You can use cloud workload security (CWS) to govern and protect cloud workloads at all levels, including: 1) cloud service provider (CSP) console; 2) virtualization hypervisor; 3) guest operating system (OS); 4) container and container orchestration layer; and 5) serverless functions. But to realize these benefits, you’ll first have to select from a diverse set of vendors that vary by size, functionality, geography, and vertical market focus. Security and risk (S&R) professionals should use this report to understand the value they can expect from a CWS provider and to select one based on size and functionality.