App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Container Security Software with Continuous Integration

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

29 software options

Sponsored

1 filter applied


Integrated with


Pricing model


Devices supported



User rating


Personalize your search

Any industry

Any business size

Datadog logo
4.6
(239)

Cloud-Scale Monitoring Platform For Dev, Sec, and Ops teams.

visit website
Datadog's Security Platform delivers real-time threat detection and continuous configuration audits across apps, hosts, containers, and cloud infrastructure. Easily detect changes in your containerized environment that may leave your applications vulnerable with Datadog's detection rules.

Read more about Datadog

Users also considered
Orca Security logo
4.8
(56)

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
Dynatrace logo
4.5
(51)

All-in-One Application Performance Monitoring

learn more
Dynatrace Ruixt is an all-in-one application performance monitoring

Read more about Dynatrace

Users also considered
Falcon logo
4.7
(33)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
OpenShift logo
4.4
(26)

Application creation and hosting

learn more
OpenShift helps build applications and host apps on the OpenShift server with the ability to modify and deploy. It is a cloud-based platform designed to simplify application development and hosting by providing complete control over your applications and coding in the language of your choice.

Read more about OpenShift

Users also considered
Snyk logo
4.7
(17)

Cloud-based security platform to track & fix vulnerabilities

learn more
Snyk is a cloud-based application security and testing platform, which helps enterprises discover and fix vulnerabilities across open source libraries, containers, or codes throughout the development process. Features include runtime monitoring, reporting, exploitability indicators, alerts, and prioritization.

Read more about Snyk

Users also considered
Oracle Linux logo
4.4
(17)

Operating system for managing cloud-native applications

learn more
Oracle Linux is an open-source operating system designed to help businesses handle virtualization, development, and management of cloud-native applications. The platform enables users to streamline performance tracking and security management operations for hybrid and multi-cloud deployments.

Read more about Oracle Linux

Users also considered
Qualys Cloud Platform logo
3.9
(27)

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
VMware Tanzu logo
4.2
(16)

Build, run and manage apps on any cloud, VM or K8s container

learn more
VMware Tanzu is a software development and container management platform that helps businesses build applications, automate the delivery of containerized workloads, run on any cloud, VM or Kubernetes distribution, and monitor apps in production.

Read more about VMware Tanzu

Users also considered
BuildPiper logo
4.2
(13)

Delivering software just got faster

learn more
BuildPiper is a product by OpsTree Labs, which is an end-to-end Kubernetes and microservices Delivery Platform. It is a hybrid cloud-enabled system that facilitates the deployment of dockerized code across multiple environments.

Read more about BuildPiper

Users also considered
Uptycs logo
4.7
(6)

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Google Cloud Run logo
4.1
(10)

Serverless Computing Patform for Developers

learn more
Google Cloud Run is a serverless computing platform for developers.

Read more about Google Cloud Run

Users also considered
Sysdig logo
4.4
(7)

The Secure DevOps Company

learn more
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform. Scan images, detect and respond to threats, validate cloud posture and compliance, monitor and troubleshoot.

Read more about Sysdig

Users also considered
AppviewX CERT+ logo
5.0
(4)

AppViewX CERT+ Simplifies Certificate Lifecycle Management

learn more
AppViewX CERT+ is a ready-to-consume, scalable, and efficient certificate lifecycle management (CLM) solution to effectively automate and manage machine and application identities as an integral part of your cybersecurity strategy.

Read more about AppviewX CERT+

Users also considered
WhiteSource logo
4.3
(7)

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about WhiteSource

Users also considered
Aikido Security logo
4.6
(5)

System for identifying and managing code vulnerabilities

learn more
Scan your source code, containers & cloud with Aikido's all-in-one security app.

Read more about Aikido Security

Users also considered
Xygeni logo
5.0
(3)

End to end Software Supply Chain Security

learn more
Xygeni offers complete visibility, enabling a systematic process for assessing the risks associated with the SSC, identifying and prioritizing the most critical components, evaluating and improving their global and detailed security posture at an effective and efficient effort, time and cost.

Read more about Xygeni

Users also considered
CleanCloud by SEK logo
5.0
(3)

A cloud computing management tool

learn more
CleanCloud is a cloud computing management tool that offers integration with Azure, AWS, and Google Cloud. It provides an overview of vulnerable items, analyzes all cloud resources, monitors critical assets, and performs audits that detail each identified event. Available in Portuguese and English.

Read more about CleanCloud by SEK

Users also considered
Tenable.io logo
5.0
(2)

Cloud and container security software

learn more
Tenable.io is a container security software that helps businesses assess vulnerabilities, prioritize remediation actions, monitor assets, and more on a centralized platform. The automated inspection module enables staff members to detect malware, handle hierarchy intelligence, and assess container images by layer.

Read more about Tenable.io

Users also considered
Google Container Security logo
5.0
(2)

Cloud-based container security software

learn more
Google Container Security is a cloud-based software that provides businesses with tools to secure container environments across Google Kubernetes Engine (GKE), Anthos, and Google Cloud Platform (GCP). Supervisors can deploy patches on image containers and secure workloads using application-layer encryption.

Read more about Google Container Security

Users also considered
AWS Fargate logo
4.5
(2)

Compute service for running containers on AWS

learn more
AWS Fargate is a serverless compute engine for containers that helps businesses deploy and manage applications whilst working with Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS).

Read more about AWS Fargate

Users also considered
Lacework logo
5.0
(1)

Cloud security & compliance platform

learn more
Lacework is a cloud security and compliance software which provides automated intrusion detection, threat defence, one-click investigation, and compliance across AWS, Azure, GCP, and private clouds, giving users a comprehensive view of risks across their cloud workloads and containers.

Read more about Lacework

Users also considered
Argon logo
5.0
(1)

Holistic security for CI/CD pipeline

learn more
Argon connects to development environments and tools. It protects the entire CI/CD pipeline from code manipulation misconfigurations, code leaks, and vulnerabilities. This solution enables smooth AppSec orchestration by providing a unified view, full visibility, security, and code integrity.

Read more about Argon

Users also considered
StackRox logo
4.0
(1)

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Threat Stack logo
(0)

Cloud security platform to detect and respond to threats

learn more
Threat Stack is a cloud-based platform that helps businesses identify and respond to threats in real-time while ensuring security and compliance across applications. It facilitates visibility across cloud management console, host, containers and serverless layers.

Read more about Threat Stack

Users also considered