getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Container Security Software with Access Controls/Permissions - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


32 software options

Checkmarx One logo

Enterprise cloud-native application security platform.

learn more
Checkmarx One is an enterprise cloud-native application security platform that helps teams cut through the noise fix what matters most.

Read more about Checkmarx One

Users also considered
Fairwinds Insights logo

Configuration validation for Kubernetes workloads

learn more
Fairwinds Insights delivers dev and ops teams shared visibility across multi-clusters, anticipating and remediating configuration and security threats before they cost time or money.

Read more about Fairwinds Insights

Users also considered
ActiveState logo

Tame the complexities of your open source

learn more
The ActiveState platform helps DevSecOps teams build securely from vetted source code, remediate vulnerabilities faster with breaking change analysis, and deploy trusted builds automatically across all ecosystems from containers to AI assets.

Read more about ActiveState

Users also considered
Baffle logo

Cloud-based data protection software

learn more
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
InfraPilot logo

Self-hosted Docker management dashboard

learn more
InfraPilot is a self-hosted Docker infrastructure management platform that consolidates container monitoring, Nginx reverse proxy configuration, and SSL certificate management into a single dashboard. The software communicates through the Docker socket without requiring SSH access and includes features such as real-time container metrics, unified log viewing, automated Let's Encrypt SSL certificates, and role-based access control with audit logging.

Read more about InfraPilot

Users also considered
ThreatWatch logo

Cloud-based cybersecurity and threat assessment software

learn more
ThreatWatch is a cloud-based cybersecurity software that provides businesses with tools to conduct risk assessments, identify vulnerabilities, and secure third-party assets. Supervisors can utilize artificial intelligence (AI)-enabled threat intelligence tool to perform security scans and self-certify codes, images, and artifacts.

Read more about ThreatWatch

Users also considered
Stream Security logo

Cloud security platform for threat detection and response

learn more
Stream Security is a cloud security platform that helps businesses of all sizes in the information technology (IT), banking, and oil and gas industries detect threats, automate attack investigation, and assess risks across cloud environments.

Read more about Stream Security

Users also considered