We performed a comparison between Docker and Legit Security based on real PeerSpot user reviews.
Find out in this report how the two Software Supply Chain Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is stable."
"The solution is easy to deploy for clients so it saves a lot of hassle."
"The most valuable feature is that it gives you the same environment as on a developer machine as well as a production machine relevant to specifications."
"The most valuable feature of Docker is its integration with other solutions, such as KVM and AlmaLinux."
"We are able to stop our containers or stop the service with a single command."
"The solution's most valuable feature is having containers independent of the operating system or environment."
"The most valuable feature of Docker is its portability, ease of security management, and low resource usage."
"I am impressed with the product's independence. We can also deploy it anywhere."
"The true value proposition of Legit lies not in its features but in its ability to support our product security program's focus on creating guardrails instead of toll gates."
"Legit has had a positive effect on our overall security posture."
"We implemented Legit Security to gain visibility into all development teams and ensure that consistent controls are in place and accounted for on every route."
"Legit has increased my security posture to a level I couldn't achieve before. I don't need to worry as much about what's happening within my developer environments. I can rest assured that my vulnerabilities are being detected."
"I advise new users to review their website, commands, and the steps for creating images."
"We'd like knowledge transfer to be easier."
"There may not be much room for improvement with Docker as it has greatly evolved. However, one area that could be improved upon is the documentation on their website which was once easy to follow but has become quite terrible with numerous versions being released. As an example, the installation process for Docker now requires more than just a one-line command, causing inconvenience. Additionally, based on my experience as a college instructor, teaching students to install Docker was a difficult task due to the lack of straightforward and easy-to-follow documentation. Docker should focus on improving their documentation to make it more user-friendly for all."
"The security layer is very vulnerable, although they are working to improve the system hardening and email hardening."
"Management can be improved with the necessary tools for orchestration."
"The solution’s documentation could improve a bit."
"There is always room for improvement. I often refer to forums such as StackOverflow to learn from other developers' experiences and the challenges they have faced while using Docker."
"Unfortunately, base images are not currently available."
"One issue is that engineering teams don't always embed secrets in the same way, making it difficult for the tool to consistently identify them."
"The one we're working on right now is the ability to dynamically rerun development teams and groups."
"I would like them to have their own static code scanner, and I'd like them to have their own open-source software scanners."
"Legit Security could do a little better with detecting publicly exposed keys. It's not bad. The detections that they are running get to everything eventually, but it would be great if they could increase some of that awareness."
Docker is ranked 5th in Software Supply Chain Security with 40 reviews while Legit Security is ranked 7th in Software Supply Chain Security with 4 reviews. Docker is rated 8.6, while Legit Security is rated 10.0. The top reviewer of Docker writes "Easy to deploy with an impressive networking feature". On the other hand, the top reviewer of Legit Security writes "Correlates information based on the integrations I have, which is extremely helpful". Docker is most compared with Mirantis Container Runtime, Rancher Labs, VMware Tanzu Mission Control, Nutanix Kubernetes Engine NKE and AWS Cloud Development Kit (CDK), whereas Legit Security is most compared with Snyk, Ox Security and Cycode. See our Docker vs. Legit Security report.
See our list of best Software Supply Chain Security vendors.
We monitor all Software Supply Chain Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.