• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • Conversational AI Platforms
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Planning Software
      • Financial Close and Consolidation Solutions
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Government ERP Solutions
      • Citizen Service Delivery
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Search and Product Discovery
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      69 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Game Engine Software
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • AI-Augmented Code Modernization Tools
      • Virtual Reality Development Software
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Green Software Engineering
      • Event Brokers
      • Application Integration Platforms
      • Digital Twin of an Organization Platforms
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • AI Agent Development Platforms for Software Engineering
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • Load Testing Tools
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Value Stream Management Platforms
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • API and MCP Testing Tools
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Cloud-Native Application Protection Platforms

Cloud-Native Application Protection Platforms Reviews and Ratings

What is Cloud-Native Application Protection Platforms?

Cloud-native application protection platforms (CNAPPs) are a unified and tightly integrated set of security and compliance capabilities, designed to protect cloud-native infrastructure and applications. CNAPPs incorporate an integrated set of proactive and reactive security capabilities, including artifact scanning, security guardrails, configuration and compliance management, risk detection and prioritization, and behavioral analytics, providing visibility, governance and control from code creation to production runtime. CNAPP solutions use a combination of API integrations with leading cloud platform providers, continuous integration/continuous development (CI/CD) pipeline integrations, and agent and agentless workload integration to offer combined development and runtime security coverage.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Cyscale
Cyscale
Logo of Upwind
Upwind
Logo of Singularity Cloud Security
Singularity Cloud Security
For 50M-1B USD Companies
Logo of Upwind
Upwind
Logo of Sysdig Secure
Sysdig Secure
Logo of Trend Vision One Cloud Security
Trend Vision One Cloud Security
For Asia/Pacific
Logo of Cyscale
Cyscale
Logo of Sysdig Secure
Sysdig Secure
Logo of Qualys TotalCloud
Qualys TotalCloud
Integration & Deployment
Logo of Cyscale
Cyscale
Logo of Wiz CNAPP
Wiz CNAPP
Logo of Singularity Cloud Security
Singularity Cloud Security

Product Listings

Filter by

Products 1 - 20 of 58
Sort by
Logo of Singularity Cloud Security

Singularity Cloud Security

By SentinelOne

4.7
(372 Ratings)

Singularity Cloud Security is a software designed to provide comprehensive protection for cloud environments, focusing on threat detection, compliance monitoring, and vulnerability management. The software enables organizations to identify risks within workloads, containers, and cloud-native applications, helping address security gaps across multi-cloud and hybrid deployments. Singularity Cloud Security offers features that include real-time visibility into cloud assets, automated correlation of security findings, and integration with existing security tools. The software assists businesses in meeting regulatory requirements by continuously assessing security configurations and providing actionable insights to remediate identified issues, supporting safer operation of cloud infrastructure and applications.

Show More Details
Logo of CrowdStrike Falcon Cloud Security

CrowdStrike Falcon Cloud Security

By CrowdStrike

4.7
(367 Ratings)

CrowdStrike Falcon Cloud Security is a software designed to provide cloud-native security for workloads, applications, and containers across public, private, and hybrid cloud environments. The software delivers continuous monitoring, threat detection, and automated response capabilities to help organizations protect against vulnerabilities and unauthorized access. It integrates with existing cloud platforms to offer visibility into cloud assets and activities, allowing businesses to address compliance requirements and manage risks associated with cloud infrastructure. By leveraging real-time analytics and threat intelligence, the software enables organizations to safeguard cloud resources and maintain security posture throughout the application lifecycle.

Show More Details
Logo of Sysdig Secure

Sysdig Secure

By Sysdig

4.8
(288 Ratings)

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, detection, and response so customers can confidently secure containers, Kubernetes, hosts/servers, and cloud services. Sysdig provides real-time visibility at scale across multiple clouds, eliminating security blind spots. We use intelligence from runtime to prioritize alerts so teams can focus on high-impact security events and improve efficiency. By understanding the entire source to response flow and suggesting guided remediation, customers can both fix issues in production with no wasted time and also detect and respond to threats in real time.

Show More Details
Logo of Wiz CNAPP

Wiz CNAPP

By Wiz

4.8
(266 Ratings)
customers choice 2025

Wiz CNAPP is a software designed to provide cloud security by helping organizations identify and manage risks across cloud environments. This software offers visibility into cloud infrastructure, enabling detection of vulnerabilities, misconfigurations, and exposures in real time. It integrates with major cloud platforms, offering context on workloads, identities, and network configurations. Wiz CNAPP enables prioritization and remediation of security issues by presenting actionable insights into risks and compliance status. The software supports security operations by correlating various cloud resources, supporting governance and risk reduction for enterprises seeking to secure complex cloud architectures.

Show More Details
Logo of Cortex Cloud

Cortex Cloud

By Palo Alto Networks

4.5
(245 Ratings)

Cortex Cloud is a software developed by Palo Alto Networks that delivers automated security operations for organizations aiming to enhance cybersecurity posture. The software provides advanced threat detection, investigation, and response capabilities by integrating artificial intelligence and machine learning across security tools and workflows. It enables centralized management of security alerts and incidents, facilitating efficient triage and resolution. Cortex Cloud supports the monitoring and analysis of security data from multiple sources, helping organizations identify vulnerabilities and streamline remediation processes. The software addresses the business challenge of managing complex security environments by providing visibility, automation, and scalability for security operations teams.

Show More Details
Logo of Trend Vision One Cloud Security

Trend Vision One Cloud Security

By Trend Micro

4.7
(238 Ratings)

Trend Vision One Cloud Security software provides centralized security management and threat detection capabilities for cloud environments, supporting multiple cloud infrastructures and workloads. The software incorporates automated monitoring, compliance assessment, vulnerability scanning, malware detection, and identity protection features designed to help organizations safeguard cloud-based applications, data, and systems. It addresses the business need of reducing exposure to cyber threats and maintaining regulatory compliance through streamlined visibility, policy enforcement, and incident response across public, private, and hybrid cloud deployments. Trend Vision One Cloud Security software integrates with DevOps pipelines and delivers analytics to support proactive risk management and operational efficiency within cloud ecosystems.

Show More Details
Logo of Orca Security

Orca Security

By Orca Security

4.6
(220 Ratings)

Orca Security is a software designed to provide comprehensive cloud security and compliance solutions across public cloud environments. The software offers features such as asset inventory, vulnerability management, threat detection, and risk assessment, enabling organizations to identify and prioritize security risks without agents. It integrates with major cloud platforms to deliver visibility into workloads, configurations, and data, supporting incident investigation and compliance reporting. Orca Security addresses challenges associated with securing complex cloud infrastructures by enabling users to detect misconfigurations, malware, and sensitive data exposure, contributing to improved security posture and regulatory compliance in cloud ecosystems.

Show More Details
Logo of FortiCNAPP

FortiCNAPP

By Fortinet

4.4
(155 Ratings)

FortiCNAPP is a cloud-native application protection software designed to secure cloud environments and workloads by integrating security controls and compliance features. The software provides real-time threat detection, vulnerability management, and posture assessment across containerized and serverless architectures. It enables automated policy enforcement and monitors for misconfigurations, unauthorized access, and malicious activities within cloud infrastructures. FortiCNAPP supports compliance with regulatory standards through continuous security monitoring and reporting. By consolidating protection for applications, APIs, and cloud resources, the software assists organizations in managing risks associated with cloud deployments and maintaining the security and integrity of their cloud-hosted applications.

Show More Details
Logo of Tenable Cloud Security

Tenable Cloud Security

By Tenable

4.8
(106 Ratings)
customers choice 2025

Tenable Cloud Security is an actionable cloud security platform that exposes and closes priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities. Organizations use its intuitive UI to unify siloed tools to secure the full cloud stack, achieving end-to-end visibility, prioritization and remediation across infrastructure, workloads, identities, data and AI services. Users can access the extensive knowledgebase of Tenable Research, reducing the risk of breaches with advanced prioritization that understands resource, identity and risk relationships. Tenable uses this context to pinpoint toxic combinations of risk most likely to be exploited. Take action, even if you only have 5 minutes, with guided remediations and code snippets that significantly reduce MTTR. With one click, report on compliance with industry benchmarks and regulatory requirements, e.g. SOC 2, GDPR & HIPAA. TCS is part of Tenable’s AI-powered exposure management platform, Tenable One.

Show More Details
Logo of Microsoft Defender for Cloud

Microsoft Defender for Cloud

By Microsoft

4.2
(105 Ratings)

Microsoft Defender for Cloud is a software that provides security management and threat protection for cloud-based and on-premises resources. It offers capabilities such as vulnerability assessment, security posture management, and continuous monitoring of workloads across different environments. The software helps organizations identify misconfigurations, strengthen the security of their infrastructure, and detect potential threats using analytics and intelligence tools. Microsoft Defender for Cloud supports protecting applications and data by providing recommendations for improving security and enabling automated responses to security incidents, addressing the need for unified security and compliance management across hybrid and multi-cloud environments.

Show More Details
Logo of Qualys TotalCloud

Qualys TotalCloud

By Qualys

4.8
(59 Ratings)

TotalCloud 2.0 with TruRisk Insights provides a holistic view of risk by correlating unique indicators from diverse Qualys sources such as Six Sigma vulnerability detection, AI-powered threat detection, externally exposed assets, and asset criticality; and combines them with SaaS and cloud infrastructure posture. By bringing these unique indicators together, TruRisk Insights offers a singular, prioritized view of your cloud risk landscape.

Qualys TotalCloud 2.0 includes tools for SaaS Security Posture Management (SSPM), Cloud Workload Protection (CWP), Cloud Security Posture Management (CSPM), Infrastructure as Code (IaC) Security, Cloud Detection and Response (CDR), and Kubernetes & Container Security (KCS). Users are enabled with complete visibility of their cloud footprint, comprehensive cloud-native assessments, consolidated views of risk indicators, real-time protection against evolving threats, and automated, one-click customer remediations.

Show More Details
Logo of Aqua CNAPP

Aqua CNAPP

By Aqua Security

4.1
(42 Ratings)

Aqua CNAPP is a cloud-native application protection platform software designed to provide workload and infrastructure security across cloud environments. The software offers features such as vulnerability scanning, runtime protection, posture management, and compliance assessment for applications deployed in containers, virtual machines, and serverless functions. It enables organizations to identify, prioritize, and mitigate risks by continuously monitoring cloud resources and application activity. Aqua CNAPP addresses business challenges related to safeguarding cloud-native assets by detecting misconfigurations and threats, facilitating secure software development and deployment practices, and supporting regulatory requirements for cloud infrastructure.

Show More Details
Logo of Upwind

Upwind

By Upwind

4.8
(39 Ratings)

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric that maps your environment as it runs - revealing what’s truly at risk, what’s actively happening, and how to respond quickly and effectively. With Upwind, security, dev, and ops teams move faster, stay focused, and fix risks that matter most.

Show More Details
Logo of Symantec Data Center Security

Symantec Data Center Security

By Broadcom

4.2
(32 Ratings)

Symantec Data Center Security is a software designed to provide server security and workload protection for physical, virtual, and cloud environments. The software offers features such as policy-based access controls, malware detection, real-time file integrity monitoring, and system hardening, enabling organizations to protect critical data center assets from various threats. It helps manage and enforce security policies across multiple platforms, supports compliance with security standards, and provides visibility into system activity, reducing the risk of unauthorized access and vulnerabilities. Symantec Data Center Security is intended to address the business challenge of securing complex and dynamic data center infrastructures.

Show More Details
Logo of Cyscale

Cyscale

By Cyscale

5
(29 Ratings)

Cyscale is a comprehensive cloud security platform designed to empower SMEs with the tools they need to mitigate risks and prevent threats. Our unified CNAPP platform offers real-time intelligence on cloud misconfigurations, vulnerabilities, identity and access management (IAM), and data security. With Cyscale, businesses can achieve strong cloud protection, ensuring compliance and protecting critical assets in an ever-evolving digital landscape.

Show More Details
Logo of Sweet

Sweet

By Sweet Security

4.8
(26 Ratings)

Sweet is a software platform that provides cloud security solutions focused on detecting and responding to threats within cloud environments. The software offers features such as real-time monitoring, threat intelligence, and automated incident response to help organizations protect their cloud infrastructure and workloads. Sweet is designed to enhance visibility across cloud-native resources, enable proactive risk management, and facilitate compliance by identifying misconfigurations or vulnerabilities. The software aims to assist businesses in addressing security challenges associated with cloud adoption by streamlining detection and response processes through integration with common cloud service providers and security tools.

Show More Details
Logo of AccuKnox Zero Trust CNAPP

AccuKnox Zero Trust CNAPP

By AccuKnox

4.5
(23 Ratings)

AccuKnox is a Zero Trust Cloud-Native Application Protection Platform (CNAPP). It provides security coverage from code development to cloud runtime operations, including Cloud Security Posture Management (CSPM), Kubernetes Security Posture Management (KSPM), Cloud Workload Protection Platform (CWPP), and Application Security (ASPM). AccuKnox addresses business challenges such as cloud infrastructure misconfigurations, runtime security threats, including zero-day vulnerabilities, adherence to compliance standards like SOC2 and HIPAA, and securing APIs, AI models, Edge/IoT devices, and 5G networks. The platform offers features like vulnerability scanning, automated compliance checks, and runtime threat mitigation across multi-cloud and on-premise environments.

Show More Details
Logo of Red Hat Advanced Cluster Security for Kubernetes

Red Hat Advanced Cluster Security for Kubernetes

By IBM (Red Hat)

4.6
(16 Ratings)

Red Hat Advanced Cluster Security for Kubernetes is a software designed to improve the security of Kubernetes environments. This software provides visibility into Kubernetes clusters, enabling detection and response to vulnerabilities, misconfigurations, and policy violations. It supports enforcement of security and compliance requirements through policy-driven controls and risk management features. The software monitors network traffic, controls access, and helps users identify and remediate potential threats across the container lifecycle. It is intended to assist organizations in addressing challenges related to protecting workloads, maintaining compliance, and reducing security risks in containerized applications running on Kubernetes.

Show More Details
Logo of Virsec Security Platform

Virsec Security Platform

By Virsec

4.8
(14 Ratings)

Virsec Security Platform is a software designed to protect applications at runtime by identifying and neutralizing threats in real time. The software utilizes a deterministic approach to monitor application behavior and prevent exploitation of vulnerabilities. It offers capabilities such as runtime application protection, memory integrity assurance, and workload security for both legacy and modern environments. Virsec Security Platform addresses business problems related to unauthorized code execution, fileless attacks, and advanced persistent threats across on-premises and cloud infrastructures. The software supports deployment in diverse environments, helping organizations maintain compliance and reduce the risk of breaches without reliance on signature-based detection or frequent updates.

Show More Details
Logo of Symantec Cloud Workload Protection

Symantec Cloud Workload Protection

By Broadcom

4.1
(8 Ratings)

Symantec Cloud Workload Protection is a software designed to secure cloud-based workloads across various environments. The software provides automated security controls and continuous monitoring for virtual machines, containers, and serverless functions. It enables visibility into workload activity, detects threats, and enforces policies for compliance and governance. The software offers integration with multiple cloud platforms, helping organizations manage and protect assets deployed in public, private, and hybrid clouds. By addressing risks associated with cloud workloads, the software aids in maintaining data integrity and reducing the likelihood of unauthorized access or vulnerabilities.

Show More Details

Features of Cloud-Native Application Protection Platforms

Updated September 2025

Mandatory Features:

  • Integration via API with hyperscale cloud platforms (including, at a minimum, Amazon Web Services [AWS], Microsoft Azure, and Google Cloud Platform [GCP]) and Kubernetes, to review and audit configuration and identity permissions for common misconfigurations that lead to security exposures.

  • Visibility into runtime states of workloads, either in real time or via point-in-time analysis, to discover security vulnerabilities and the presence of secrets and anomalous behavior in cloud workloads (virtual machines, containers and serverless), and use this to add context to cloud configuration findings.

  • Development operation workflows that provide risk analysis and prioritization of risk through the development life cycle of modern applications. At a minimum, the platform should provide infrastructure as code scanning and container registry scanning.

  • Solution is provided through a cloud-delivered “as-a-service” platform, rather than a loosely coupled portfolio of products.

Peer Lessons Learned for Cloud-Native Application Protection Platforms

Published January 2025

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Cloud-Native Application Protection PlatformsLessons learned by your peers shared on Gartner Peer Insights for Cloud-Native Application Protection PlatformsPeer Lessons Learned for Cloud-Native Application ProtectionPlatformsLesson 1LESSON1Define Cloud-Native Security Needs; GainStakeholder Buy-In for the CNAPPImplementationLesson 2LESSON2Run POCs to Test Vendors' Capabilities;Compare TCOs to Opt for the Best CNAPPLesson 3LESSON3Elevate Users' CNAPP Knowledge by ProvidingPractice Labs and In-Depth TrainingLesson 4LESSON4Plan Workflows and Set Up Cloud GovernanceFrameworks Ahead of CNAPP ImplementationLesson 5LESSON5Optimize CNAPP Implementation With Internal,Third-Party and Vendor's Supportn = 410Source: Reviews (410) submitted to Gartner Peer InsightsID: 6071763Gartner ®
Read Full Insights

Gartner Research

Market Guide for Cloud-Native Application Protection Platforms
Gartner Peer Insights 'Voice of the Customer': Cloud-Native Application Protection Platforms

Top Trending Products

CrowdStrike Falcon Cloud SecurityUpwindOrca SecuritySweetWiz CNAPP

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.