Cloud Infrastructure Security & CNAPP Platforms
Tools and platforms that secure public, private, and hybrid cloud infrastructure and services, including cloud security posture management (CSPM), cloud workload protection platforms (CWPP), cloud infrastructure entitlement management (CIEM), Kubernetes and cloud network security, and cloud‑native application protection platform (CNAPP) capabilities that unify visibility, configuration, vulnerability, and runtime threat protection across multi‑cloud and hybrid environments. This domain is the primary home for CNAPP‑related capabilities and replaces the deprecated Cloud‑Native Application Protection (CNAPP) domain entry.
Executive Summary
This report provides a comprehensive analysis of the Cloud Infrastructure Security & CNAPP Platforms market, evaluating 7 tools from 7 vendors across 18key evaluation criteria. The analysis enables data-driven vendor selection and market positioning insights.
Use the tabs below to explore different analytical views including the market matrix, comparative analysis, trends, and market positioning.
Market Heatmap
Visual representation of vendor capabilities across all evaluation criteria. Darker shades indicate stronger capabilities.
Cloud Infrastructure Security & CNAPP Platforms - Market Comparison
Detailed Market Matrix
Comprehensive data grid comparing all vendors side-by-side. Use filters and sorting to identify vendors that best match your requirements.
Market Matrix
Tool(7) | Compliance & Governance | Core Capabilities | Data Security | DevSecOps & Shift‑Left | Identity & Access | Integrations & Ecosystem | Operations & Automation | Platform & Architecture | Risk & Posture Management | Threat Detection & Response | Visibility & Inventory | |||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Compliance Framework Coverage & Reporting compliance_framework_support | CIEM Functionality ciem_functionality | Cloud Network Security Features cloud_network_security_features | Cloud Workload Protection Coverage cwpp_coverage | CSPM Capabilities Coverage cspm_capabilities | Kubernetes & Container Security Depth kubernetes_security_depth | Data Protection & Encryption Controls data_protection_and_encryption | Shift‑Left & IaC Security shift_left_and_iac_security | Identity & Access Risk Analysis identity_access_risk_analysis | Cloud‑Native Service Integrations cloud_native_integration_coverage | Security & IT Tooling Integrations security_and_it_tooling_integrations | Automation, API & Policy‑as‑Code Support automation_and_api_support | Deployment Model (Agentless / Agent‑Based / Hybrid) deployment_model | Multi‑Cloud & Hybrid Support multi_cloud_hybrid_support | Scalability & Performance at Cloud Scale scalability_and_performance | Misconfiguration Detection & Auto‑Remediation misconfiguration_detection_and_remediation | Runtime Threat Detection & Response runtime_threat_detection_response | Cloud Asset Discovery & Visibility asset_discovery_and_visibility | |
Aqua Cloud Security Platform Aqua Security | 9 | 7 | 8 | 6 | 8 | 8 | 8 | 9 | 8 | |||||||||
CloudGuard Check Point Software Technologies | 7 | 7 | 6 | 7 | 8 | 8 | 8 | 8 | 8 | |||||||||
Lacework Polygraph Data Platform Lacework | 8 | 7 | 6 | 7 | 8 | 8 | 8 | 9 | 8 | |||||||||
Orca Cloud Security Platform Orca Security | 8 | 8 | 7 | 8 | 8 | 8 | 8 | 7 | 9 | |||||||||
Snyk Platform Snyk | 6 | 6 | 9 | 6 | 9 | 8 | 8 | 5 | 7 | |||||||||
Sonrai Dig Sonrai Security | 6 | 7 | 7 | 9 | 8 | 8 | 8 | 6 | 8 | |||||||||
Sysdig Secure Sysdig | 9 | 6 | 7 | 6 | 8 | 8 | 8 | 9 | 7 | |||||||||