We have a wide array of applications. It extends beyond mere container and threat management; in fact, we extensively utilize it across all facets of our cloud data management. It offers comprehensive security for our entire infrastructure, encompassing containers, Kubernetes, cloud services, and more. Its scalability is particularly beneficial for our operations.
External reviews
External reviews are not included in the AWS star rating for the product.
Great auditing and streamlined compliance management with helpful support
What is our primary use case?
How has it helped my organization?
We receive Slack alerts for any vulnerable resources within our inventory. These alerts indicate if a particular resource is vulnerable and requires attention, ensuring timely action for remediation. Additionally, critical events are promptly communicated to us, enhancing our overall security posture.
Furthermore, we are provided with compliance metrics, allowing us to gauge our level of adherence to regulatory standards and guidelines.
What is most valuable?
Cloud Native Security's automation features have revolutionized our approach to cloud-native security, making it a standout solution in the market. With its seamless automation capabilities and timely alert notifications, Cloud Native Security ensures that we stay ahead of potential vulnerabilities, providing peace of mind in our dynamic cloud environment.
One of Cloud Native Security's greatest strengths lies in its ability to streamline compliance management. While specific controls are not directly provided, Cloud Native Security's automated assessment of our cloud and server infrastructure empowers us to maintain compliance effortlessly. The platform offers comprehensive insights into our compliance status, allowing us to identify areas for improvement and scale up our operations with confidence.
During our initial implementation, Cloud Native Security proved invaluable in tackling the challenges posed by our extensive resource inventory. By providing a detailed breakdown of resource utilization and associated vulnerabilities, Cloud Native Security enabled us to take proactive measures to enhance our security posture. The intuitive dashboard interface offers granular control and simplifies decision-making, sparing us the burden of manual inspections.
Cloud Native Security's automated auditing feature sets it apart, offering a comprehensive overview of our cloud resources with minimal effort. The asset inventory feature provides detailed insights into resource usage, ensuring that no stone is left unturned in our quest for security and compliance excellence. While there may be a slight learning curve initially, Cloud Native Security's user-friendly interface makes navigation a breeze over time.
The evidence-based reporting functionality of Cloud Native Security is a game-changer, allowing us to prioritize and address critical security issues efficiently. While occasional false positives may occur, Cloud Native Security's continuous improvement efforts ensure that such instances are minimal and swiftly addressed. Integration with our existing security infrastructure further enhances its capabilities, providing a holistic approach to our security strategy.
Overall, Cloud Native Security has been instrumental in fortifying our risk posture and facilitating our growth trajectory. With a significant reduction in mean time to detect issues and improved visibility for our development teams through DevSecOps integration, Cloud Native Security has truly become an indispensable asset in our security arsenal.
What needs improvement?
While we do encounter occasional false positives, we appreciate Cloud Native Security's efforts to address this issue.
In terms of improvement, we believe there's room for enhancing the comprehensiveness of their rule sets. Specifically, if we have unique requirements for our cloud security and need to establish custom rule sets, we require more comprehensive options than currently available. While Cloud Native Security has provided a feature for this purpose, its implementation is currently challenging. We see this as an area for improvement where Cloud Native Security could refine its offerings to better meet the diverse needs of its users.
For how long have I used the solution?
I've been using the solution for 1.5 years.
What do I think about the stability of the solution?
We have not found any glitches or suffered any downtime.
What do I think about the scalability of the solution?
Currently, we have approximately three platform engineers actively utilizing the solution.
The solution demonstrates excellent scalability and offers considerable flexibility.
How are customer service and support?
Technical support is good. They help us out on certain details. We can submit tickets in order to get assistance.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we didn't employ a different solution; instead, we relied on various open-source tools. While these tools weren't direct competitors, their functionalities didn't fully align with what we needed. Since adopting this solution, we've witnessed significant improvements in scaling our security measures effectively.
How was the initial setup?
The initial onboarding process for Cloud Native Security resources presented some challenges, albeit manageable ones. However, the deployment itself was remarkably swift, typically taking only 15 to 20 minutes. Incorporating Cloud Native Security into our original deployment was crucial for establishing permissions effectively. To manage power demand efficiently, we required running scripts consistently.
As a Software as a Service (SaaS) solution, deployment to multiple locations wasn't necessary. Cloud Native Security is hosted on their cloud platform, eliminating concerns about maintenance or internal management on our end. We can rely on the provider for seamless operation without the need for internal intervention.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair, as it is determined by the resources we utilize. We have the flexibility to adjust our resource usage according to our needs.
Which other solutions did I evaluate?
Prior to implementing this solution, we didn't assess any other options.
Currently, the market offers numerous products for cloud-native security. Despite the abundance of choices, we received excellent guidance with this solution. The support provided was invaluable, demonstrating their strength in customer success.
What other advice do I have?
As end users, we don't maintain a direct relationship with the company.
I highly recommend this solution to fellow users.
In terms of rating, I would give the solution a solid 9 out of 10.
Cost-effective, good support, and end-to-end coverage
What is our primary use case?
I consider it a cloud security posture management tool. It is being used for the overall posture of the environment.
By implementing Cloud Native Security, we wanted to monitor end-to-end misconfigurations. That is why we started with it. We are now also using one other module for detection and response, but mainly, we are using it to monitor misconfiguration and benchmark compliance.
How has it helped my organization?
It is pretty good. It has good coverage and a good reporting system.
There has been tremendous improvement since implementing Cloud Native Security. Cloud Native Security reports any misconfiguration that is there in the infrastructure. We do not have to go and check each service individually. It has helped a lot.
For compliance management, we can find the benchmark compliance status in Cloud Native Security directly. We do not have to do anything. Many benchmarks that we are supposed to follow are added by default. It is pretty easy for us to showcase compliance to anyone.
Misconfiguration detection has been the most effective for threat detection in our cloud environment. We are mainly focusing on the misconfiguration. I can see any configuration-related issues in all the modules.
Because it covers all the modules, every single aspect of the compliance has improved. We were able to find out the critical issues related to cloud infrastructure. It is a real-time monitoring system, so, at any time, we can check and confirm.
Cloud Native Security provides information about the exact affected area. We can easily locate a resource in a particular account or service. It is very clear from the Cloud Native Security report where to look for a particular misconfiguration. They have also added a graphical representation.
The reports tell us what is the impact, how critical it is, and how to locate the issue. That helps to prioritize things and fix a critical issue on an urgent basis. It is easy to analyze things from our side.
After implementing Cloud Native Security, we were able to implement so many best practices. Initially, we were getting different types of issues. We learned from those issues, and we are now implementing best practices based on that. We are also able to do real-time monitoring.
It has helped reduce the number of false positives we deal with. We are hardly getting any false positives. Previously, if we had four false positives, we now have only one false positive.
Cloud Native Security's ease of use and precision in detection have improved our risk posture a lot.
Cloud Native Security has saved our mean time to detect. It has saved a lot of our time. It has saved almost 95% of the time because we cannot go and check all the services in AWS. It is very vast. Cloud Native Security gives us specific information. There is no manual effort.
Cloud Native Security has not helped reduce our mean time to remediate because remediation depends on so many factors. It has nothing to do with Cloud Native Security. We are getting the issues, and the team is responding to them. After fixing them, there is a lot of improvement in the number of issues.
What is most valuable?
It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end. The other thing is the coverage. As far as I know, it has pretty good coverage.
It is very easy to use. I would rate it a nine out of ten for ease of use.
What needs improvement?
We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks.
For how long have I used the solution?
I have been using Cloud Native Security for around ten months.
What do I think about the stability of the solution?
It is stable. I would rate it a nine out of ten for stability.
What do I think about the scalability of the solution?
It is scalable. I would rate it a nine out of ten for scalability.
Overall, we have seven users of this solution, but at a time, we only have two active users. It is being used in a single location.
How are customer service and support?
Their support is good. Whenever we have doubts, we get proper support. We connect with them and resolve the issue. I would rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use any other solution. This is the first one.
How was the initial setup?
It is on the cloud. The implementation phase varies. It can take a few months.
It does not require any maintenance.
What's my experience with pricing, setup cost, and licensing?
I am not involved in the pricing, but it is cost-effective.
What other advice do I have?
I would recommend Cloud Native Security to others. Overall, I would rate Cloud Native Security a nine out of ten.
The intuitive dashboard and effortless ticket submission enhance the user experience
What is our primary use case?
Cloud Native Security helps us identify security issues related to cloud configuration and containers. We leverage cloud synchronization for real-time incident notification.
How has it helped my organization?
Cloud Native Security is easy to use. Its user-friendly features make integrating new tools a breeze. Everything can be connected through a simple API. The intuitive dashboard and effortless ticket submission further enhance the user experience.
One of Cloud Native Security's most valuable features is its offensive security engine. This engine excels at identifying vulnerabilities caused by misconfigurations, which could potentially be exploited by external attackers. In these cases, Cloud Native Security's offensive security engine findings are highly accurate, with a proven positive detection rate.
Cloud Native Security has helped reduce the false positive rate. The reduction in false positives has improved our operations.
As a small startup, implementing all security best practices across the organization can be challenging. Additionally, security awareness may not be widespread. However, Cloud Native Security, a cloud-based security tool, helps us address these limitations. Cloud Native Security acts as a vigilant watchdog, continuously monitoring our infrastructure for misconfigurations. This includes detecting unauthorized access attempts, such as someone opening a specific port or granting historical access from an external AWS account. By integrating Cloud Native Security with our Slack channel, we receive immediate alerts whenever such suspicious activity occurs. The notification will highlight the potential risk and provide details, allowing us to investigate and take prompt action. Previously, we unknowingly stored sensitive information, known as hard-coded secrets, in our public GitHub repository. Since integrating Cloud Native Security with GitHub, these secrets are identified immediately and flagged through Slack alerts. This enables us to address the issue swiftly and reduce our overall security exposure.
It is far more effective at reducing our meantime to detection compared to the open-source solution we used previously.
Cloud Native Security's findings have led to increased collaboration with our infrastructure team. While our application is a separate product and doesn't reside in the cloud, Cloud Native Security has still proven valuable in this way.
What is most valuable?
Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews. This helped my organization identify nearly 10,000 secrets added across our repositories, many of which had a significant security impact. Integrating Cloud Native Security with GitHub alone allowed us to identify all these secrets. This is a key feature that has been instrumental in improving our security posture through testing.
Secondly, Cloud Native Security's cloud SIEM feature has been essential in preventing our most critical security incidents.
What needs improvement?
We are experiencing problems with Cloud Native Security reporting. Our organization primarily uses Jira for issue tracking. While Cloud Native Security offers input options for reporting vulnerabilities, the "connect action" it provides to link issues isn't replicating information to Jira. This is happening for approximately half of the company and is causing difficulties for developers and stakeholders in fully understanding the reported issues.
Cloud Native Security's proof of exploitability is not that useful when it relates to container images. More detail should be included in the reporting.
Cloud Native Security can identify hard-coded secrets within our code and tell us if they're valid or not. However, in some cases, Cloud Native Security may flag a valid secret as hard-coded without specifying its exact location within the codebase. This lack of detail makes it difficult for developers to identify where the secret is used. Ideally, Cloud Native Security should provide the specific location of valid hard-coded secrets. This would significantly improve the developer experience by allowing them to easily locate and manage these secrets.
Cloud Native Security integrates with Jira and Slack through APIs, which is great. However, I would also like to see Cloud Native Security offer APIs that allow us to directly build dashboards within the platform. This would be incredibly helpful for visualizing vulnerabilities, security settings, and Cloud Native Security usage reports. Imagine if Cloud Native Security provided these APIs. We could create custom dashboards for specific purposes, like offensive security, cloud misconfiguration monitoring, or even integrating ISS scans. Essentially, any customer could easily build dashboards tailored to their needs. Unfortunately, Cloud Native Security doesn't currently offer this functionality. Other security products provide this level of customization. Adding this feature to Cloud Native Security would significantly improve its overall solution.
For how long have I used the solution?
I have been using Cloud Native Security for two years.
What do I think about the stability of the solution?
Cloud Native Security is extremely stable and we have not encountered any issues.
What do I think about the scalability of the solution?
Cloud Native Security is scalable.
How are customer service and support?
We contact technical support weekly. They are helpful and respond quickly. Additionally, there is a built-in chatbot that allows us to submit support tickets.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We also rely on AWS built-in features that alert us if there are any misconfigurations along with Cloud Native Security.
What's my experience with pricing, setup cost, and licensing?
Regarding the license model, I believe their approach is appropriate based on the customer workload data we're tracking. It seems like an ideal way to proceed.
For pricing, it currently seems to be in line with market rates. However, I recall Cloud Native Security charging a slightly higher premium previously.
What other advice do I have?
I would rate Cloud Native Security nine out of ten.
We receive notifications from Cloud Native Security whenever maintenance is required, and they provide instructions to complete the process.
New users should be prepared to have a dedicated staff member manage Cloud Native Security. This person will handle alerts, configurations, and integrations. You should continuously evaluate all the findings that Cloud Native Security provides, as it performs daily scans. However, it's possible to miss vulnerabilities that have already been fixed. Therefore, careful attention is needed when raising issues with developers. To optimize your use of Cloud Native Security and potentially reduce workload, consider providing feedback to improve the product. Additionally, try to utilize as many features as possible, as they can all have a positive impact on your organization's infrastructure.
It is easy to use, requires no configuration, and is agentless
What is our primary use case?
Cloud Native Security is a cloud posture management solution. Initially, it focused on helping us understand and assess our compliance posture and cloud configuration for workloads, etc.
There are three key use cases for Cloud Native Security:
- Continuous Configuration Monitoring: This ensures 24/7 oversight of configurations and identifies any issues as they arise.
- Asset Visibility: Gain immediate visibility of all cloud assets upon deployment and ensure they are properly tracked within the system.
- Container Security: Assess vulnerabilities in Docker clusters and other containerized environments based on compliance requirements.
How has it helped my organization?
I have used Prisma Cloud extensively at several organizations. We have also used Wiz and Cloud Native Security. Cloud Native Security is particularly easy to use because it requires no configuration. All we need to do is create an API key that connects to our cloud account, and it will automatically start identifying all the workloads and accounts associated with our master account. We can see them all listed on our screen. Cloud Native Security does not require any configuration beyond selecting what we want to see on the screen. On the other hand, Prisma Cloud which I used until about a year and a half ago was superior in some ways. However, the amount of data it generated was very high, and it produced a lot of alerts and events. This required trained personnel who understood our workloads and specific cloud environments to manage it effectively. Cloud Native Security is a low-maintenance product. It is pre-configured and requires minimal manual setup, making it ideal for small to medium-sized teams that don't have dedicated resources to manage individual security products.
Like any other product, every incident has its own unique characteristics. Incidents are typically classified into categories of critical, high, medium, and low. This classification is based on the nature of the vulnerability, the ease of exploitation including whether authentication is required, and the potential impact. There are many similarities to other scoring systems when you consider the underlying factors and the overall environment. This system resonates with me because it considers multiple factors beyond just the Common Vulnerability Scoring System. For example, it takes into account features or passphrases that are displayed on the screen or found on devices, and how that data is stored.
The current system incorporates some internal analysis, but it's minimal. While the overall classification is likely appropriate, the remediation guidance could be enhanced. Ideally, for each vulnerability, there should be clear instructions on how to fix it. However, some vulnerabilities might be relevant to an organization's specific use case. For example, a public IP address being accepted by an SQL server on Azure might be flagged as a vulnerability, but it could be a legitimate configuration for an organization that has a specific database configuration requiring access from multiple locations.
Cloud Native Security operates entirely agentless. Using just the API key on the master tenant provides complete coverage, regardless of the cloud platform we're using. We avoid agent-based solutions for a simpler and more efficient approach.
While evidence of exploitability in Cloud Native Security's reporting might not be crucial, it would be beneficial. If a vulnerability is actively exploited, we need a comprehensive solution to analyze the information and enhance our monitoring. However, that's just our perspective. In terms of Cloud Native Security's scanning ability, I find it limited. It displays the essentials, and the module essentially fills the attack map. However, it doesn't explicitly consider the exploitability index. Despite this, the existing exploitability scoring seems adequate. If a vulnerability can be exploited on our network which is simply a local network with zero authentication required, the complexity is factored in, and the vulnerability is classified as high, medium, or critical.
We leverage the offensive security engine to identify potential zero-day vulnerabilities that might be relevant to our workloads. Additionally, it helps us assess exposed configurations or misconfigurations that could be exploited by these vulnerabilities. While this engine is a valuable secondary source of data for improvement, it doesn't replace the independent solution we used previously. We primarily rely on that solution for information specific to our environment.
There are two main approaches to IaC scanning. One involves internal and Docker security modules. These modules analyze internal container images to identify vulnerabilities. For additional scanning, we leverage other products. We use Tenable and integrate it with CI/CD tools. This allows us to scan code dynamically and analyze traffic on a one-time basis. Additionally, PingSage assists in gathering data for IaC scanning.
Cloud Native Security significantly reduces the number of false positives we encounter. Unlike some other tools, it generates very few alerts that are ultimately unimportant low noise. I've rarely seen false positives from Cloud Native Security. While some Cloud Native Security alerts might be legitimate concerns, we can also suppress them if they're not relevant to our standard operations. This allows us to configure our cloud environment to focus on the most critical alerts.
Cloud Native Security has had a positive impact on our risk posture. As our only CSPM solution, it helps us with asset discovery, critical asset monitoring, and configuration issue detection and remediation.
Cloud Native Security has significantly reduced our average time to detection. Detection is almost always achieved in a single instance. We've confirmed this through multiple tests. The longest detection time we've encountered is around three to four hours. This extended timeframe occurs because the scan isn't running continuously. Instead, it operates at specific intervals, periodically examining our infrastructure and performing analysis. Consequently, the detection speed depends on when the misconfiguration happened relative to the next scheduled scan.
Our remediation process is entirely internal. Servers deliver the fix based on the severity assigned by Cloud Native Security, which is directly related to the vulnerabilities found. We then use our internal analysis to consider the environmental configuration. If the vulnerability is a zero-day in the user acceptance environment, we delay remediation until a later time. However, if it's found in the production environment, we address it immediately. We also prioritize remediation based on importance, so we see alerts related to production or pre-production instances first. The remaining vulnerabilities are addressed afterward.
Cloud Native Security has had a positive impact on our engineering functions, such as DevOps and the cloud infrastructure network team. It fosters a collaborative environment where teams can address alerts independently. This empowers engineers to take ownership and resolve issues promptly. DevOps is our primary user group, and Cloud Native Security helps them manage infrastructure, network, and CI/CD deployments efficiently.
Collaboration helps save time, particularly in engineering tasks related to infrastructure and technical deployment, rather than in development itself.
What is most valuable?
Cloud Native Security offers attack path analysis. This feature analyzes a combination of vulnerabilities, misconfigurations, and load balancer configurations to predict potential attack scenarios. This comprehensive picture helps us make informed investment decisions and determine appropriate security controls.
What needs improvement?
We requested additional capabilities as we began deploying and scanning beyond the initial setup. Specifically, we wanted the ability to:
- Continuously monitor configurations 24/7.
- Gain immediate visibility of all assets as they are deployed and ensure they are included in the system.
- Identify underlying configuration issues.
Another valuable enhancement is compliance management for various standards like ISO, PCI, HIPAA, GDPR, etc. As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
One area for improvement could be the internal analysis process, specifically the guidance provided for remediation. While the classification system itself might be industry standard, the remediation steps could be more specific. A vulnerability might be critical according to the scoring system, but its urgency depends on the context. For instance, a critical vulnerability signed by Cloud Native Security or any other product might be less urgent if it affects a non-production development environment undergoing UAT compared to a production environment.
For how long have I used the solution?
I have been using Cloud Native Security for almost eight years.
What do I think about the stability of the solution?
Cloud Native Security is a SaaS product and I've never experienced an outage. It's highly reliable and available whenever we need it. They have scheduled maintenance, but it's infrequent, typically only happening once or twice a year. Whenever there is maintenance, they provide advance notice, just like any other OEM would do.
What do I think about the scalability of the solution?
Scaling Cloud Native Security is straightforward. Creating a dedicated API team is the primary step, and this typically takes around five to ten minutes. Within a few hours, we'll see feedback integrated into our Azure and AWS consoles, along with the configuration of new alerts. Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource. This means it's elastic, with access to a vast amount of computing power and storage on the backend.
How are customer service and support?
Their technical support has become very reliable. They have grown from a small team to a large one, and initially, the founders themselves would handle deployments. Now, they have dedicated Customer Success Managers and configuration automation tools to ensure smooth deployments. Even if they don't have an immediate resolution to our problem, the team actively investigates and works on solutions.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
In the past, I've used Prisma Cloud and Wiz. While they were functional, Cloud Native Security offers several advantages. It's very cost-effective and requires minimal configuration, making it a great fit for my needs. As I move between companies, I'm always happy to recommend Cloud Native Security to new employers.
When evaluating security products, there are several key factors to consider. Return on investment, initial investment cost, and built-in functionality are all important. Cloud Native Security excels in these areas. Their licensing model is based on the number of integrated accounts, rather than complex metrics like nodes, clusters, or data volume. This simplicity makes Cloud Native Security easy to use and manage. Additionally, it offers faster performance compared to other solutions I've used.
How was the initial setup?
The deployment process is quick, taking only about five minutes. We simply need to meet with Cloud Native Security for setup. They will then guide us to the main portal and create an API key for us. On our end, we'll enable the key in our administrative console, whether it's Azure or AWS. Once that's done, the initial discovery scan will take approximately 90 minutes to two hours to run. After that, we'll start to see updates appearing in the portal.
What about the implementation team?
The implementation was completed in-house.
What's my experience with pricing, setup cost, and licensing?
There are different pricing models for software licenses. Some models are based on the individual number of assets a user has. Others consider the number of nodes, clusters, and accounts, with different pricing for each factor. I've also seen models that use the number of deployed APIs, endpoints, agents, or users. From what I've seen, Cloud Native Security seems similar. Their pricing appears to be based simply on the number of accounts we have, which is common for cloud-based products. This simplicity makes their pricing straightforward and potentially cost-effective.
What other advice do I have?
I would rate Cloud Native Security an eight out of 10.
While components like cloud configuration, central security, and management volume boast zero maintenance, we do encounter situations with Kubernetes. Occasionally, security issues or container-specific security problems might cause the cluster to disconnect. In these cases, we need to manually intervene by running a batch script to re-onboard the cluster. This is the only instance of internal maintenance required.
Before implementing Cloud Native Security, organizations should consider the specific security challenges they're facing. For organizations that are at least 80 percent cloud-based, a CSPM solution becomes essential. Even for hybrid organizations with on-premises and cloud components, cloud security offers advantages in terms of maintenance ease, reliability, and cost-effectiveness.
Key Considerations When Choosing a Security Solution:
- Use Case: What specific security risks are you trying to mitigate?
- Objectives: What are your security goals?
- Incident Response Needs: Do you require detailed event logging and extensive incident response capabilities?
Matching Use Cases to Solutions:
- Customization: Cloud Native Security excels in customization and can be tailored to meet specific needs. It's ideal for teams lacking extensive cloud security expertise to establish and refine security policies. While some organizations, including both large and small ones, might not require this level of control, it remains a valuable use case for others.
- Targeted Security Features: Different use cases call for different security features. Container security or vulnerability management might be your primary concern. In some cases, Cloud Native Security's vulnerability management can be used as a complementary solution alongside a more comprehensive primary tool.
Ultimately, the decision comes down to your specific needs and deployment model. Don't get caught in the trap of seeking a one-size-fits-all solution. Consider your security team's capabilities and whether Cloud Native Security can truly replace them or if it would function best as a complementary tool.
Is easy to deploy, helps reduce our mean time to detect, and actively identifies threats
What is our primary use case?
We currently use Cloud Native Security for cloud security posture management, leveraging both the CWP module and the authentication security tab. While we regularly utilize these features, we're planning to onboard the cloud detection and response module, along with the ISIS scanning functionality.
We implemented Cloud Native Security as a secondary control measure to complement our existing security posture. In our Prisma Cloud environment, we have a detection score threshold set at 70 or above. As Cloud Native Security was a new entrant in the market, we wanted to evaluate its capabilities. Fortunately, Cloud Native Security's unique features and policies proved valuable. For instance, Cloud Native Security detected an alert when a developer accidentally committed VS Code files to a public GitHub repository. This helped us promptly remove the VS code from GitHub.
How has it helped my organization?
Cloud Native Security is easy to use.
The feature that has been most effective in threat detection for our cloud environment has been the cloud visual attack tab.
Our cloud security is managed by Intel and Azure Entra. We download a report from them and send it to our team to address any identified issues.
I appreciate that Cloud Native Security incorporates evidence of exploitability into their reports, making them more reliable.
Cloud Native Security's offensive security engine excels at validating potential exploit paths and prioritizing the most critical vulnerabilities. This enables us to proactively identify and address these risks, ultimately strengthening our security posture.
Cloud Native Security has helped reduce our false positives. We can investigate and mute any false positives so they don't appear going forward.
Cloud Native Security helps us actively identify threats, ultimately improving our security posture.
Cloud Native Security has reduced our mean time to detect by 10 percent.
Cloud Native Security facilitates collaboration between our cloud security application developers and AppSec teams. This collaboration is further enhanced by a shared console that provides visibility into all active tickets. This transparency helps to reduce redundant requests, saving time.
What is most valuable?
Cloud Native Security offers a valuable tool called an offensive search engine. This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen. Additionally, Cloud Native Security offers a feature called Graph Explorer. This feature allows us to drill down into specific resources, search for them on the console, and view details such as open security rules and graph features.
What needs improvement?
While only 5 percent of our workload resides on the Google Cloud Platform, we would still like Cloud Native Security to be configured with automatic remediation capabilities for GCP.
In Prisma, there's a dedicated tab for managing high and medium-severity alerts. This allows us to easily enable or disable specific policies based on our current needs. With Cloud Native Security, we can't selectively enable or disable alerts based on our specific use case.
For how long have I used the solution?
I have been using Cloud Native Security for six months.
What do I think about the stability of the solution?
I would rate the stability of Cloud Native Security 7 out of 10.
The only downtime we had was when switching from V1 to V2 but it was smooth.
What do I think about the scalability of the solution?
I would rate the scalability of Cloud Native Security 8 out of 10.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
For the past three years, Prisma Cloud has been our go-to security solution. Recently, we've added Cloud Native Security to our toolkit to further strengthen our security posture.
How was the initial setup?
The initial deployment was straightforward. First, we onboarded the UAT account. Then, we added our product support account and other accounts. We then tested the UAT environment accounts. The entire deployment took one week to complete. Two people were involved in the deployment.
What other advice do I have?
I would rate Cloud Native Security 9 out of 10.
Our primary cloud security monitoring solution is Prisma Cloud by Palo Alto Networks, with Cloud Native Security as a secondary control measure.
We have 19 users overall in our cloud security team that utilize Cloud Native Security.
The only maintenance required is for updates.
I would recommend Cloud Native Security to others.
Covers all aspects of cloud security and costs less than other solutions
What is our primary use case?
We are using Cloud Native Security for cloud posture management and cloud workload protection. Apart from this, it also provides alerts from infrastructure as code. If the tool finds any misconfiguration, it triggers that as an alert, and that gets collected in Jira.
How has it helped my organization?
Previously, we were using AWS services, but we were not getting the alerts in Jira. When Cloud Native Security was introduced to us, we wanted it to automatically create Jira tickets, and we wanted custom alerts. These were the two areas that we shared with them, and they stood out in these aspects. We decided to take it ahead, and we have been using it for the last two years. I feel a lot of difference in the security posture development. When we share the tickets with the developers, they work on that, and we have tracking of them in Jira. We wanted to track alerts in Jira. We no longer have situations where we flag an issue and it does not get resolved on time.
We use agentless vulnerability scanning. The process that Cloud Native Security follows is that you have to deploy the cloud permission template in your account, and then it creates a role that tracks or scans all the resources and finds if there is any misconfiguration. We have integrated Cloud Native Security with Jira. It triggers alerts on Jira. A person is assigned to an alert, and the concerned person is notified. As a security team, we collect those tickets and forward them to the respective team.
Previously, we were not able to track those tickets, whereas now, we are getting automated Jira tickets. It has solved our biggest problem. We are expecting the same from Cloud Native Security in the future. We expect that it will capture the triggers or alerts. If any new security vulnerability is found, it will also flag that to us.
It provides an overview of our security posture. If a metrics endpoint is public for any domain, that gets triggered. We get reports for different domains, such as Kubernetes security and vulnerabilities management, IaC scanning, or cloud detection and response. Cloud Native Security covers all of these. There is also a graphics tool where we can get all the details in a graph. All the Kubernetes microservices get scanned in the workload protection. The Cloud Workload Protection module detects all the cluster misconfigurations and other things. It also gives you alerts on the containers. We were looking for such a tool with all the cloud security modules.
We can also create our own custom policy. For example, if we do not want to enable the recommended Cloud Native Security policies for our company, we can create our own policies. This feature is very helpful.
We use Infrastructure as Code (IaC) scanning. It follows all the features for shift-left. We get all the alerts for IaC scanning. For example, if TerraForm is not performing any security checks in the template, that gets triggered. We also get information about any vulnerabilities related to IaC.
We have not got any false positives with Cloud Native Security so far.
Cloud Native Security has affected our risk posture. It shows us our risk areas. As an organization, we look for cloud security tools that can manage all the areas, and Cloud Native Security is doing a good job in managing all the things.
Cloud Native Security has reduced our mean time to detect. The detection time of Cloud Native Security is quite good. It takes half an hour for critical alerts and one hour for high alerts. These are the SLAs that we have. The detection time is quite good.
Cloud Native Security has also reduced our mean time to remediate. We have defined our SLAs as well. In our organization, we define the SLAs and share them with the developers or the DevOps team so that they can follow them. They work on the assigned issue, and if there is any issue, they come back to us.
What is most valuable?
I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us.
Apart from the posture management, I like the UI. It gives a holistic view of all the alerts and the accounts from where they are triggered.
Cloud Native Security is quite easy to use. It is user-friendly. As compared to other tools, it is more user-friendly, and its cost is also less than the other tools. It provides the same visibility that the other tools are providing in the market.
What needs improvement?
They can add additional modules to see scanning alerts. Adding additional modules will give us a better view.
They can work on policies based on different compliance standards.
They can add more modules to the current subscription that we have. If they can merge some of the two modules, it would be great. For example, if they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
For how long have I used the solution?
It has been around two years since we have been using this product.
What do I think about the stability of the solution?
It is a stable product. I would rate it a 10 out of 10 for stability.
What do I think about the scalability of the solution?
It is scalable. I would rate it a 10 out of 10 for scalability.
Our security team uses this solution. We have five to six people on the security team. Overall, we have 600 people.
Which solution did I use previously and why did I switch?
Previously, we were using AWS services, but there was no dashboard. That was where we had an issue. We wanted a cloud security tool that matches our requirements and provides the same thing in a holistic view and a better manner. That is why we went for Cloud Native Security. It has now been acquired by SentinelOne. We are getting the same product even after the acquisition.
How was the initial setup?
It is deployed on the cloud. It took us about a week to implement all the features. It was very easy. They were very user-friendly.
In terms of maintenance, they do inform us when the maintenance will be going on.
What about the implementation team?
We had two people involved in its deployment.
What's my experience with pricing, setup cost, and licensing?
It is not that expensive. There are some tools that are double the cost of Cloud Native Security. It is good on the pricing side.
Which other solutions did I evaluate?
We started doing POC with Cloud Native Security, and we liked it. We did not think of any other product. It also had better pricing than any other product.
What other advice do I have?
I would recommend Cloud Native Security as a cloud security solution. They are doing an excellent job of providing the features that we require for cloud security posture management.
I would rate Cloud Native Security a 10 out of 10.
They are constantly improving their UI, Scanning and Vulnerabilities detection capabilities by adding and updating plugin engines and also other features like evidence based reporting.
What is our primary use case?
Cloud Native Security is a CSPM platform we use for cloud security. It checks for vulnerabilities in our web applications and cloud configurations. It also detects infrastructure-as-code issues. Additionally, it scans to find secrets in our code before it goes live.
Cloud Native Security identifies vulnerabilities before any bad actor can exploit them. We know if there's a misconfiguration in the cloud or vulnerabilities in our cloud-hosted applications. Kubernetes security is also a component. It also has multiple benchmarks for compliance with security regulations.
How has it helped my organization?
Since implementing Cloud Native Security, our risk posture has greatly improved. We are more compliant now. It has built-in compliance benchmarks for various regulatory standards. We were around 60 percent compliant when we started, and now we're at more than 95 percent.
Cloud Native Security has reduced our mean detection time by continuously scanning and sorting issues into high, medium, and low priority. We can easily detect things before the wrong person finds them. The solution reduces our remediation time, but it varies depending on the team. We address critical issues immediately. Cloud Native Security's rescan capability is good because we can rescan in a few minutes to know whether the issue has been fixed.
Cloud Native Security enables more collaboration between the security team and developers. The solution allows everyone to view the dashboard, so we can integrate more users and project teams. Everyone can look at the Cloud Native Security dashboard and see which issues are in their repositories or buckets. It's easier for everyone to work together to address issues.
It saves a lot of time because we would need to look for secrets manually without Cloud Native Security. Searching for cloud misconfiguration issues is also time-consuming and hard to do correctly because our infrastructure is huge. It's inconvenient for the security team to check manually and do penetration testing of every component
When we initially integrated Cloud Native Security, we used to get some false positives, but it was manageable. Now, I rarely see any false positives because Cloud Native Security has improved its tool. We've given them a lot of feedback to help them differentiate between false positives and hits. It was a lot of manual work, but that has gotten better.
What is most valuable?
Cloud Native Security is user-friendly. Everything in Cloud Native Security is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features. Recently, they added evidence-based reporting abilities. It tells us exactly where the issue is and gives us links to the endpoint and screenshots.
It allows us to scan for vulnerabilities and rate limits without deploying agents. Cloud Native Security allows us to set those values according to our server capabilities and preferences. We can also decide how many cluster images to scan.
The infrastructure-as-code feature is helpful for discovering open ports in some of the modules. It will tell us precisely where the port is open, including the repository and source code. Thus, we know that a port is open on that particular line. After integrating Cloud Native Security into our organization's system, we identified many thousands of secrets that are pushed into the source code.
What needs improvement?
We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization.
The offensive security engine is pretty good, but I can't say it's complete. I rate it seven out of ten. Cloud Native Security's specialty is cloud security, so the offensive security does lack a few things. We cannot rip reports like Tenable, Qualys, and all those vulnerability scanners, but it identifies some sensitive issues like exposed APIs. Some other issues are not identified, like access, but it does detect sensitive information exposure.
For how long have I used the solution?
We have used Cloud Native Security for two or three years.
What do I think about the stability of the solution?
I haven't had any issues with Cloud Native Security's stability. However, we once saw a spike in CPU consumption when they implemented a new feature. We contacted Cloud Native Security, and they addressed it in a day.
What do I think about the scalability of the solution?
Cloud Native Security is highly scalable.
How are customer service and support?
I rate Cloud Native Security support nine out of ten. Their tech support is excellent. We have a dedicated person that we can contact directly. They recently introduced a new tool where we can chat with support directly from within the tool.
How would you rate customer service and support?
Positive
How was the initial setup?
Cloud Native Security is a SaaS solution, and the onboarding is straightforward. They have a good knowledge base, and it's easy to integrate it. You can get it up and running in under a day or two.
What was our ROI?
Cloud Native Security does offer ROI. We have used Cloud Native Security for more than three years, and we are stoked about the value the solution offers to our organization.
What's my experience with pricing, setup cost, and licensing?
Cloud Native Security doesn't cost much, so it's worth what you're paying, and the ROI is excellent.
What other advice do I have?
I rate Cloud Native Security nine out of ten. I would recommend it because many of the solutions that provide capabilities like secret scanning, cloud configurations, and offensive security charge by module, and the costs are pretty high. Cloud Native Security is more cost-effective, so I would recommend it. Also, the amount of issues Cloud Native Security detects is good.
The offensive security feature is something no other product offers
What is our primary use case?
We adopted Cloud Native Security for its offensive security engine, which no other tools provide. It checks to see if any file or domain has public access. We also use it for cloud configuration scanning. Now, we are integrating it with cloud detection and response and plan to integrate it with CloudTrail and logs. Multiple team members use the solution. Our cloud security team has more than 10 members. We sometimes forward issues to the application team.
How has it helped my organization?
When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks.
Compliance management is critical for every organization. Our compliance score was pretty low when we started using Cloud Native Security. Now, we've started seeing improvement every quarter. We're around 85 to 95 percent compliant. When we see any alerts related to configuration, we raise a ticket with our follow-up team unless the issue is resolved automatically. We eliminate false positives and identify and work on any problems with our policies or other issues.
Cloud Native Security has reduced our detection time by 15 to 20 percent through automation. The solution makes it easier by showing every impacted resource on a single dashboard. If we didn't have an automated tool to show us all the affected assets, we wouldn't know what's happening on every server or the resources we have created. Without this solution, we had to go to the documentation page for every cloud provider and implement the change. Now, we can check a single dashboard to get an overall idea of how something impacts our resources, and it helps us to automate.
The solution has improved collaboration between our teams regarding security posture. We can say to the cloud security team that they need to follow a particular posture-related practice or adopt a network configuration, like blocking public access to a resource. We give these requirements to the network development and application teams.
Cloud Native Security has reduced our vulnerabilities and misconfigurations, improving our security posture. We had about 10,000 alerts when we started, but we brought that down to around 500. That was a considerable improvement in six months.
What is most valuable?
I have worked on most of the tools in the market, and every product has distinctive features. Cloud Native Security's standout feature is offensive security. That's something no other product offers. All the other products have the same core features, such as vulnerability scanning.
The UI is user-friendly, and the recommendations are easy for everyone to understand. If any misconfiguration happens, all four teams can read the options and understand how to implement them. To achieve these goals, we can also create an automated template according to cloud security best practices
SecOps plays a crucial role in our deployment and testing in the software lifecycle. In the course of building and deploying our applications, we need to look at our vulnerabilities and configurations. It's easy to identify these things and fix them before deployment by integrating Cloud Native Security.
The solution's evidence-based reporting is helpful because it provides real-time information. If a file has been opened and we haven't provided access, it gives us the evidence. It tells us the domain, and we try to investigate by going to the team that owns the file. We require them to make the file private, so it can't be accessed from the internet.
What needs improvement?
Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email.
For how long have I used the solution?
We started using Cloud Native Security last year.
What do I think about the stability of the solution?
Cloud Native Security doesn't have any bugs or glitches. It's fairly stable.
What do I think about the scalability of the solution?
I rate Cloud Native Security nine out of ten for scalability.
How are customer service and support?
I rate Cloud Native Security support nine out of ten. They have email support, but there is no option to raise tickets from within the portal. Now, they have Intercom, and we raise tickets through that.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Prisma Cloud, which has many of the same features, such as cloud-based configuration, Kubernetes scanning, vulnerability assessment, etc., but Cloud Native Security has the Offensive Security Engine. That is the main reason we switched.
How was the initial setup?
Our organization started with a POC for a month and a half before presenting Cloud Native Security to our VP and senior leadership. They gave us the go-ahead, and we finalized the product. It took us less than a week to implement, but the deployment time depends on the organization. It might take time if they need to get approval from leaders.
What's my experience with pricing, setup cost, and licensing?
I rate Cloud Native Security seven out of ten for pricing. It's cheaper than many other products.
What other advice do I have?
I rate Cloud Native Security nine out of ten. It's a mature solution that includes all the features found in other products on the market.
Helps improve our cloud security monitoring processes, streamline compliance management, and reduce detection time
What is our primary use case?
Our Cloud Native Security use cases depend on the type of SQL server we use. Currently, we need to check all cloud-based configurations directly. Cloud Native Security helps us identify SQL configurations on our local PCs.
How has it helped my organization?
Cloud Native Security has improved our cloud security monitoring processes. We can now capture all issues and misconfigurations in real-time, allowing us to respond quickly.
It streamlined compliance management for our organization. They schedule a meeting with us every month to discuss any requirements on our end, such as updating the Cloud Native Security version. For example, one time they informed us that we needed to update to Cloud Native Security version four. We inquired with their customer support team, who were very approachable and requested them to implement the cloud version of Cloud Native Security version four into our Cloud Native Security dashboard. They implemented it within five to six days. We were happy to adopt the enhanced security controls of Cloud Native Security version four. The customer success team and the customer-facing teams were very helpful and provided us with the best solution. This is why we chose Cloud Native Security. They are a well-established CSPM company in India with a proven track record of assisting businesses with compliance requirements. By onboarding Cloud Native Security, we gained a cloud-based configuration management system for our workloads.
It's easy to use.
Our cloud security issues are already automated using a common subscription ticketing tool to capture them. Reports are then sent to both the internal DevOps team to identify potential false positives and the business team to assess if resolving the issue aligns with business requirements.
Cloud Native Security's event-based evidence reporting should include proof of exploitability. This would allow users to easily identify misconfigured areas in the graph and click on a provided link to conveniently be redirected to the cloud service provider management console page for more details.
Cloud Native Security's offensive security engine proved valuable recently. When an endpoint was mistakenly exposed, it automatically captured the unauthorized request in the cloud and sent an alert to our email address. This notification allowed us to take swift action and restrict access to the URL on our network.
The AI helps us handle the hundreds of audits each year helping to enhance our security posture.
Cloud Native Security's access to the IIM role in the cloud formation template significantly reduces false positives, thereby maximizing the number of true positives.
Cloud Native Security helps us improve our risk posture, failover capabilities, and compliance levels.
Cloud Native Security reduces our MTTD. We are alerted within seconds on the dashboard and email of the detection.
To assess our MTTR, we need to consult with the DevOps team and conduct an impact analysis. If the impact analysis reveals no disruption to the production application within the AWS network architecture, we can proceed with remediation immediately. However, if the analysis identifies a potential impact, obtaining management approval will add to the resolution timeframe.
Cloud Native Security improves collaboration between our cloud security application developers and AppSec teams. It's particularly helpful for AppSec because we can leverage cloud security controls directly from Cloud Native Security. This also allows us to mitigate cloud misconfigurations.
What is most valuable?
Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities.
What needs improvement?
In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams.
For how long have I used the solution?
I have been using Cloud Native Security for six months.
What do I think about the stability of the solution?
Cloud Native Security is stable.
What do I think about the scalability of the solution?
The scalability of Cloud Native Security is good.
How are customer service and support?
The technical support is the best. They can integrate our suggestions for security control into Cloud Native Security within three days.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment took one week. The deployment was completed by one person from our team along with a tech team from Cloud Native Security.
What's my experience with pricing, setup cost, and licensing?
Cloud Native Security is priced reasonably for our workload.
What other advice do I have?
I would rate Cloud Native Security ten out of ten.
We have a large number of users of Cloud Native Security in our organization.
I recommend Cloud Native Security to others.
It provides valuable insights into security best practices tailored for businesses leveraging cloud infrastructure to host their applications.
What is our primary use case?
Our company relies on Cloud Native Security to fortify the security of our cloud accounts spanning various environments, such as AWS, AZURE and Google Cloud. Cloud Native Security provides timely alerts upon identifying vulnerabilities within our cloud infrastructure services, such as security groups and data encryption, empowering us to prioritize and address them promptly.
How has it helped my organization?
Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it.
Since implementing Cloud Native Security, our security team has engaged in robust discussions on enhancing compliance with key regulatory standards such as SOC, ISO, and other pertinent IT infrastructure-related guidelines. As a result of these proactive measures, our security posture has seen a remarkable improvement, reflecting our commitment to maintaining a secure and compliant environment.
Cloud Native Security plays a major role in compliance. IT companies must maintain our company's security level to achieve ISO-based certifications. We are so proud of the changes we have made using Cloud Native Security. We've implemented many of the controls Cloud Native Security recommended, helping us maintain a high security standard. Fintech companies must maintain security best practices overall in our infrastructure.
Cloud Native Security offers suggestions about best practices for security, and we've implemented them all. It's helpful for companies hosting their applications in the cloud configuration. This tool enables us to record unauthorized actors or security failures. Everything is reported in Cloud Native Security, allowing us to rectify mistakes and misconfigurations.
When security threats occur, Cloud Native Security immediately alerts us through various communication channels. It has several modules, including cloud misconfigurations, container security, Kubernetes, vulnerability management, infrastructure code scanning, and cloud detection and response. It also tells us when unauthorized API calls are occurring. Everything is recorded in Cloud Native Security, and it alerts us about what is happening in the account. The detection time for critical alerts is almost instant. We'll see it in under two minutes.
The solution saves the company a lot of time. Responding to alerts can take up a lot of our team's bandwidth. But there is a feature of their remediate that helps the bandwidth of our engineering team to fix the issues when we used Cloud Native Security as a team member. They helped us fix the issues and saved a lot of bandwidth for our team.
What is most valuable?
My top preferences revolve around infrastructure-as-code scanning and Kubernetes security. With infrastructure-as-code scanning, we catch errors or inadvertent inclusion of sensitive data in our code prior to deploying infrastructure via Terraform. As we continue to leverage Terraform for infrastructure deployment, alongside embracing new technologies to stay aligned with industry advancements, these features play a pivotal role in maintaining our security standards and workflow efficiency.
Cloud Native Security helps us detect vulnerabilities when deploying infrastructure. We use Cloud Native Security to monitor all our cloud infrastructure and accounts. It continuously scans whether or not we have the agent installed. It's something like a role. You can configure an IAM role that provides access to Cloud Native Security to scan. It enables seamless connectivity with any cloud environment.
The Offensive Security Engine has helped us to discover some breaches.
You can see across the cloud domain in Cloud Native Security. For example, the dot com map can cover multiple servers internally. Cloud Native Security flags all URLs exposed to the public and other vulnerabilities. When we get alerts from the Offensive Security Engine, it has some internal debugging tools the developers can use.
What needs improvement?
The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud.
For how long have I used the solution?
I have used Cloud Native Security for three years.
What do I think about the stability of the solution?
Cloud Native Security is highly stable.
What do I think about the scalability of the solution?
Cloud Native Security is scalable.
How are customer service and support?
I rate Cloud Native Security support nine out of ten. They solve issues within the agreed-upon period. They're impressive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used the native AWS tools like Inspector. Cloud Native Security is impressive compared to those.
How was the initial setup?
It's easy to integrate Cloud Native Security and onboard all our cloud accounts. Before implementing, we tried to have all the security best practices in place. If you do that, it's easier to fix the vulnerabilities when Cloud Native Security detects them. Deployment took about five or six minutes.
What's my experience with pricing, setup cost, and licensing?
We opted for Business Plan at an affordable rate, providing excellent value for your investment. While I'm not entirely certain, I believe the monthly cost is around 180,000 rupees.
Which other solutions did I evaluate?
We looked at Trend Micro and some other options.
What other advice do I have?
I rate Cloud Native Security nine out of ten. Use this tool if you want to keep your cloud applications secure.