Try our new research platform with insights from 80,000+ expert users

Share your experience using Comodo Dome Data Loss Prevention

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 96,000+ reviews on PeerSpot:

Senior DevOps Engineer
Real User
Efficiently manages sensitive data but needs improvement in credential differentiation
Pros and Cons
    • "The main disadvantage I feel they should improve upon is that apart from flagging credential issues or secrets, they could incorporate something else to make it more dynamic."

    What is our primary use case?

    We initially integrated GitGuardian Public Monitoring into our organization in 2023 into our GitHub repository. We implemented it because we did not want our secret credentials to be exposed to the internet or to a third party such as GitHub. It flags when credentials have been exposed so we can remediate and fix them. GitGuardian Public Monitoring was what my tech lead suggested we use, and we had to incorporate it into our repositories. We use the public monitoring version.

    What is most valuable?

    What I appreciate the most about GitGuardian Public Monitoring is its efficiency when triggering our pipeline and notifying us if secrets have been exposed, such as APIs, variables, our database, or anything being exposed. Currently, we have numerous repositories and pushes that happen in our repo. It would be humanly impossible for us to manually search for these secrets. GitGuardian Public Monitoring can do this automatically. All we need to do is wait for an email notification that indicates a secret has been exposed. It points out the repository that has the secret exposed, and we can fix it. This saves us the time of manual review.

    What needs improvement?

    The main disadvantage I feel they should improve upon is that apart from flagging credential issues or secrets, they could incorporate something else to make it more dynamic. If their product focuses majorly on secrets leaking, similar to Amazon Macie, they could expand their capabilities. Amazon Macie primarily flags secrets being exposed over the internet.

    For example, we use Dependabot for code review. Dependabot helps us follow best practices such as code quality and code analysis, as we cannot manually check 10,000 lines of code to ensure they follow structural standards. If GitGuardian Public Monitoring could incorporate code analysis into their system, not just for secrets alone, it would make them more dynamic.

    This would allow users to have just one tool instead of multiple third-party tools running in GitHub. It would reduce management overhead as you wouldn't have to manage multiple tools.

    For how long have I used the solution?

    I have been using GitGuardian Public Monitoring in my career for almost two years now.

    What was my experience with deployment of the solution?

    The initial deployment and installation was very easy for us. I cannot remember exactly how long it took to fully deploy it, but the process was straightforward. When we installed it two years ago, we conducted security testing to verify its functionality. It worked effectively.

    One downside about GitGuardian Public Monitoring is that it sometimes flags mock credentials, interpreting them as real secrets. While this is good for simulation purposes, it should be able to distinguish between real and mock credentials. When we test ran it, it worked immediately. After approximately a minute or two, we received email notifications about exposed credentials. The integration process was very easy.

    What do I think about the stability of the solution?

    For my organization, GitGuardian Public Monitoring has been stable. Since installation, we haven't had to optimize it, and I am unsure about new versions. It has been functioning effectively, and its performance is satisfactory. The only limitation is that it performs just one task. While it is efficient at credential flagging, it could offer more functionality.

    What do I think about the scalability of the solution?

    Regarding scalability, in my organization, we have about 44 repositories running, and GitGuardian Public Monitoring has been able to handle these repositories efficiently. I am uncertain about its capability to handle 100 repositories. For our organization, which is just four years old and not a large platform with numerous features, it functions adequately with our 44 repositories.

    Some tools can function properly until demand increases or usage reaches a certain extent, at which point they might start deteriorating. For instance, with our GitHub account, we had to pay for more capacity usage. I am unsure if GitGuardian Public Monitoring has similar limitations on the number of repositories it can handle. However, for our current 44 repositories, it has been working exceptionally.

    How are customer service and support?

    I have never contacted any technical support or customer support through phone or ticket system. We have never experienced any issues with it. It effectively helps us with credentials security and has been performing satisfactorily.

    How would you rate customer service and support?

    Negative

    Which solution did I use previously and why did I switch?

    I have not compared GitGuardian Public Monitoring with any alternatives in my organization. For GitHub repositories credentials, we use GitGuardian Public Monitoring. For AWS, we use Amazon Macie because we run our infrastructure on Amazon Web Services. We use Macie to protect our credentials from being exposed.

    How was the initial setup?

    The initial deployment and installation was very easy for us.

    What about the implementation team?

    For this deployment, my tech lead handled the implementation. We were on a call with him while he deployed it. It required only one person to complete the setup.

    What was our ROI?

    It does not require any maintenance on our end as it has been working autonomously. I am unaware of new versions, but what we have been using has not required maintenance.

    What's my experience with pricing, setup cost, and licensing?

    I am not involved with the pricing of GitGuardian Public Monitoring, as the tech lead handled those aspects. Initially, I thought it was an open-source tool. There are private and public versions available. The private version requires payment, but for the public version we use, we did not make any payments.

    Which other solutions did I evaluate?

    I have not compared GitGuardian Public Monitoring with any alternatives in my organization. For GitHub repositories credentials, we use GitGuardian Public Monitoring. For AWS, we use Amazon Macie because we run our infrastructure on Amazon Web Services. We use Macie to protect our credentials from being exposed.

    What other advice do I have?

    I will rate GitGuardian Public Monitoring a seven out of ten. The reason for this rating is that I wish they could have an agent embedded into their system that helps to identify real credentials from mock credentials, as this sometimes causes false alarms.

    We are users of the product with no partnerships with GitGuardian Public Monitoring. They can contact me regarding any questions about this review. I am open to anything that benefits the community and makes everything better.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Flag as inappropriate
    Ney Roman - PeerSpot reviewer
    DevOps Engineer at Deuna App
    Real User
    Top 20
    Facilitates efficient secret management and improves development processes
    Pros and Cons
    • "My impression of the GitGuardian Platform's capability to detect secrets in real time has been really amazing, because it lets us protect or block the pipelines in which we deploy new applications so we can acknowledge when a secret is hardcoded in a repository, or when we have already hardcoded secrets within templates in our repos."
    • "GitGuardian public leak detection significantly enhances our organization's data security by continuously monitoring public repositories."
    • "The documentation could be improved because when we started working with GitGuardian, it was difficult to find specific use cases."
    • "The documentation could be improved because when we started working with GitGuardian, it was difficult to find specific use cases."

    What is our primary use case?

    My use case for the GitGuardian Platform is application security.

    What is most valuable?

    My impression of the GitGuardian Platform's capability to detect secrets in real time is actually really amazing, because it lets us protect or block the pipelines in which we deploy new applications so we can acknowledge when a secret is hardcoded in a repository, or when we have already hardcoded secrets within templates in our repos.

    We adopted it a year ago, and it has been doing great in our teams, especially for developers. The impression so far has been good.

    The severity scoring has helped us in incident management because it is doing the correct job. We got many secrets leaked within our platform and it was making the correct warnings regarding that particular secret, as we had a hardcoded Google Cloud API key. It was marked as a critical severity, so we had the chance to correct it, regenerate that secret and work again on not hardcoding secrets within our code.

    GitGuardian's public leak detection significantly enhances our organization's data security by continuously monitoring public repositories. It allows us to proactively identify accidental exposures of sensitive credentials or secrets.

    What needs improvement?

    Regarding the exceptions in GitGuardian Platform, we know that within the platform we have a way to accept a path or a directory from a repository, but it is not that visible at the very beginning. You have to figure out where to search for it, and once you have it, it is really good, but it is not that visible at the beginning. This should be made more exposed.

    The documentation could be better because it was not that comprehensively documented. When we started working with GitGuardian Platform, it was difficult to find some specific use cases, and we were not aware of that. It might have improved now, but at that time, it was not something we would recommend.

    For how long have I used the solution?

    I have been using the GitGuardian Platform for almost a year now.

    What was my experience with deployment of the solution?

    The deployment of the GitGuardian Platform was easy.

    What do I think about the stability of the solution?

    From 1 to 10, I rate the stability of the GitGuardian Platform a 10, as there are no downtimes.

    What do I think about the scalability of the solution?

    I would rate the scalability as a 10, since we did not have any problems.

    How are customer service and support?

    For technical support, I would give a solid 10. They have someone who speaks Spanish, which made it easier for us.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I am comparing it with Advanced Security from GitHub and Cycode.

    How was the initial setup?

    Two of us were involved in the deployment process.

    It took a week to deploy the GitGuardian Platform, just to standardize the process.

    What about the implementation team?

    Two of us were involved in the deployment process.

    What was our ROI?

    Regarding return on investment, we have actually saved time and resources because before having GitGuardian Platform, we had two or three people working in every repository looking for secrets with open-source tools. It took a long time to find secrets or many patterns, and at the time, we had to configure our own patterns to find them. I cannot specify the exact return on investment, but I can surely say that we have saved significant time and resources, particularly in terms of people and automation.

    Which other solutions did I evaluate?

    I would compare the GitGuardian Platform to other solutions or vendors on the market as being easier to use, but it is not integrated with the CSM that we are using right now. That is the difference. It is easy to use, but it could be easier.

    What other advice do I have?

    We are customers in our company's relationship with the vendor.

    I work primarily with the CLI, focusing on pipelines and automations rather than the platform itself. The platform has remained almost the same within the year that we have been working with it.

    We are not utilizing the automated playbooks yet.

    I cannot determine if the pricing is cost-effective.

    The vendor can contact me if they have any questions or comments about my review.

    I have rated the GitGuardian Platform a 10 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Microsoft Azure
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    Flag as inappropriate