

JFrog Xray and SUSE NeuVector are competitive products in the security and compliance market. JFrog Xray appears to have the upper hand due to better pricing and strong integration capabilities, while SUSE NeuVector excels in comprehensive security features and user satisfaction.
Features: JFrog Xray is praised for its seamless integration with CI/CD pipelines, extensive package support, and ability to provide deep insights into artifacts. SUSE NeuVector is recognized for robust zero-trust container security, runtime protection, and comprehensive security mechanisms.
Room for Improvement: Users of JFrog Xray suggest the need for better vulnerability data accuracy, improved performance, and better initial setup guides. SUSE NeuVector users point out that documentation could be enhanced, the learning curve is steep, and deployment can be complex.
Ease of Deployment and Customer Service: JFrog Xray is noted for its straightforward deployment process, though some users indicate a need for better initial setup guides. SUSE NeuVector’s deployment can be complex, but users appreciate the responsive customer service.
Pricing and ROI: JFrog Xray is seen as cost-effective with users reporting a good return on investment due to its pricing structure. SUSE NeuVector is viewed as a premium product, with higher upfront costs but justified by advanced security features, leading to a higher ROI.
| Product | Mindshare (%) |
|---|---|
| JFrog Xray | 3.2% |
| SUSE NeuVector | 1.8% |
| Other | 95.0% |


| Company Size | Count |
|---|---|
| Small Business | 1 |
| Midsize Enterprise | 3 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 1 |
| Large Enterprise | 2 |
JFrog Xray is a robust solution for managing artifacts and vulnerabilities, integrating with tools like Artifactory to streamline dependency management and ensure security compliance. Recognized for its scalability and stability, it facilitates advanced reporting and license compliance.
JFrog Xray provides a comprehensive approach to artifact security and management, seamlessly integrating with CI/CD pipelines. Its deep scanning capabilities are particularly valuable for containerized applications, offering insights into vulnerabilities and compliance. The tool's policy-driven approach enhances security, while its efficiency in handling multiple package types ensures broad applicability. Despite room for improvement in speed and performance, it's a critical asset for organizations prioritizing secure software delivery.
What are JFrog Xray's key features?JFrog Xray finds application across industries where security and compliance are critical. In sectors reliant on container technology and open-source components, such as finance or technology, Xray aids in deploying secure applications. Through its deep scanning capabilities, companies can ensure that images and artifacts meet compliance standards, mitigating risks associated with dependencies and licenses.
SUSE NeuVector offers robust container security with features like image scanning, anti-malware, deployment simplicity, and run-time security. It enhances risk management and performance across container, client, node, network security, and vulnerability scanning.
SUSE NeuVector is designed for comprehensive Kubernetes and container security, handling vulnerability management, and simplifying deployment in hybrid environments. It integrates with CI/CD pipelines and supports multiple clusters, providing flexibility for cloud and on-premise implementations. The platform enhances compliance with automation and informative interfaces, aiding in ISO certification checks. While it excels in various security aspects, there are areas for improvement including image scanning and integration with other tools. Users need enhanced visibility into DevSecOps and better support for IaaS VMs, alongside improved documentation and monitoring capabilities.
What are the key features of SUSE NeuVector?Industries implement SUSE NeuVector to fortify container security within Kubernetes ecosystems. Often used in conjunction with Amazon AWS, it monitors events and manages vulnerabilities to protect assets. It finds application in sectors where security runtime solutions and network automation are crucial, catering to both cloud-based and on-premise needs. Its integration capabilities with CI/CD pipelines support agile software development across different industries.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.