Best Cloud Security Posture Management (CSPM) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud security posture management (CSPM) is an emerging market of vulnerability management and security compliance technologies designed to ensure protection for complex, modern hybrid computing environments. CSPM tools monitor cloud applications, services, containers, and infrastructure to detect and remediate misconfigurations, or incorrectly enforced policies. Cloud security posture management vendors create solutions that will typically remediate issues automatically when triggered by an anomaly or other misconfiguration based on rules set by the administrator.

Companies use these tools because it is very difficult to map out and consistently visualize all the components of a complex cloud computing environment. New tools have been developed to enable AI-based, automated management of identities, networks, infrastructure, etc. However, only CSPM software has emerged to provide continuous monitoring and visibility of a company’s security posture, and pair it with automated detection and remediation for issues as they emerge across disparate computing environments.

These tools are part of the emerging secure access service edge (SASE) technology market that also includes software defined perimeter (SDP) software, cloud access security brokers (CASB) software, secure web gateways, and zero trust networking software. Together, these tools are delivered virtually through SD-WAN software to provide an all-encompassing security solution for all components in any cloud environment.

To qualify for inclusion in the Cloud Security Posture Management (CSPM) category, a product must:

  • Facilitate the automated detection and remediation of cloud misconfigurations
  • Monitor security policies and configurations across infrastructure, applications, and other cloud environments
  • Visualize cloud infrastructure in a single-pane-of-glass view
  • Monitor for other issues relating to cloud compliance, infrastructure as code, and other potential security gaps

Best Cloud Security Posture Management (CSPM) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
87 Listings in Cloud Security Posture Management (CSPM) Available
(702)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    100
    Features
    91
    Security
    88
    Easy Setup
    68
    Visibility
    68
    Cons
    Improvement Needed
    30
    Feature Limitations
    29
    Improvements Needed
    27
    Missing Features
    25
    Learning Curve
    24
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.7
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,323 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,928 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
100
Features
91
Security
88
Easy Setup
68
Visibility
68
Cons
Improvement Needed
30
Feature Limitations
29
Improvements Needed
27
Missing Features
25
Learning Curve
24
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.7
9.1
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.5
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,323 Twitter followers
LinkedIn® Page
www.linkedin.com
2,928 employees on LinkedIn®
(1,141)4.9 out of 5
1st Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for Scrut Automation
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes com

    Users
    • CTO
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Small-Business
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Scrut Automation Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    362
    Helpful
    268
    Customer Support
    265
    Compliance Management
    259
    Compliance
    257
    Cons
    Improvement Needed
    87
    Technical Issues
    70
    Improvements Needed
    62
    Software Bugs
    58
    Bugs
    49
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Scrut Automation features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.3
    Configuration Monitoring
    Average: 8.7
    9.4
    Vulnerability Scanning
    Average: 8.9
    9.2
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Palo Alto, US
    Twitter
    @scrutsocial
    110 Twitter followers
    LinkedIn® Page
    in.linkedin.com
    205 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes com

Users
  • CTO
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Small-Business
  • 49% Mid-Market
Scrut Automation Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
362
Helpful
268
Customer Support
265
Compliance Management
259
Compliance
257
Cons
Improvement Needed
87
Technical Issues
70
Improvements Needed
62
Software Bugs
58
Bugs
49
Scrut Automation features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
9.3
Configuration Monitoring
Average: 8.7
9.4
Vulnerability Scanning
Average: 8.9
9.2
Threat Hunting
Average: 8.5
Seller Details
Year Founded
2022
HQ Location
Palo Alto, US
Twitter
@scrutsocial
110 Twitter followers
LinkedIn® Page
in.linkedin.com
205 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(220)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Security
    50
    Features
    49
    Cloud Security
    36
    Vulnerability Detection
    34
    Cons
    Improvement Needed
    23
    Feature Limitations
    19
    Missing Features
    18
    Improvements Needed
    15
    Ineffective Alerts
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.5
    Configuration Monitoring
    Average: 8.7
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.4
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,841 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    456 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Security
50
Features
49
Cloud Security
36
Vulnerability Detection
34
Cons
Improvement Needed
23
Feature Limitations
19
Missing Features
18
Improvements Needed
15
Ineffective Alerts
14
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.5
Configuration Monitoring
Average: 8.7
9.1
Vulnerability Scanning
Average: 8.9
8.4
Threat Hunting
Average: 8.5
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,841 Twitter followers
LinkedIn® Page
www.linkedin.com
456 employees on LinkedIn®
(109)4.8 out of 5
Optimized for quick response
3rd Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 46% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    35
    Security
    34
    Threat Detection
    28
    Detection Efficiency
    27
    Features
    25
    Cons
    Feature Limitations
    12
    Missing Features
    9
    Complexity
    8
    Resource Limitations
    7
    Feature Complexity
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    9.4
    Configuration Monitoring
    Average: 8.7
    9.6
    Vulnerability Scanning
    Average: 8.9
    9.7
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,112 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    734 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 46% Enterprise
  • 40% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
35
Security
34
Threat Detection
28
Detection Efficiency
27
Features
25
Cons
Feature Limitations
12
Missing Features
9
Complexity
8
Resource Limitations
7
Feature Complexity
6
Sysdig Secure features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
9.4
Configuration Monitoring
Average: 8.7
9.6
Vulnerability Scanning
Average: 8.9
9.7
Threat Hunting
Average: 8.5
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,112 Twitter followers
LinkedIn® Page
www.linkedin.com
734 employees on LinkedIn®
(159)4.5 out of 5
7th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 52% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard CNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    31
    Cloud Security
    24
    Cloud Integration
    20
    Features
    20
    Cloud Services
    19
    Cons
    Improvement Needed
    8
    Poor Support Services
    8
    Limited Customization
    7
    Missing Features
    7
    Poor Customer Support
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.7
    Configuration Monitoring
    Average: 8.7
    9.4
    Vulnerability Scanning
    Average: 8.9
    9.3
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,020 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach prote

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 52% Enterprise
  • 34% Mid-Market
Check Point CloudGuard CNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
31
Cloud Security
24
Cloud Integration
20
Features
20
Cloud Services
19
Cons
Improvement Needed
8
Poor Support Services
8
Limited Customization
7
Missing Features
7
Poor Customer Support
7
Check Point CloudGuard CNAPP features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.3
8.7
Configuration Monitoring
Average: 8.7
9.4
Vulnerability Scanning
Average: 8.9
9.3
Threat Hunting
Average: 8.5
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,020 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
(108)4.9 out of 5
8th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    37
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.8
    Configuration Monitoring
    Average: 8.7
    9.9
    Vulnerability Scanning
    Average: 8.9
    9.9
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,275 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
37
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
9.8
Configuration Monitoring
Average: 8.7
9.9
Vulnerability Scanning
Average: 8.9
9.9
Threat Hunting
Average: 8.5
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,275 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(70)4.6 out of 5
View top Consulting Services for CrowdStrike Falcon Cloud Security
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike Falcon Cloud Security stop breaches with the most complete agent and agentless cloud-native application protection platform (CNAPP), with the most comprehensive cloud detection and respons

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    20
    Cloud Security
    17
    Detection Efficiency
    14
    Threat Detection
    12
    Vulnerability Detection
    12
    Cons
    Expensive
    9
    Improvements Needed
    8
    Improvement Needed
    7
    Insufficient Information
    5
    Learning Curve
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Cloud Security features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Configuration Monitoring
    Average: 8.7
    8.4
    Vulnerability Scanning
    Average: 8.9
    8.9
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike Falcon Cloud Security stop breaches with the most complete agent and agentless cloud-native application protection platform (CNAPP), with the most comprehensive cloud detection and respons

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
20
Cloud Security
17
Detection Efficiency
14
Threat Detection
12
Vulnerability Detection
12
Cons
Expensive
9
Improvements Needed
8
Improvement Needed
7
Insufficient Information
5
Learning Curve
4
CrowdStrike Falcon Cloud Security features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
8.9
Configuration Monitoring
Average: 8.7
8.4
Vulnerability Scanning
Average: 8.9
8.9
Threat Hunting
Average: 8.5
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,816 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

    Users
    • Saas Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    168
    Comprehensive Security
    115
    Cloud Security
    102
    Ease of Use
    75
    Cloud Services
    70
    Cons
    Complexity
    37
    Expensive
    36
    False Positives
    26
    Delayed Detection
    25
    Improvement Needed
    25
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.7
    8.9
    Vulnerability Scanning
    Average: 8.9
    8.6
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,563 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime

Users
  • Saas Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Microsoft Defender for Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
168
Comprehensive Security
115
Cloud Security
102
Ease of Use
75
Cloud Services
70
Cons
Complexity
37
Expensive
36
False Positives
26
Delayed Detection
25
Improvement Needed
25
Microsoft Defender for Cloud features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.7
8.9
Vulnerability Scanning
Average: 8.9
8.6
Threat Hunting
Average: 8.5
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,563 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(381)4.4 out of 5
13th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for Lacework FortiCNAPP
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lacework FortiCNAPP is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire applicatio

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lacework FortiCNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    32
    Security
    23
    Features
    18
    Vulnerability Detection
    18
    Integrations
    14
    Cons
    Improvement Needed
    10
    Integration Issues
    10
    Missing Features
    10
    Improvements Needed
    9
    Time-Consuming
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lacework FortiCNAPP features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.7
    Configuration Monitoring
    Average: 8.7
    8.9
    Vulnerability Scanning
    Average: 8.9
    8.2
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,509 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Lacework FortiCNAPP is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire applicatio

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
Lacework FortiCNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
32
Security
23
Features
18
Vulnerability Detection
18
Integrations
14
Cons
Improvement Needed
10
Integration Issues
10
Missing Features
10
Improvements Needed
9
Time-Consuming
8
Lacework FortiCNAPP features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
8.7
Configuration Monitoring
Average: 8.7
8.9
Vulnerability Scanning
Average: 8.9
8.2
Threat Hunting
Average: 8.5
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,509 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(133)4.9 out of 5
Optimized for quick response
6th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

    Users
    • Security Engineer
    • Cyber Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 55% Enterprise
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cymulate: Security Validation and Exposure Management Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    63
    Features
    38
    Security
    36
    Customer Support
    32
    Vulnerability Identification
    29
    Cons
    Improvement Needed
    10
    Integration Issues
    8
    Lack of Integration
    6
    Inefficient Alert System
    5
    Complexity
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cymulate: Security Validation and Exposure Management Platform features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.3
    5.0
    Configuration Monitoring
    Average: 8.7
    5.0
    Vulnerability Scanning
    Average: 8.9
    4.2
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cymulate
    Company Website
    Year Founded
    2016
    HQ Location
    Holon, Israel
    Twitter
    @CymulateLtd
    1,085 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    268 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

Users
  • Security Engineer
  • Cyber Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 55% Enterprise
  • 44% Mid-Market
Cymulate: Security Validation and Exposure Management Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
63
Features
38
Security
36
Customer Support
32
Vulnerability Identification
29
Cons
Improvement Needed
10
Integration Issues
8
Lack of Integration
6
Inefficient Alert System
5
Complexity
4
Cymulate: Security Validation and Exposure Management Platform features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.3
5.0
Configuration Monitoring
Average: 8.7
5.0
Vulnerability Scanning
Average: 8.9
4.2
Threat Hunting
Average: 8.5
Seller Details
Seller
Cymulate
Company Website
Year Founded
2016
HQ Location
Holon, Israel
Twitter
@CymulateLtd
1,085 Twitter followers
LinkedIn® Page
www.linkedin.com
268 employees on LinkedIn®
(56)4.6 out of 5
15th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Zscaler for Workloads, you can reduce your costs by 30% or more and eliminate security policies by up to 90% with its innovative zero trust architecture.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 77% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Cloud Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Cloud Protection features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Configuration Monitoring
    Average: 8.7
    8.5
    Vulnerability Scanning
    Average: 8.9
    8.5
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,542 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,674 employees on LinkedIn®
    Ownership
    NASDAQ:ZS
Product Description
How are these determined?Information
This description is provided by the seller.

With Zscaler for Workloads, you can reduce your costs by 30% or more and eliminate security policies by up to 90% with its innovative zero trust architecture.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 77% Enterprise
  • 20% Mid-Market
Zscaler Cloud Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
This product has not yet received any negative sentiments.
Zscaler Cloud Protection features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.3
8.6
Configuration Monitoring
Average: 8.7
8.5
Vulnerability Scanning
Average: 8.9
8.5
Threat Hunting
Average: 8.5
Seller Details
Seller
Zscaler
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,542 Twitter followers
LinkedIn® Page
www.linkedin.com
8,674 employees on LinkedIn®
Ownership
NASDAQ:ZS
(55)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aikido Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    33
    Security
    28
    Easy Integrations
    26
    Easy Setup
    26
    Features
    25
    Cons
    False Positives
    8
    Limited Features
    8
    Missing Features
    8
    Improvement Needed
    6
    Lack of Information
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    7.7
    Configuration Monitoring
    Average: 8.7
    8.7
    Vulnerability Scanning
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    2,475 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    83 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
Aikido Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
33
Security
28
Easy Integrations
26
Easy Setup
26
Features
25
Cons
False Positives
8
Limited Features
8
Missing Features
8
Improvement Needed
6
Lack of Information
6
Aikido Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
7.7
Configuration Monitoring
Average: 8.7
8.7
Vulnerability Scanning
Average: 8.9
0.0
No information available
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
2,475 Twitter followers
LinkedIn® Page
www.linkedin.com
83 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Engineer
    • Cyber Security Associate
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 41% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    27
    Cloud Integration
    12
    Cloud Services
    11
    Cloud Security
    10
    Cloud Technology
    10
    Cons
    Complexity
    8
    Complex Setup
    7
    Difficult Setup
    6
    Feature Complexity
    5
    Difficult Learning
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.7
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.9
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Engineer
  • Cyber Security Associate
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 41% Mid-Market
  • 33% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
27
Cloud Integration
12
Cloud Services
11
Cloud Security
10
Cloud Technology
10
Cons
Complexity
8
Complex Setup
7
Difficult Setup
6
Feature Complexity
5
Difficult Learning
4
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.7
9.1
Vulnerability Scanning
Average: 8.9
8.9
Threat Hunting
Average: 8.5
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,749 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
(16)4.9 out of 5
2nd Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudMatos stands as a game-changing solution in the realm of cloud & cybersecurity, redefining how organizations protect their cloud-native applications and digital assets. As an agentless and ef

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 44% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MatosSphere Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Cloud Management
    5
    Cloud Security
    4
    Ease of Use
    4
    Monitoring
    3
    Cons
    Improvement Needed
    3
    Integration Issues
    3
    Limited Integrations
    3
    Difficult Setup
    2
    Inadequate Security
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MatosSphere features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Configuration Monitoring
    Average: 8.7
    9.6
    Vulnerability Scanning
    Average: 8.9
    9.6
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    N/A
    Twitter
    @RestoLabs
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudMatos stands as a game-changing solution in the realm of cloud & cybersecurity, redefining how organizations protect their cloud-native applications and digital assets. As an agentless and ef

Users
No information available
Industries
  • Computer Software
Market Segment
  • 44% Small-Business
  • 38% Mid-Market
MatosSphere Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Cloud Management
5
Cloud Security
4
Ease of Use
4
Monitoring
3
Cons
Improvement Needed
3
Integration Issues
3
Limited Integrations
3
Difficult Setup
2
Inadequate Security
2
MatosSphere features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Configuration Monitoring
Average: 8.7
9.6
Vulnerability Scanning
Average: 8.9
9.6
Threat Hunting
Average: 8.5
Seller Details
Year Founded
2022
HQ Location
N/A
Twitter
@RestoLabs
5 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(124)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when respondi

    Users
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 75% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SafeBase Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Security
    8
    Intuitive
    6
    Security Management
    6
    Time-saving
    5
    Cons
    Access Management
    5
    Document Management
    2
    Improvement Needed
    2
    Insufficient Information
    2
    Missing Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SafeBase features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Configuration Monitoring
    Average: 8.7
    8.3
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SafeBase
    Company Website
    Year Founded
    2020
    HQ Location
    San Francisco, California
    Twitter
    @getsafebase
    273 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when respondi

Users
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 75% Mid-Market
  • 17% Enterprise
SafeBase Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Security
8
Intuitive
6
Security Management
6
Time-saving
5
Cons
Access Management
5
Document Management
2
Improvement Needed
2
Insufficient Information
2
Missing Features
2
SafeBase features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
8.3
Configuration Monitoring
Average: 8.7
8.3
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.5
Seller Details
Seller
SafeBase
Company Website
Year Founded
2020
HQ Location
San Francisco, California
Twitter
@getsafebase
273 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®