We performed a comparison between Illumio Zero Trust Segmentation and GuardDuty based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Illumio Zero Trust Segmentation offers sophisticated monitoring capability, automatic policy creation, log management, and visibility into application communication. AWS GuardDuty provides a unified platform for data collection and advanced threat detection. Illumio Zero Trust Segmentation has room for improvement in terms of OS support and agents for OT environments. AWS GuardDuty users suggest adding a mobile version and improving dashboard analytics. Users would also like to see improved threat intelligence and integration with new AWS services.
Service and Support: Some reviewers commended Illumio's support for their round-the-clock assistance and responsiveness. Other users said they were disappointed with unhelpful answers and delayed responses. AWS GuardDuty generally received praise for its outstanding support, which users characterized as fast and knowledgeable. A few users reported long wait times for phone support.
Ease of Deployment: Illumio Zero Trust Segmentation has a lengthy deployment process that can potentially take up to six months, including testing. AWS GuardDuty is a cloud-based solution with a quick and painless setup process.
Pricing: Users have mentioned that Illumio Zero Trust Segmentation is expensive overall, while AWS GuardDuty has a competitive pay-as-you-use pricing model.
ROI: AWS GuardDuty users said it enhanced security and raised customer confidence, helping them to win new business. Our users have not yet provided ROI information about Illumio Zero Trust Segmentation.
Comparison Results: Illumio Zero Trust Segmentation is preferred over AWS GuardDuty. Illumio is praised for its micro-segmenting and monitoring abilities. The solution also provides solid visibility into application communication and network protocols.
"The out-of-band malware detection from the EBS volumes. It's really cool. No agents or anything needed, it automatically finds and correlates based on malware."
"We have over 1,000 employees, and we monitor their activity through AWS GuardDuty."
"The solution is easy to use."
"It helps us detect brute-force attacks based on machine learning."
"Deployment is great, and we didn't face any big challenges."
"The correlation back end is the solution's most valuable feature."
"The solution provides AWS GuardDuty S3 protection, EKS runtime protection, and malware protection."
"What I like most about Amazon GuardDuty is that you can monitor your AWS accounts across, but you don't have to pay the additional cost. You can get all your CloudTrail VPC flow logs and DNS logs all in one, and then you get the monitoring with that. A lot of times, if you had a separate tool on-premise, you would have to set up your DNS logs, so usually, Amazon GuardDuty helps with all your additional networking requirements, so I utilize it for continuous monitoring because you can't detect anything if you're not monitoring, and the solution fills that gap. If you don't do anything else first, you can deploy your firewall, and then you've got your Route 53 DNS and DNSSEC, but then Amazon GuardDuty fills that, and then you have audit requirements in AU that says, "Hey, what are your additional logs?", so you can just say, "Hey, we utilize Amazon GuardDuty." You're getting your CloudTrail, your VPC flow logs, and all your DNS logs, and those are your additional logs right there, so the solution meets a lot of requirements. Now, everything comes with a cost, but I also like that the solution also provides threat response and remediation. It's a pretty good product. I've just used it more for log analysis and that's where the value is at, the niche value. Once you do threat detection, it goes into a lot of other integrations you need to implement, so threat detection is only good as the integration, as the user that knows the tools itself, and the architecture and how it's all set up and the rules that you set within that."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The Explorer allows you to know the traffic between source and destination."
"The flexibility of the solution is its most valuable feature."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"The solution is easy to use."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"Some of the pain points in Amazon GuardDuty was the cost. When compared to some of the other services, depending on how many we had to monitor, if we had a huge range of accounts, as our accounts increased, we had a cost factor that came into play. Sometimes there were issues, for example, with findings that came up, we wanted to add notes and there were issues back then where notes couldn't be entered properly. If we wanted to leave a note such as "Okay, we have assessed this and this is how we feel", or "This is a false positive", Amazon GuardDuty wasn't allowing us to do that. Even with the suppression of certain findings, there was some issue that we had faced at one time. Those were some of the pain points of the solution."
"There is currently no consolidated dashboard for AWS GuardDuty. It would be helpful if they could provide a dashboard based on severity levels (high, medium, low) and offer insights account-wise, especially for users utilizing automation structures."
"For the next release, they could provide IPS features as well."
"Amazon GuardDuty could be better enriched in threat intelligence data."
"An improvement would be to have a mobile version where remote workers can log in and monitor and fix issues."
"AWS GuardDuty sometimes shows false positives and should have better detection accuracy."
"AWS GuardDuty needs to be more customer-oriented."
"Improvement-wise, Amazon GuardDuty should have an overall dashboard analytics function so we could see what's in the current environment, and then in addition to that, provide best practices and recommendations, particularly to provide some type of observability, and then figure out the login side of it, based on our current environment, in terms of what we're not monitoring and what we should monitor. The solution should also give us a sample code configuration to implement that added feature or feature request. What I'd like to see in the next release of Amazon GuardDuty are more security analytics, reporting, and monitoring. They should provide recommendations and additional options that answer questions such as "Hey, what can we see in our environment?", "What should we implement within the environment?", What's recommended?" We know that cost will always be associated with that, but Amazon GuardDuty should show us the increased costs or decreased costs if we implement it or don't implement it, and that would be a good feature request, particularly with all products within AWS, just for cloud products in general because there are times features are implemented, but once they're deployed, they don't tell you about costs that would be generated along with those features. After features are deployed, there should a summary of the costs that would be generated, and projected based on current usage, so they would give us the option to figure out how long we're going to use those features and the option to keep those on or turn those off. If more services were like that, a lot more people would use those on the cloud."
"The product’s agents don't work very well in OT environments."
"The customer service is lagging a bit. It could be better."
"I would like to see better data security in the product."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"It requires a low-level re-architecting of the product."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
AWS GuardDuty is ranked 4th in Cloud Workload Protection Platforms (CWPP) with 19 reviews while Illumio is ranked 14th in Cloud Workload Protection Platforms (CWPP) with 8 reviews. AWS GuardDuty is rated 8.2, while Illumio is rated 8.0. The top reviewer of AWS GuardDuty writes "A stellar threat-detection service that has helped bolster security against malicious threats". On the other hand, the top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". AWS GuardDuty is most compared with Microsoft Defender for Cloud, Prisma Cloud by Palo Alto Networks, CrowdStrike Falcon Cloud Security, Wiz and Aqua Cloud Security Platform, whereas Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Microsoft Defender for Cloud. See our AWS GuardDuty vs. Illumio report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.