Sysdig Open Source
SysdigReviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
108 reviews
from
External reviews are not included in the AWS star rating for the product.
Best for Runtime Security and Vulnerability Management
What do you like best about the product?
We are majorly using sysdig for runtime detection, compliance posture and image scanning. All of 3 components are working as expected and in case of any issue we see the local support was very helpful.
What do you dislike about the product?
Documentation is outdated in some places, also it not easy to integrate you will require some skill to get things integrated.
What problems is the product solving and how is that benefiting you?
We are getting compliance score out of box which is great, and on top of it we are able to shift things left with image scanning and runtime security in lower envs.
Runtime Threat Detection and In-Use Vulnerability Insights for Proactive Security Management
What do you like best about the product?
1- Advanced Runtime Threat Detection & Prevention
2- Runtime Vulnerability Management that provide the actionable insights on vulnerable packages loaded in memory and the application stack, identifying exploitable and fixable vulnerabilities present for over XX days.
3- Proactive Threat Detection, Response, & Mitigation
4- Seamless Usability, Integration
5- Comprehensive Support from diffrent team like solution engineering, customer success, and professional services teams for smooth onboarding and implementation.
2- Runtime Vulnerability Management that provide the actionable insights on vulnerable packages loaded in memory and the application stack, identifying exploitable and fixable vulnerabilities present for over XX days.
3- Proactive Threat Detection, Response, & Mitigation
4- Seamless Usability, Integration
5- Comprehensive Support from diffrent team like solution engineering, customer success, and professional services teams for smooth onboarding and implementation.
What do you dislike about the product?
It’s not about dislike something in Sysdig secure. More about considering additional sources for log ingestion while reducing overhead. For example, VPC flow log ingestion can provide valuable inputs like port and IP address details.
What problems is the product solving and how is that benefiting you?
1- Enhanced visibility across multi-cloud and hybrid microservices environments.
1- Introducing runtime security in Kubernetes environments.
3- Integrating security into the DevOps pipeline, covering both Shift-Left and Shield-Right strategies.
1- Introducing runtime security in Kubernetes environments.
3- Integrating security into the DevOps pipeline, covering both Shift-Left and Shield-Right strategies.
Blending Agent & Agentless Approach
What do you like best about the product?
1- The strong detection & prevention for cloud-native threat landscape, using both agent-based and agentless methods.
2- The automatically discovers assets across multiple organization accounts and regions,
3- Runtime threat detection and prevention, and manages vulnerabilities for both container and non-container workloads.
4- Rapid response capabilities for containers.
5- Ability to export the SBOM in CycloneDx
6- Easy-to-use interface
Most Importantly, they have recenetly introduced the compliance posture check
for indian regulations after we requested like RBI, SEBI and DPDP Act.
2- The automatically discovers assets across multiple organization accounts and regions,
3- Runtime threat detection and prevention, and manages vulnerabilities for both container and non-container workloads.
4- Rapid response capabilities for containers.
5- Ability to export the SBOM in CycloneDx
6- Easy-to-use interface
Most Importantly, they have recenetly introduced the compliance posture check
for indian regulations after we requested like RBI, SEBI and DPDP Act.
What do you dislike about the product?
I would suggest adding more thoughtful detection rules for better management of organizational accounts in the future.
What problems is the product solving and how is that benefiting you?
Runtime security for our microservices environment running across multiple AWS regions on EKS.
Powerful Platform Delivering Deep Insights and Seamless Multi-Cloud Integration
What do you like best about the product?
Built on opensource cnfc graduate project facto.
Good Document for implementation and integration.
Flexibility in policy Customisation and prevention
Good Document for implementation and integration.
Flexibility in policy Customisation and prevention
What do you dislike about the product?
Missing the tracing and logging capabilitese to complete the obserability stack in sysdig monitor.
What problems is the product solving and how is that benefiting you?
We use Sysdig Secure for runtime security in our Kubernetes environments and to streamline compliance and audit workflows. The platform is integrated with our automated ticketing system for rapid response, enhancing the security posture of our containerized applications and Kubernetes infrastructure.
Comprehensive Multi-Cloud Security with Seamless CI/CD Integration
What do you like best about the product?
1- Monitoring (metrics) and securing our containers from source to runtime.
2- Easy of implementation with agentless apprroch.
3- Easy of integration with our CI/CD pipeline and GitHub source repositories.
4- Threat detection by using audit logs from the GitHub & Okta account.
2- Easy of implementation with agentless apprroch.
3- Easy of integration with our CI/CD pipeline and GitHub source repositories.
4- Threat detection by using audit logs from the GitHub & Okta account.
What do you dislike about the product?
It would be more efficient if a single file could be generated to integrate all the necessary modules for an individual account or organizational level.
What problems is the product solving and how is that benefiting you?
Monitoring of infrastucture & application metric and cloud security posture management with the Sysdig platform. By integrating at the organizational account level, we 're able to monitor metric of AWS-native services like ELB, S3, and runtime CSPM and actionable remediation guidance, reducing friction and enhancing security posture.
Strengthening Cloud Security with Robust Detection, Remediation, and Reporting Features
What do you like best about the product?
Top 3 features that I like most, they would be:
1- Supporting multicloud, containers and Kubernetes, and it easily integrates with other systems.
2- The ability to detect and respond to threats is quite advanced even for behavioral threats detection , file tampering, kernel level exploit and system compromise.
3 - If a user is compromised – flag that user; alert that user was compromised as well as redirect that user to remediate whatever change was made.
1- Supporting multicloud, containers and Kubernetes, and it easily integrates with other systems.
2- The ability to detect and respond to threats is quite advanced even for behavioral threats detection , file tampering, kernel level exploit and system compromise.
3 - If a user is compromised – flag that user; alert that user was compromised as well as redirect that user to remediate whatever change was made.
What do you dislike about the product?
Missing runtime detection in CSPM use cases, particularly for lateral movement within organizational accounts, especially in AWS.
What problems is the product solving and how is that benefiting you?
1- Runtime security for both our on-premises open-source Kubernetes & managed Kubernetes running on AWS EKS and integrating security in DevOps.
2- Monitoring and security for Huawei EulerOS Linux and Red Hat OpenShift instances
3- CNAPP solutions across AWS, Azure, GCP, and OCI environments.
After introducing the Sysdig platform, which combines both monitoring and security, we were able to achieve our goals with a single solution. This consolidation allowed us to reduce the number of tools from seven to just two, streamlining operations while maintaining robust compliance checks.
2- Monitoring and security for Huawei EulerOS Linux and Red Hat OpenShift instances
3- CNAPP solutions across AWS, Azure, GCP, and OCI environments.
After introducing the Sysdig platform, which combines both monitoring and security, we were able to achieve our goals with a single solution. This consolidation allowed us to reduce the number of tools from seven to just two, streamlining operations while maintaining robust compliance checks.
Cloud and Container security made simpler
What do you like best about the product?
It provides broad insight into cloud-native environments such as Kubernetes, containers, and hosts, as well as real-time threat detection and monitoring. Sydig also has broader integrations with cloud providers and DevOps tools.
What do you dislike about the product?
For startups or small businesses with tight finances, Sysdig Secure might be expensive.Additionally, requires sufficient infrastructure and resource allocation.
What problems is the product solving and how is that benefiting you?
Previously, we didn’t have proper visibility into vulnerabilities and compliance in both our on-prem and public cloud environments. Now, with Sysdig integrated into both our public and private cloud environments, we have real-time visibility into vulnerabilities and compliance across our entire hybrid cloud infrastructure. Additionally, the CIEM feature is helping us daily to eliminate numerous potential threats from our environments.
Sysdig Secure: The perfect platform build for Multi-Cloud Environment
What do you like best about the product?
Detailed deep visibility into workloads and multi cloud for runtime security posture management and repid response capability.
What do you dislike about the product?
It's not about dislike of the current product, but rather a gaps to provide the present the historic trend and comparisons with industry peers in the same vertical would greatly enhance the product's value.
What problems is the product solving and how is that benefiting you?
The decision to purchase the Sysdig CNAPP platform often stems from a variety of business challenges or needs related to cloud-native security. Common scenarios include:
The need for a comprehensive platform to monitor and secure cloud-native infrastructure from development to runtime.
A broadened threat landscape following the adoption of a multi-cloud strategy.
Regulatory compliance requirements for distributed cloud-native environments.
The need for scalability and agility as the business grows and transitions to cloud-native architectures.
The need for a comprehensive platform to monitor and secure cloud-native infrastructure from development to runtime.
A broadened threat landscape following the adoption of a multi-cloud strategy.
Regulatory compliance requirements for distributed cloud-native environments.
The need for scalability and agility as the business grows and transitions to cloud-native architectures.
Feel secured in cloud
What do you like best about the product?
Ease of deployment,
Easy to use console,
Multi platform visibility,
Easy to configure.
Easy to use console,
Multi platform visibility,
Easy to configure.
What do you dislike about the product?
Nothing as of now.
The tool is working as per our expectations
The tool is working as per our expectations
What problems is the product solving and how is that benefiting you?
Multi cloud visibility and protection
Best all-in security platform out there
What do you like best about the product?
We have been using sysdig secure for more than 2 months now and we have got significant visibility into our infrastructure on where it stands on different benchmarks. I liked the runtime threat detection and the vulnerability management feature of sysdig. The UI is fantastic and gives a clear picture of our infrastructure. It also provides support for creating custom policies to benchmark our infrastructure.
What do you dislike about the product?
Filters can be more helpful on all dashboards.
What problems is the product solving and how is that benefiting you?
Sysdig secure is helping us solve the following problems:
1. Runtime threat detection: It captures the events on any malicious activity happening in our containers or nodes.
2.Vulnerability management: It helps us capture the vulnerabilities in the images which are pushed to our ecrs.
3. Compliance posture managemen: Helps us to improve score of different benchmarks like CIS EKS, SOC2 etc.
It gets easily integrate into pipelines where we use sysdig-cli to capture vulnerabilities in the image pushed.
1. Runtime threat detection: It captures the events on any malicious activity happening in our containers or nodes.
2.Vulnerability management: It helps us capture the vulnerabilities in the images which are pushed to our ecrs.
3. Compliance posture managemen: Helps us to improve score of different benchmarks like CIS EKS, SOC2 etc.
It gets easily integrate into pipelines where we use sysdig-cli to capture vulnerabilities in the image pushed.
showing 21 - 30