We performed a comparison between Docker and Legit Security based on real PeerSpot user reviews.
Find out in this report how the two Software Supply Chain Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is easy to install."
"Docker allows you to run multiple virtual machines independently."
"I am impressed with the product's independence. We can also deploy it anywhere."
"There are ways of using Docker where you have absolutely no dependencies on the environment that you work in. This allows us to deploy Docker anywhere anytime and this has been most valuable."
"It is neat and very flexible."
"The initial setup was easy, and you are only required to run commands."
"I think the best feature is to replicate anything in our local machine using a simple command."
"Feature-wise, Docker is very user-friendly...The solution's initial setup process was straightforward."
"Legit has had a positive effect on our overall security posture."
"Legit has increased my security posture to a level I couldn't achieve before. I don't need to worry as much about what's happening within my developer environments. I can rest assured that my vulnerabilities are being detected."
"We implemented Legit Security to gain visibility into all development teams and ensure that consistent controls are in place and accounted for on every route."
"The true value proposition of Legit lies not in its features but in its ability to support our product security program's focus on creating guardrails instead of toll gates."
"They should provide proper documentation to understand the solution's cgroup process."
"The solution’s documentation could improve a bit."
"If you install Docker on a host, it creates its own firewalls. It can become an issue. Usually, when you want to install Docker, you need to restart the firewall or restart the active tables on the machine, but this is not the case with Kubernetes. It uses the default set up by the next administrator, but with Docker, you have to restart the firewall and restart Docker before the firewall on the system will be okay. If you do not the rules will not be created."
"I would like to see a single package image orchestration bundled together."
"The volumes for persistent storage could be more user friendly right out of the box."
"I would like to see a more UI-based tool so that students can easily understand it rather than memorizing all of the Docker commands."
"I would like to see better management layers."
"One item that could be improved is the overall stability of Docker."
"I would like them to have their own static code scanner, and I'd like them to have their own open-source software scanners."
"The one we're working on right now is the ability to dynamically rerun development teams and groups."
"Legit Security could do a little better with detecting publicly exposed keys. It's not bad. The detections that they are running get to everything eventually, but it would be great if they could increase some of that awareness."
"One issue is that engineering teams don't always embed secrets in the same way, making it difficult for the tool to consistently identify them."
Docker is ranked 5th in Software Supply Chain Security with 40 reviews while Legit Security is ranked 7th in Software Supply Chain Security with 4 reviews. Docker is rated 8.6, while Legit Security is rated 10.0. The top reviewer of Docker writes "Easy to deploy with an impressive networking feature". On the other hand, the top reviewer of Legit Security writes "Correlates information based on the integrations I have, which is extremely helpful". Docker is most compared with Mirantis Container Runtime, Rancher Labs, VMware Tanzu Mission Control and Nutanix Kubernetes Engine NKE, whereas Legit Security is most compared with Snyk, Ox Security, Cycode and Cider. See our Docker vs. Legit Security report.
See our list of best Software Supply Chain Security vendors.
We monitor all Software Supply Chain Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.