We performed a comparison between Aqua Security Platform and CrowdStrike Falcon Cloud Security based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Features: Users appreciate Aqua Security Platform for its container image security, sandboxing and malware detection features, and ability to patch on-demand. It particularly excels in endpoint protection and its ability to leverage machine learning and AI. CrowdStrike Falcon Cloud Security was lauded for its strong adherence to security best practices. Users say Aqua Security Platform should improve its automated reporting and log forwarding, reduce resource usage, and overhaul its UI. CrowdStrike Falcon Cloud Security could improve its Kubernetes and GCP support.
Service and Support: Aqua Security Platform users have praised its responsive and helpful customer service, but a few encountered situations where they had to resolve problems themselves. CrowdStrike Falcon Cloud Security users are generally content with the support team's assistance and promptness.
Ease of Deployment: Aqua Security Platform's initial setup can be complex and time-consuming, depending on the environment, and may necessitate specialized personnel for maintenance and updates. The setup for CrowdStrike Falcon Cloud Security was also deemed easy, but some users struggled with the Kubernetes implementation.
Pricing: Aqua Security Platform is priced competitively compared to some premium solutions and falls in the middle pricing tier. Users consider the pricing of CrowdStrike Falcon Cloud Security to be fair, but it may be pricier than on-premises alternatives.
Comparison Results: Our users prefer CrowdStrike Falcon Cloud Security over Aqua Security Platform Users find the initial setup to be simple and direct, with seamless updates through manageable deployment and automation. The product is praised for its adherence to security best practices, stability, and helpful technical support. It offers comprehensive security coverage for the platform, including features like endpoint protection and real-time monitoring. The pricing is considered fair and reasonable, and customers express contentment with the provided customer service and support.
"My favorite feature is Storyline."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"The solution is a good alerting tool."
"With PingSafe, it's easy to onboard new accounts."
"PingSafe's most valuable feature is its unified console."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"The user interface is well-designed and easy to navigate."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"The container security element of this product has been very valuable to our organization."
"Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out, the amount of risk that we were introducing to the platform, and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access."
"Valuable features include the ability to connect it to our Docker Hub where our images are stored, good integration with Slack, and the connection to the CV, to easily see which CVs are on each image."
"The most valuable feature is the security."
"The DTA, which stands for Dynamic Threat Analysis, allows me to analyze Docker images in a sandbox environment before deployment, helping me anticipate risks."
"Support is very helpful."
"Customers find it invaluable to have the ability to check for vulnerabilities in an image before deployment, similar to a sandbox environment."
"The most helpful feature of Aqua Security is Drift Prevention, which is a feature that allows images to be immutable. In addition, one of the main reasons we went with Aqua Security is because it provides strong protection when it comes to runtime security."
"The immediate mitigation of potential threats and instant alerts are valuable."
"The RTR feature stands out as particularly valuable to me due to its capability to log into machines."
"Cloud security posture management (CSPM) is most valuable."
"The initial setup is easy ."
"It is fully cloud-based, so we don't need to invest in third-party agents repeatedly."
"The most valuable feature of Falcon Cloud Security is its comprehensive threat-hunting ability."
"It's easy to gather insights and conduct analysis about existing threats."
"Cloud security is one valuable feature. Spotlight is the other one. There is also vulnerability management and a couple of more features."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"We use PingSafe and also SentinelOne. If PingSafe integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"PingSafe can improve by eliminating 100 percent of the false positives."
"The integration with Oracle has room for improvement."
"We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"Sometimes I got stressed with the UI."
"The user interface could be improved, especially in terms of organization and clarity."
"They want to release improvements to their product to work with other servers because now there are more focused on the Kubernetes environment. They need to improve the normal servers. I would like to have more options."
"We would like to see an improvement in the overview visibility that this solution offers."
"The solution could improve user-friendliness."
"Aqua Security could improve the forwarding of logging into Splunk and into other tools, it should be easier."
"Aqua Security lacks a lot in reporting."
"The integrations on CICD could be improved. If Aqua had more plugins or container images to integrate and automate more easily on CICD, it would be better."
"One area for improvement in Falcon Cloud Security is the support portal."
"The threat intelligence and user behavioral analysis could be more comprehensive."
"The log scale or Humio side of it where it collects the data and expands into the XDR world still needs time to develop in terms of the way it combines the data and metadata that flows into the platform. I know they're working on it."
"It gets the work done, but the main problem with the solution is that if you remediate anything, it takes 45 days for you to get any of the features displayed on the dashboard. This is the real weakness of CrowdStrike. Their customer support is also not ready to help with it. If you remediate any cloud vulnerability that they are giving you, such as removing a host from your organization, it takes around 45 days for them to remove it from their console."
"The only challenge lies in token verification."
"There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage."
"The UI part needs to be improved."
"The only suggestion for improvement would be the pricing."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More CrowdStrike Falcon Cloud Security Pricing and Cost Advice →
Aqua Cloud Security Platform is ranked 7th in Container Security with 16 reviews while CrowdStrike Falcon Cloud Security is ranked 9th in Container Security with 13 reviews. Aqua Cloud Security Platform is rated 8.0, while CrowdStrike Falcon Cloud Security is rated 8.8. The top reviewer of Aqua Cloud Security Platform writes "Reliable with good container scanning and a straightforward setup". On the other hand, the top reviewer of CrowdStrike Falcon Cloud Security writes "Enhances the overall safety of our company's environment from cyber threats". Aqua Cloud Security Platform is most compared with Prisma Cloud by Palo Alto Networks, Wiz, Snyk, Red Hat Advanced Cluster Security for Kubernetes and Fortify WebInspect, whereas CrowdStrike Falcon Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Wiz and Qualys VMDR. See our Aqua Cloud Security Platform vs. CrowdStrike Falcon Cloud Security report.
See our list of best Container Security vendors, best Cloud Workload Protection Platforms (CWPP) vendors, and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.