We performed a comparison between BMC Helix Cloud Security and Red Hat Advanced Cluster Security for Kubernetes based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Cloud Workload Protection Platforms (CWPP)."The real-time detection and response capabilities overall are great."
"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"PingSafe's most valuable feature is its unified console."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"The most valuable features of PingSafe are the asset inventory and issue indexing."
"It's also multi-cloud. You can look at several cloud providers: AWS, Azure, or GCP."
"The most valuable aspects of BMC Helix Cloud Security are its security features and regulatory compliance capabilities."
"The best feature is time to value. With very minimal effort, you are able to have a cohesive view into your security posture on one or multiple cloud accounts, particularly if you are dealing with multicloud. If you have Azure and AWS deployments, you might have multiple subscriptions in Azure and usually multiple accounts in AWS. You may even be doing some GCP work (around Google Cloud Platform). It's very difficult to manage a common set of policies, even less reporting, across multiple subscriptions, accounts, and cloud environments. What BMC Helix Cloud Security does is provide a unified view or single pane of glass as to your baseline. Then, it also facilitates the ability for Level 1 or 2 operations support to take action and report on security vulnerabilities."
"The cool feature of Helix Cloud Security is that you can do all that — understand and remediate issues — in one dashboard, based on the different policies that are available for security, out-of-the-box."
"The features that I've found most valuable are its container security aspect. I also like its vulnerability management tools."
"Role-based security is a valuable feature."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"The most valuable feature of the solution is its monitoring feature."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"Segmentation is the most powerful feature."
"I am impressed with the tool's visibility."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"It is easy to install and manage."
"The technical support is good."
More Red Hat Advanced Cluster Security for Kubernetes Pros →
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"While it is good, I think the solution's console could be improved."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"We've found a lot of false positives."
"Their search feature could be better."
"PingSafe's current documentation could be improved to better assist customers during the cluster onboarding process."
"We can customize security policies but lack auditing capabilities."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"The UI could be more user-friendly."
"Every organization out there doesn't rely on just one control body. They use FISMA control. They may use HIPAA, CIS, PCI, or SOX, then blend them. One of the things that is now in big demand for BMC Helix Cloud Security is content. That's the next journey in its lifespan, making it easier for the community to share and collaborate on content for security controls that can be measured and remediated."
"BMC Helix Cloud Security has room for improvement in terms of integrating its various features."
"We've had some with issues connectors. The connectors have seemed to have caused a little bit of trouble, perhaps with the APIs trying to scan the environment. The only time I've had to reach out to tech support was for that. It seems it may not have been scanning correctly or I wasn't seeing data within a specific time. But we've set up a couple of connectors in the past couple of weeks and they actually scanned the AWS environment and we had data within about 10 minutes. It's working a lot faster and I think they're making improvements as they go."
"I want the role-based security feature to be improved."
"The solution's price could be better."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The testing process could be improved."
"Red Hat is somewhat expensive."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The solution's visibility and vulnerability prevention should be improved."
More Red Hat Advanced Cluster Security for Kubernetes Cons →
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Red Hat Advanced Cluster Security for Kubernetes Pricing and Cost Advice →
BMC Helix Cloud Security is ranked 25th in Cloud Workload Protection Platforms (CWPP) with 5 reviews while Red Hat Advanced Cluster Security for Kubernetes is ranked 18th in Container Security with 10 reviews. BMC Helix Cloud Security is rated 8.0, while Red Hat Advanced Cluster Security for Kubernetes is rated 8.4. The top reviewer of BMC Helix Cloud Security writes "A highly scalable and straightforward solution with a knowledgeable support team". On the other hand, the top reviewer of Red Hat Advanced Cluster Security for Kubernetes writes "Provides network mapping feature for visualizing container communication but complex setup ". BMC Helix Cloud Security is most compared with VMware Aria Operations, Threat Stack Cloud Security Platform and CloudBolt, whereas Red Hat Advanced Cluster Security for Kubernetes is most compared with Prisma Cloud by Palo Alto Networks, Aqua Cloud Security Platform, SUSE NeuVector, CrowdStrike Falcon Cloud Security and Chainguard Images.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.