

Find out what your peers are saying about Wiz, Orca Security, Microsoft and others in Cloud Detection and Response (CDR).
| Product | Mindshare (%) |
|---|---|
| Cortex Cloud by Palo Alto Networks | 4.2% |
| Wiz | 26.2% |
| Microsoft Defender for Cloud | 13.2% |
| Other | 56.400000000000006% |
| Product | Mindshare (%) |
|---|---|
| Red Hat Advanced Cluster Security for Kubernetes | 1.7% |
| Wiz | 9.7% |
| Prisma Cloud by Palo Alto Networks | 8.0% |
| Other | 80.6% |

| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
Cortex Cloud by Palo Alto Networks enhances cloud security with features like AI/ML threat detection and automated remediation, ensuring real-time protection and efficient management across cloud environments.
Cortex Cloud by Palo Alto Networks offers comprehensive cloud security posture management and runtime protection. It reduces manual tasks and accelerates incident investigation through advanced threat detection and AI-driven anomaly detection. With integration to the MITRE ATT&CK framework, it boosts threat response while reducing incident resolution time. Although users find the UI complex and pricing high, its capabilities in securing AWS, Azure, and other environments, as well as its potential integration with CyberArk, emphasize its enterprise-ready design for cloud transformation across diverse industry sectors.
What are the key features of Cortex Cloud by Palo Alto Networks?Cortex Cloud by Palo Alto Networks is deployed across industries like telecom, BFSI, and manufacturing for robust cloud security. It's leveraged for detecting misconfigurations and vulnerabilities, aiding cloud transformation and compliance with standards such as GDPR and NIST. The integration across cloud infrastructures, including AWS and Azure, supports policy creation and threat management strategies for diverse enterprises.
Red Hat Advanced Cluster Security for Kubernetes empowers organizations with robust capabilities in container security, vulnerability management, and workload transition, seamlessly integrated with OpenShift for optimal orchestration.
Red Hat Advanced Cluster Security for Kubernetes stands out with its comprehensive features like authentication, authorization, and API integration. Users appreciate resource sharing, segmentation, and virtualization capabilities, all facilitated by a user-friendly Cockpit web interface and command administration. The system's strengths are visible through effective security protocols, such as secure UPI images, container networking, and built-in security features. Its advanced cluster management and monitoring ensure efficiency, while focus on vulnerability and configuration management addresses key concerns. However, improvements in documentation, web UI, and API flexibility are needed, with challenges in command line configuration and deployment also noted. Stability issues due to API deprecation and the need for enhanced zero trust, access control, and database connectivity present room for growth.
What are the key features of Red Hat Advanced Cluster Security for Kubernetes?Red Hat Advanced Cluster Security for Kubernetes is implemented across various industries to facilitate the transition from traditional monolithic applications to dynamic containerized environments. Organizations in sectors such as finance, healthcare, and technology benefit from its robust segmentation, monitoring abilities, and behavior analysis. With the integration of Istio and GRPC, industries achieve secure microservices communication and improved visibility for comprehensive threat monitoring.
We monitor all Cloud Detection and Response (CDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.