For use cases, the segmentation use case is the most requested by our customers. Also, monitoring the container's behavior is one of the aspects customers request when it comes to segmentation. The other use case would be monitoring and detecting any abnormal behavior.
Segmentation is the most powerful feature.
The testing process could be improved; it would be great.
I have been using this solution for two years. Usually, when we implement it, we count on the latest version because of the patching and updates.
I would rate stability a nine out of ten.
It is a scalable solution because my clients are mainly enterprise businesses. I would rate scalability a nine out of ten.
The customer support is good.
The initial setup is moderate. It's about a seven out of ten where one is difficult, and ten is easy. It's pretty straightforward.
The deployment process depends on the environment and the scope of the implementation itself. Sometimes it takes a few days, from a month to two weeks, and sometimes several months. It depends on the deployment, the use case, the requested use cases, and the nature of the environment itself.
Maybe three to five people are needed for the deployment. The maintenance team usually represents fifty percent of the implementation team. So, for instance, if we have six people for implementation, we would need three people for customer support.
The pricing model is moderate, meaning it is not very expensive. I would rate it a seven on a scale of one to ten, where one represents cheap and ten represents very expensive. Additionally, it operates on a subscription-based model.
I would highly recommend it to our customers. Red Hat OpenShift is one of the most promising platforms and has a lot of installed briefs. Considering the security controls and features of this solution, it is mandatory nowadays. It comes highly recommended and is supported by our technical solutions.
Overall, it is an eight out of ten because it covers all the security features, and is reliable and scalable. Also, it is cost-efficient. However, some features are still not ready yet. In this case, you need to add some complementary solutions to provide the full picture of the security controls. On a scale of one to ten, if ten security controls are required to be covered, then Red Hat can provide six or seven out of ten. The remaining three to four out of ten are out of scope or not covered yet by the platform itself. So, it's necessary to consider some security controls out of the box, such as vulnerability scanner, static code analysis, dynamic code analysis, etc., to ensure that this platform can provide security controls across these containers.