feature of the solution is its monitoring feature."
"Offers easy management with authentication and authorization features"
"The most valuable feature is the ability to share resources."
 

Cons

"In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of critical severity, whereas they are not critical or of high severity. There is a mismatch of severities."
"While SentinelOne offers robust security features, its higher cost may present a challenge for budget-conscious organizations."
"I'd like to see better onboarding documentation."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"The could improve their mean time to detect."
"A vulnerability alert would appear, and we'd fix it, but then the same alert would return the next day."
"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"I would like additional integrations."
"The technical support could be faster."
"I would like to see a graphical user interface."
"The engineering team can reduce the management of the platform itself by improving the data plane part of the system to upload more management."
"In terms of cost perspective, they could make the product more affordable."
"Its integration functions could be enhanced."
"There are some limitations with the tutor version, particularly in terms of using a lot of free audio. The private level also has restrictions, limiting the number of audio files you can access to just 50. If you want more, you need to contact support."
"Unfortunately, when a microservice fails, Azure can take up to 60 seconds to broadcast an alert to the monitoring agents."
"It can be tough to access the servers when onboarding."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The testing process could be improved."
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"The support and specifications need to be up to date for the cluster technologies"
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The solution's price could be better."
 

Pricing and Cost Advice

"We found it to be fine for us. Its price was competitive. It was something we were happy with. We are not a Fortune 500 company, so I do not know how pricing scales at the top end, but for our cloud environment, it works very well."
"For pricing, it currently seems to be in line with market rates."
"PingSafe is priced reasonably for our workload."
"SentinelOne Singularity Cloud Security is on the costlier side."
"I am personally not taking care of the pricing part, but when we moved from CrowdStrike to PingSafe, there were some savings. The price of CrowdStrike was quite high. Compared to that, the price of PingSafe was low. PingSafe is charging based on the subscription model. If I want to add an AWS subscription, I need to pay more. It should not be based on subscription. It should be based on the number of servers that I am scanning."
"The pricing tends to be high."
"It's not cheap, but it is worth the price."
"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"The price of AKS is expensive. We pay approximately $10,000 monthly."
"You pay for what you use."
"The solution does not cost much."
"The pricing of the solution is same as Azure Stack."
"It is not expensive."
"The control plane is free and we only pay for the usage and time."
"The cost of the solution is extremely high. Both Amazon and Azure cost extremely high. Given the basic features like when they are coming over the cluster nodes, we think over ten times before giving the solution to clients. No matter how many offerings the solution provides, it becomes so much of a burden that you are not even getting back your invested money from customers."
"The pricing of the solution is dependent on the choice of virtual machines, specifically the amount of memory required. There are various options available, ranging from around twenty-five to even more choices to select from. This flexibility allows you to customize the pricing based on your specific needs. From my perspective, virtual machines in the cloud tend to be slightly more expensive compared to virtual machines offered directly by data centers. However, this cost is offset by the benefits of a managed service. Taking the overall picture into account, the managed service approach is advantageous. The pricing for the platform can vary, typically ranging from three hundred euros per month to two thousand euros per month, depending on the specific requirements and setup you choose."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"It's a costly solution"
"We purchase a yearly basis license for the solution."
"The pricing model is moderate, meaning it is not very expensive."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
851,604 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
Financial Services Firm
26%
Computer Software Company
13%
Manufacturing Company
8%
Government
6%
Financial Services Firm
25%
Computer Software Company
12%
Government
10%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What needs improvement with PingSafe?
The price is on the higher side. The dashboard can be more detailed.
What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
One improvement I'd like to see is a better user interface for developers, enabling easier operation without relying ...
What is your primary use case for Azure Kubernetes Service (AKS)?
My primary use case is building and deploying solutions using multiple Azure services. I combine these services to bu...
What do you like most about Red Hat Advanced Cluster Security for Kubernetes?
I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the b...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for th...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling,...
 

Also Known As

PingSafe
No data available
StackRox
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: April 2025.
851,604 professionals have used our research since 2012.