• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Cloud-Native Application Protection Platforms

Cloud-Native Application Protection Platforms Reviews and Ratings

What is Cloud-Native Application Protection Platforms?

Cloud-native application protection platforms (CNAPPs) are a unified and tightly integrated set of security and compliance capabilities, designed to protect cloud-native infrastructure and applications. CNAPPs incorporate an integrated set of proactive and reactive security capabilities, including artifact scanning, security guardrails, configuration and compliance management, risk detection and prioritization, and behavioral analytics, providing visibility, governance and control from code creation to production runtime. CNAPP solutions use a combination of API integrations with leading cloud platform providers, continuous integration/continuous development (CI/CD) pipeline integrations, and agent and agentless workload integration to offer combined development and runtime security coverage.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Cyscale
Cyscale
Logo of Singularity Cloud Security
Singularity Cloud Security
Logo of Upwind
Upwind
For 50M-1B USD Companies
Logo of Upwind
Upwind
Logo of Sysdig Secure
Sysdig Secure
Logo of Trend Vision One Cloud Security
Trend Vision One Cloud Security
For Asia/Pacific
Logo of Cyscale
Cyscale
Logo of Sysdig Secure
Sysdig Secure
Logo of Qualys TotalCloud
Qualys TotalCloud
Integration & Deployment
Logo of Cyscale
Cyscale
Logo of Wiz CNAPP
Wiz CNAPP
Logo of Singularity Cloud Security
Singularity Cloud Security

Product Listings

Filter by

Products 1 - 20 of 58
Sort by
Logo of Singularity Cloud Security

Singularity Cloud Security

By SentinelOne

4.7
(371 Ratings)

SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and forensics under one umbrella. The endpoint security product uses artificial intelligence to constantly adapt to new threats, offering real-time protection and automated response. The key principle of SentinelOne's security approach is to allow organizations to detect harmful behavior across multiple vectors, rapidly eliminate threats with an integrated response, and continuously adapt defenses against advanced cyber attacks. The company also provides a range of services such as threat hunting, incident response, and incident management.

Show More Details
Logo of CrowdStrike Falcon Cloud Security

CrowdStrike Falcon Cloud Security

By CrowdStrike

4.7
(355 Ratings)

CrowdStrike is a recognized entity in the cybersecurity space, specializing in enterprise risk management through the innovative application of technology. The company focuses primarily on protecting essential business risk areas such as endpoints, cloud workloads, identity, and data. Employing the state-of-the-art CrowdStrike Security Cloud and advanced AI technology, the firm provides effective solutions. Its CrowdStrike Falcon platform uses real-time indications of attack, threat intelligence, telemetry enhanced from diverse enterprise sources, and evolving adversary knowhow for high-grade detection, automated protection and healing, advanced threat tracking, and efficient vulnerability visibility. The Falcon platform, designed in the cloud with a singular lightweight-agent architecture, offers swift deployment, unique protection and performance, and reduced complexity. Therefore, CrowdStrike delivers a significant value proposition right from the beginning.

Show More Details
Logo of Sysdig Secure

Sysdig Secure

By Sysdig

4.8
(287 Ratings)

Sysdig is a cloud security company that focuses on runtime in order to both prevent, detect, and respond to attacks in real time. The company combines the ability to detect changes in risk using runtime insights, an AI-based architecture, and open source Falco. This technology base enables the company to correlate signals across cloud workloads, identities, and services to uncover hidden attack paths.

Show More Details
Logo of Wiz CNAPP

Wiz CNAPP

By Wiz

4.8
(264 Ratings)
customers choice 2025

Wiz is a company that aids organizations across various sizes and sectors to swiftly detect and eliminate crucial risks in AWS, Azure, GCP, OCI, Alibaba Cloud, and Kubernetes. This enables these organizations to develop quicker and with enhanced security.

Show More Details
Logo of Cortex Cloud

Cortex Cloud

By Palo Alto Networks

4.5
(245 Ratings)

Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.

Show More Details
Logo of Trend Vision One Cloud Security

Trend Vision One Cloud Security

By Trend Micro

4.7
(238 Ratings)

Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.

Show More Details
Logo of Orca Security

Orca Security

By Orca Security

4.6
(211 Ratings)

Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment.

Instead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace.

Show More Details
Logo of FortiCNAPP

FortiCNAPP

By Fortinet

4.4
(155 Ratings)

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details
Logo of Tenable Cloud Security

Tenable Cloud Security

By Tenable

4.8
(106 Ratings)
customers choice 2025

Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe.

Show More Details
Logo of Microsoft Defender for Cloud

Microsoft Defender for Cloud

By Microsoft

4.3
(105 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of Qualys TotalCloud

Qualys TotalCloud

By Qualys

4.8
(59 Ratings)

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings.

The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices.

Show More Details
Logo of Aqua CNAPP

Aqua CNAPP

By Aqua Security

4.1
(42 Ratings)

Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and runtime protection for security teams, Aqua helps customers reduce risk while building the future of their businesses. The Aqua Platform is a comprehensive Cloud Native Application Protection Platform (CNAPP). Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL.

Show More Details
Logo of Symantec Data Center Security

Symantec Data Center Security

By Broadcom

4.2
(32 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of Upwind

Upwind

By Upwind

4.8
(31 Ratings)

Upwind is a company focusing on cloud security during runtime. It operates a runtime-powered CNAPP (Cloud-Native Application Protection Platform) that uses runtime data to provide security for cloud infrastructure. The company's primary business problem it solves is risk mitigation and threat response. By identifying the root causes of threats, Upwind enables efficient and effective responses to security issues using context and automation.

Show More Details
Logo of Cyscale

Cyscale

By Cyscale

5
(29 Ratings)

Cyscale is a comprehensive cloud security platform designed to empower SMEs with the tools they need to mitigate risks and prevent threats. Our unified CNAPP platform offers real-time intelligence on cloud misconfigurations, vulnerabilities, identity and access management (IAM), and data security. With Cyscale, businesses can achieve strong cloud protection, ensuring compliance and protecting critical assets in an ever-evolving digital landscape.

Show More Details
Logo of AccuKnox Zero Trust CNAPP

AccuKnox Zero Trust CNAPP

By AccuKnox

4.5
(23 Ratings)

AccuKnox is a Zero Trust Cloud Native Application Security Platform (CNAPP) vendor. AccuKnox provides zero trust cloud security solutions across industries and business functions to help DevSecOps achieve their mission-critical priorities. AccuKnox was developed in partnership with SRI (Stanford Research Institute) and is anchored on seminal inventions in the areas of Multi Cloud Security, Anomaly Detection, and Data Provenance. AccuKnox simplifies the process of extending zero trust principles from identity and the network to the application and data layers. AccuKnox can be deployed in Public Company and Privately Held Cloud environments.

Show More Details
Logo of Red Hat Advanced Cluster Security for Kubernetes

Red Hat Advanced Cluster Security for Kubernetes

By IBM (Red Hat)

4.6
(16 Ratings)

Red Hat specialises in offering enterprise open source solutions. The main business problem it addresses lies within the domain of Linux, hybrid cloud, edge, and Kubernetes technologies. It operates using a communal collaboration method which allows it to provide efficient technological solutions. Its dedicated professionals play an integral role in the idea generation process and problem-solving, resulting in significant advancements in the field.

Show More Details
Logo of Sweet

Sweet

By Sweet Security

4.7
(15 Ratings)

Sweet Security is a Cloud-Native Application Protection Platform (CNAPP) designed to ensure full-stack security across your cloud environments. Utilizing lightweight eBPF-based sensors, Sweet specializes in real-time visibility, detection, and response capabilities that span cloud infrastructure, workloads, and applications. Built to minimize overhead, streamline investigations, and deliver high accuracy with low false positives, Sweet empowers security teams to respond to threats faster and more effectively.

Show More Details
Logo of Virsec Security Platform

Virsec Security Platform

By Virsec

4.8
(14 Ratings)

Virsec is a firm that provides a zero-trust protection platform designed for application workloads. The primary business problem it solves centers around enhancing security programs by offering immediate response to attacks and enabling continuous workload protection. Its ultimate aim is to eradicate the duration a threat remains undetected in a system, often referred to as dwell time.

Show More Details
Logo of Symantec Cloud Workload Protection

Symantec Cloud Workload Protection

By Broadcom

4.2
(8 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details

Features of Cloud-Native Application Protection Platforms

Updated September 2025

Mandatory Features:

  • Integration via API with hyperscale cloud platforms (including, at a minimum, Amazon Web Services [AWS], Microsoft Azure, and Google Cloud Platform [GCP]) and Kubernetes, to review and audit configuration and identity permissions for common misconfigurations that lead to security exposures.

  • Visibility into runtime states of workloads, either in real time or via point-in-time analysis, to discover security vulnerabilities and the presence of secrets and anomalous behavior in cloud workloads (virtual machines, containers and serverless), and use this to add context to cloud configuration findings.

  • Development operation workflows that provide risk analysis and prioritization of risk through the development life cycle of modern applications. At a minimum, the platform should provide infrastructure as code scanning and container registry scanning.

  • Solution is provided through a cloud-delivered “as-a-service” platform, rather than a loosely coupled portfolio of products.

Peer Lessons Learned for Cloud-Native Application Protection Platforms

Published January 2025

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Cloud-Native Application Protection PlatformsLessons learned by your peers shared on Gartner Peer Insights for Cloud-Native Application Protection PlatformsPeer Lessons Learned for Cloud-Native Application ProtectionPlatformsLesson 1LESSON1Define Cloud-Native Security Needs; GainStakeholder Buy-In for the CNAPPImplementationLesson 2LESSON2Run POCs to Test Vendors' Capabilities;Compare TCOs to Opt for the Best CNAPPLesson 3LESSON3Elevate Users' CNAPP Knowledge by ProvidingPractice Labs and In-Depth TrainingLesson 4LESSON4Plan Workflows and Set Up Cloud GovernanceFrameworks Ahead of CNAPP ImplementationLesson 5LESSON5Optimize CNAPP Implementation With Internal,Third-Party and Vendor's Supportn = 410Source: Reviews (410) submitted to Gartner Peer InsightsID: 6071763Gartner ®
Read Full Insights

Gartner Research

Market Guide for Cloud-Native Application Protection Platforms
Gartner Peer Insights 'Voice of the Customer': Cloud-Native Application Protection Platforms

Top Trending Products

CrowdStrike Falcon Cloud SecuritySweetMicrosoft Defender for CloudWiz CNAPP

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.