Illumio and Wiz are products in the cybersecurity sector. Wiz appears to have the upper hand with its extensive cloud security capabilities, offering a wider range of features that benefit cloud-first strategies.
Features: Illumio specializes in network micro-segmentation, isolating workloads effectively to enhance security. It simplifies network segmentation, allowing straightforward interactions with network traffic. It also provides visibility into application communications. Wiz excels in cloud security with rapid data analysis and vulnerability detection. It features a security graph for visualizing risks, agentless scanning capabilities, and out-of-the-box dashboards for immediate insights.
Room for Improvement: Illumio can improve its cloud-focused features to better compete in cloud environments. Enhancing its analytics for cloud-specific threats and streamlining deployment for cloud use cases would be beneficial. Expanding integrations with cloud-native tools could also broaden its appeal. Wiz should address complexities in handling certain deployment scenarios, enhance its on-demand scanning processes for more immediate security responses, and clarify the functions of its multiple scanning tools to avoid confusion.
Ease of Deployment and Customer Service: Illumio offers a straightforward deployment process for segmented environments and receives positive feedback for its customer service. Wiz focuses on cloud-native deployment for rapid implementation but poses complexity challenges that can slow deployment processes. Despite this, Wiz's customer support is considered supportive, balancing its deployment speed issues.
Pricing and ROI: Illumio presents a competitive setup cost favoring network security with high ROI due to its efficiency in segmentation. Wiz's investment is higher, supported by comprehensive cloud capabilities that protect complex infrastructures, providing a favorable ROI over time. Although Illumio offers cost efficiency initially, Wiz delivers long-term value with extensive cloud protection.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Cloud Native Security does offer ROI.
Illumio is known to be the cheapest solution among the security solutions we evaluated.
We have seen ROI from Wiz and we continued to see value in Wiz.
We estimate a cost reduction of around 35% to 50%, or even more, due to consolidating our security management into one platform.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Even if we raise an issue on non-working days like Saturdays or Sundays, we receive prompt responses.
From my experience, they are very responsive.
We have a dedicated channel with Wiz and are always in communication with them.
The solution's technical support was excellent.
Century Data has an engineering team who support the initial calls with a local Knowledge base.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
Scaling it to a large level is not an issue for us.
We have deployed Wiz in three organizations on AWS, each with approximately 70 to 80 accounts, totaling more than 120 accounts.
Scalability-wise, I rate the solution a ten out of ten.
Our environment quadrupled in size. We didn’t have to make any adjustments or configuration changes; it just accommodated the growth.
It's a reliable solution that the organization is increasingly adopting for its robust features and security.
We contacted Cloud Native Security, and they addressed it in a day.
The only downtime we had was when switching from V1 to V2 but it was smooth.
Illumio is a stable solution with no glitches or bugs reported, making it a reliable product for us.
The stability of Wiz has been good, with no downtime, bugs, or glitches.
Stability-wise, I rate the solution an eight to nine out of ten.
The solution is very stable.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
I would also like to see Cloud Native Security offer APIs that allow us to directly build dashboards within the platform.
There could also be more examples of how the automations can be done using Illumio.
That's why I'm looking for comparisons with other products.
There should be an option to upgrade from the console to the latest version instead of performing manual upgrades.
We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately.
One significant area for improvement would be increasing automation. While they excel at identifying issues, we need assistance in minimizing the human hours required for tasks.
We need an agent that can be installed, or that can overview all the containers and Kubernetes so that it can detect malicious activities that are happening in them.
I believe the enterprise version costs around $55 per user per year.
There are some tools that are double the cost of Cloud Native Security.
I recall Cloud Native Security charging a slightly higher premium previously.
I know that Illumio is the cheapest solution in the security area.
I think it's not very expensive if we compare it with Guardicore.
We are paying 250k per year.
In some cases, it has a very aggressive price, so very cheap.
I don’t think there’s anyone else out there offering the same level, scale, or efficiency.
This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
The infrastructure-as-code feature is helpful for discovering open ports in some of the modules.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
Illumio helps in audit purposes by saving data and showing blocked traffic, ensuring no outside traffic is allowed.
The most important feature is the traffic review analysis, where we use the draft view and the reported view that helps us understand how the application interacts with other applications in the environment, and based on that, we are able to define the policies.
The dependency map is the most valuable aspect.
The feature leads to minimal false positives and a low volume of alerts, which is highly valuable for our operations.
It's highly customizable, allowing us to manage many custom features effectively.
Regarding compliance and governance, Wiz streamlines our vulnerability management to meet specific needs effectively.



| Product | Market Share (%) | 
|---|---|
| Wiz | 15.9% | 
| SentinelOne Singularity Cloud Security | 3.7% | 
| Illumio | 6.4% | 
| Other | 74.0% | 



| Company Size | Count | 
|---|---|
| Small Business | 46 | 
| Midsize Enterprise | 20 | 
| Large Enterprise | 53 | 
| Company Size | Count | 
|---|---|
| Small Business | 3 | 
| Midsize Enterprise | 1 | 
| Large Enterprise | 8 | 
| Company Size | Count | 
|---|---|
| Small Business | 9 | 
| Midsize Enterprise | 6 | 
| Large Enterprise | 12 | 















SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
Illumio Zero Trust Segmentation Features
Illumio Zero Trust Segmentation has many valuable key features. Some of the most useful ones include:
Illumio Zero Trust Segmentation Benefits
There are many benefits to implementing Illumio Zero Trust Segmentation. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Illumio Zero Trust Segmentation is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has a good auto policy writing feature, great mapping, and useful monitoring.
Shashi, Technical Consultant at a financial services firm, explains which features she really likes. “The auto policy writing is great. The feature will give you the option of inbound-outbound traffic. The Explorer allows you to know the traffic between source and destination. The illumination definitely stands out. Mapping is great. The application group mapping is useful.”
The solution has “helpful support, useful monitoring, and high availability,” according to Edwin L., Security Architect at MGM.
Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.
Wiz's Security Graph delivers automated alerts whenever risks emerge, allowing teams to prioritize and address the most critical issues before they escalate into breaches. Furthermore, Wiz ensures rapid and agentless visibility into critical data across various repositories, enabling organizations to easily determine the location of their data assets.
Wiz provides various features in the following categories:
Agentless Scanning: The solution can scan every layer of a cloud environment without requiring agents, managing the entire process and providing comprehensive visibility.
Workflow Integration: Users can create customized workflows within Wiz to identify and assign actions based on urgency, integrating them with ticketing systems for quick and efficient remediation.
Vulnerability Management: Wiz's vulnerability management modules provide detailed analytics and visibility across cloud systems, streamlining the manual process of vulnerability discovery. The automated attack path analysis helps identify risks and trace potential points of exposure, allowing users to understand and mitigate them effectively and proactively.
CSPM (Cloud Security Posture Management): Wiz's CSPM module offers instant visibility into high-level risks to an enterprise’s cloud environment, covering all accounts without the need for agents.
Out-of-the-Box Reporting and Custom Queries: The service supports comprehensive reporting with asset context, allowing users to perform complex custom queries on the solution’s user-friendly interface.
Automation Roles and Dashboards: The solution facilitates automation by providing essential roles and dedicated dashboards that enable teams to understand security information quickly, even those with limited expertise.
Contextual Risk Evaluation: The service contextualizes the various components contributing to an issue, providing a risk evaluation framework that helps prioritize remediation efforts.
Security Graph and Visibility: Wiz's security graph offers visibility across the entire organization, even with multiple accounts, enabling users to understand their environment and assets effectively.
Wiz offers the following benefits:
Comprehensive agentless scanning
Effective identification and mitigation of vulnerabilities
Streamlined vulnerability management
Robust reporting capabilities and customizable queries
Enhanced automation and role-based access control
Prioritized risk evaluation for efficient remediation
Security posture across multiple accounts
Kamran Siddique, VP Information Security at boxed.com, remarks his company has seen a ROI while using Wiz, as it simplifies the process by integrating multiple useful tools into one solution.
According to a Senior Security Architect at Deliveroo, Wiz has given their company a fresh approach to vulnerability management, as Wiz's native integrations are extremely useful and paramount to the operational success of their platform.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.