Reviews from AWS Marketplace
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Great Experience
What do you like best about the product?
They provides risk-driven vulnerability management, software supply chain security, granular runtime protection and comprehensive infrastructure assurance & compliance using Red Hat OpenShift to deploy their cloud native applications.
What do you dislike about the product?
Nothing as of now, had a great expepricne
What problems is the product solving and how is that benefiting you?
cans container images based on a constantly updated stream of aggregate sources of vulnerability data (CVEs, vendor advisories, and proprietary research), which ensures up-to-date, broad coverage while minimizing false positives.
- Leave a Comment |
- Mark review as helpful
Top Notch Cloud native security provider
What do you like best about the product?
The container security vulnerability scanning service of aqua security has been a game chancer for me.
My company has benefited a lot using this tool
My company has benefited a lot using this tool
What do you dislike about the product?
Nothing as much. Though the customer support is a little delayed.
What problems is the product solving and how is that benefiting you?
All the ma ual task and false positives are being solved by aqua security.
It also helped in cost cutting as we don't need to invest alot into someone
It also helped in cost cutting as we don't need to invest alot into someone
Just works
What do you like best about the product?
Ease of implementation and configuration was a big win for us to finish ahead of schedule. Dash intuitive and actionable
What do you dislike about the product?
The secrets detection has proven to be hit or miss for us
What problems is the product solving and how is that benefiting you?
For us it's all about software supply chain
Aqua is great
What do you like best about the product?
Vendor support and frequen updates. Freature enhancements are met.
What do you dislike about the product?
Resource utilization bugs and memory holes. Seems to be fixed lately.
What problems is the product solving and how is that benefiting you?
Container security end to end
Aquasec
What do you like best about the product?
Good product with what aquasec is offering
What do you dislike about the product?
Bad Service if there is any ticket or issue is submitted
What problems is the product solving and how is that benefiting you?
It is helping to remediate CVE's and also in the pipeline to block CVE's.
Aqua Security: Protecting Your Cloud Journey, From Code to Production
What do you like best about the product?
It offers clear, actionable recommendations for fixing vulnerabilities. No more guesswork, just practical steps to improve security posture. It intelligently prioritizes risks based on severity and potential impact, saving me the time and effort of sifting through irrelevant alerts.
What do you dislike about the product?
Aqua's interface can be a little complex at times, and the initial setup requires some technical expertise and loads of document reading.
What problems is the product solving and how is that benefiting you?
Image, host scanning, and compliance.
Challenges using Supply Chain Security
What do you like best about the product?
B2B interactions - my interactions with Aqua employees have been friendly, attentive, and professional.
Supply Chain Security - background scanning of repos has been easy to wire up and has run reliably.
Supply Chain Security - background scanning of repos has been easy to wire up and has run reliably.
What do you dislike about the product?
B2B interactions - we've repeatedly been given expectations on feature delivery/timeline that aren't met.
Supply Chain Security - Current tooling doesn't support fine-grained triage of individual findings (e.g. marking false-positives). GH Actions integration broke or has worked inconsistently.
Supply Chain Security - Current tooling doesn't support fine-grained triage of individual findings (e.g. marking false-positives). GH Actions integration broke or has worked inconsistently.
What problems is the product solving and how is that benefiting you?
Supply Chain Security - identifying risks/vulnerabilities in our code and libraries, and aggregating information for informed decision-making
Great Product and Customer Support
What do you like best about the product?
Aqua offers a product that covers the many facets of security
What do you dislike about the product?
The Aqua portal and UI can sometimes be difficult to nagivate and identify the data you are looking for.
What problems is the product solving and how is that benefiting you?
Identifying security best practices in the Cloud and within our containerization platform.
room for growth a SAST oriented review
What do you like best about the product?
Remediation suggestions
categorization severity tabs
dependency list
Vulnerability list
Ease of implementation
Customer support
categorization severity tabs
dependency list
Vulnerability list
Ease of implementation
Customer support
What do you dislike about the product?
Improvement on false positives common SAST request so... whatever.
Historical understandings by various repos. To better understand where development could be consistently faltering. I'd like to drill down on a repo's history of fixes and flaws. Highlight what consistently reoccurs
IDE integration.
Have seen other solutions provide a code path of the flaw. This would be extra helpful to finding the base source of the issue. Or understanding the actual severity of the issue
Should add a jQuery version check to vulnerabilities. Known issues exist with older versions, security aggregate sites take points for older vulnerable jQuery versions.
A method to pick a set of issues and assign them to users/a method for users to pass to reviewers that integrate through 3rd party software like JIRA, Seems available in CSPM
minor: when creating a new suppression rule for a specific line. auto refresh the page so the added suppression is active in the count
Historical understandings by various repos. To better understand where development could be consistently faltering. I'd like to drill down on a repo's history of fixes and flaws. Highlight what consistently reoccurs
IDE integration.
Have seen other solutions provide a code path of the flaw. This would be extra helpful to finding the base source of the issue. Or understanding the actual severity of the issue
Should add a jQuery version check to vulnerabilities. Known issues exist with older versions, security aggregate sites take points for older vulnerable jQuery versions.
A method to pick a set of issues and assign them to users/a method for users to pass to reviewers that integrate through 3rd party software like JIRA, Seems available in CSPM
minor: when creating a new suppression rule for a specific line. auto refresh the page so the added suppression is active in the count
What problems is the product solving and how is that benefiting you?
Vulnerability and secret remidiations it was moderately successful with.
Powerful Software
What do you like best about the product?
It covers everything you need for container security, and the ability to have a self-hosted option.
What do you dislike about the product?
There is currently no parity of functionality between the cloud and self-hosted options.
What problems is the product solving and how is that benefiting you?
Secure our container-based applications before they are put in production.
showing 11 - 20