Our primary use case for Sysdig Secure is runtime threat detection and vulnerability management.
External reviews
External reviews are not included in the AWS star rating for the product.
Runtime threat detection has improved and security teams prioritize real Kubernetes risks
What is our primary use case?
What is most valuable?
The best feature Sysdig Secure offers is threat detection.
The threat detection feature on Sysdig Secure stands out compared to other solutions I have seen or used because Sysdig sees the actual behavior inside the container or kernel and correlates it with Kubernetes infrastructure, which makes detection both earlier and more precise in a cloud-native environment.
Sysdig Secure has positively impacted our organization by improving visibility into our Kubernetes environment and focusing on real risk, which has reduced alert noise, improved threat detection at runtime, and made vulnerability management more efficient by prioritizing issues that actually affect running workloads.
What needs improvement?
Sysdig Secure works well for us, but there are a few areas for improvement, such as the alerting and notification system being more flexible for complex workflows, and some dashboard and reporting features could be more customizable to match specific team needs.
For how long have I used the solution?
I have been using Sysdig Secure for three years.
What do I think about the stability of the solution?
Sysdig Secure is stable.
What do I think about the scalability of the solution?
Sysdig Secure scales well with growth and increased workloads, especially in Kubernetes and cloud-native environments, as the agent collects data efficiently and the back end can aggregate and analyze events across many nodes and namespaces.
How are customer service and support?
Our experience with Sysdig Secure customer support has been positive, as they have been responsive and provided useful guidance whenever we had questions or needed help.
Which solution did I use previously and why did I switch?
We previously used commercial point tools, but we switched to Sysdig Secure because we wanted a more unified platform that combines runtime threat detection, vulnerability management, and compliance into a single solution.
How was the initial setup?
We have seen a noticeable reduction in false positives due to better rule tuning and Kubernetes context, and incident response time improved because alerts are more actionable and include full runtime context, allowing faster triage and investigation.
What was our ROI?
We have seen a measurable return on investment with Sysdig Secure, as it has reduced the time spent on incident investigation and vulnerability triage.
What's my experience with pricing, setup cost, and licensing?
Our experience with Sysdig Secure pricing and licensing has been generally positive, with costs aligned with the value we get from the platform, requiring some initial engineering effort for agent deployment and policy tuning, but overall it was not overly complex.
Which other solutions did I evaluate?
We evaluated several other solutions before choosing Sysdig Secure, including Aqua, Prisma Cloud, and Lacework, ultimately choosing Sysdig Secure for its strong Kubernetes-native runtime visibility and unified platform for vulnerability and compliance.
What other advice do I have?
My advice for others looking into using Sysdig Secure is to clearly define your primary use case before getting started, whether it is runtime detection, vulnerability management, or compliance. I would rate my overall experience with this product as an eight out of ten.
Vulnerability tracking has improved and pipeline checks now keep container images compliant
What is our primary use case?
My main use case for Sysdig Secure involves deploying microservices that contain a lot of Docker images, and Sysdig Secure helps me identify the vulnerabilities associated with these images and provides me the fix version for them, which is really helpful in staying on track of our vulnerability weaknesses.
I can use Sysdig Secure along with our CI/CD pipeline as a stage to ensure that even when the code has been checked into the repo, it has been checked for quality, specifically to ensure that the resultant image has no vulnerabilities.
What is most valuable?
The best features Sysdig Secure offers include a very intuitive UI that clearly shows me what images have what vulnerabilities and how I can fix them, indicating where the issues are and what I should upgrade to, thus helping us stay ahead of all the vulnerabilities.
Sysdig Secure's API is a main feature I have used, allowing me to integrate it to scan a list of images and output the result in the form of an Excel sheet or a CSV with details on high vulnerability criticality, making it useful in a GitLab project to ensure that new images added to the repo do not have any critical vulnerabilities.
Sysdig Secure has positively impacted our organization by helping us keep track of the vulnerabilities in our images, making it easy to manage and upgrade the packages we need based on the clear guidance Sysdig Secure provides on what to do and where.
In terms of measurable outcomes, I have seen a reduction in vulnerabilities, as Sysdig Secure can tell us how many vulnerabilities are present on a day-to-day report basis, which has improved our efficiency by more than 50% and helps us stay compliant with necessary regulations.
What needs improvement?
I wish Sysdig Secure could enhance their outreach to more platforms so their APIs are easily accessible for personal or professional projects, and I have noticed a few bugs in the UI to fix version filtering that I hope they will address in upcoming releases.
I give it an eight because of the bugs, specifically the fix version bug where sometimes there is no fix version shown, and I wish Sysdig Secure offered a personalized UI that users could tailor to their daily workflows, making navigation more efficient based on their specific role and tasks
Sysdig Secure does everything from a detection point of view, telling me the vulnerabilities I have and where they are located, and I believe that if Sysdig Secure creates an LLM tool that could automatically fix those vulnerabilities in the repo, it would be really helpful.
For how long have I used the solution?
I have been using Sysdig Secure for about seven to eight months or more, and we have been using it for our vulnerability management.
What do I think about the stability of the solution?
Sysdig Secure is pretty stable in my experience.
What do I think about the scalability of the solution?
For my use case, Sysdig Secure handles growth and increased workloads well.
What other advice do I have?
My advice for others looking into using Sysdig Secure is to evaluate your options, but Sysdig Secure appears to be a good deal. I give Sysdig Secure an overall rating of eight out of ten.
Secure your container with sysdig secure
Enhancing Cloud Security with Real-time Threat Detection
Robust Security Insights with Clear Visualizations
Efficient security platform
It's great, we would recommend to our friends and colleagues
Focus on cloud-native protection and robust detection capabilities improves monitoring
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Neutral