We performed a comparison between BigID and Microsoft Defender for Cloud based on real PeerSpot user reviews.
Find out in this report how the two Data Security Posture Management (DSPM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a standout compared to competitors. The tool's data classification capabilities are impressive. It offers custom classifiers and a blend of regular exploration and artificial intelligence, making it a next-generation solution. This enhances data security, and its security posture management is straightforward and user-friendly."
"BigID's scanning feature is its most valuable component."
"One of the most valuable things in a data-focused world is a tool, a technology that's data-centric, not trying to master data management or whatever else. It's a source of truth for what data an organization holds, giving it the ability to catalog, categorize, and understand its data."
"The features that I have found most valuable are the user experience, the credentialing, and that BigID is user friendly. Additionally, you can deploy to several other Microsoft platforms and you can use it for other things, like a bigger element or a report."
"BigID integrates well with our other products."
"The tool's most valuable feature is correlation. Using BigID's data classification capabilities has strengthened our data security. It lets me classify and connect data, which helps me manage data at various classification levels."
"When we started out, our secure score was pretty low. We adopted some of the recommendations that Security Center set out and we were able to make good progress on improving it. It had been in the low thirties and is now in the upper eighties."
"It's got a lot of great features."
"The most valuable features of this solution are the vulnerability assessments and the glossary of compliance."
"We saw improvement from a regulatory compliance perspective due to having a single dashboard."
"Defender lets you orchestrate the roll-out from a single pane. Using the Azure portal, you can roll it out over all the servers covered by the entire subscription."
"The solution's robust security posture is the most valuable feature."
"Defender is a robust platform for dealing with many kinds of threats. We're protected from various threats, like viruses. Attacks can be easily minimized with this solution defending our infrastructure."
"Technical support is helpful."
"The tool currently lacks security features."
"BigID is making some forays into the GRC space, and that's a natural progression. I'd like to see that improve so that data governance is better, data risk is identified, and the ability to control and mitigate it."
"Improvement could be made in data consent management and data privacy impact assessment."
"The challenge we encountered was with data connection across multiple databases. We struggled with configuring the data connection successfully. However, with the assistance of dynamic teams, we resolved this issue."
"BigID is expensive. I prefer McAfee."
"In terms of what could be improved, when you're looking in a BigID file, you cannot really get the whole file. You have to export it to download it to another platform that allows you to completely view it, or run a program. That was one of the things that was really a disappointing point for me. Not to be able to view everything. There's a lot more data, but you can't get it all at once."
"The documentation and implementation guides could be improved."
"The solution could extend its capabilities to other cloud providers. Right now, if you want to monitor a virtual machine on another cloud, you can do that. However, this cannot be done with other cloud platform services. I hope once that is available then Defender for Cloud will be a unified solution for all cloud platform services."
"From my own perspective, they just need a product that is tailored to micro-segmentation so I can configure rules for multiple systems at once and manage it."
"The product must improve its UI."
"Agent features need to be improved. They support agents through Azure Arc or Workbench. Sometimes, we are not able to get correct signals from the machines on which we have installed these agents. We are not able to see how many are currently reporting to Azure Security Center, and how many are currently not reporting. For example, we have 1,000 machines, and we have enrolled 1,000 OMS agents on these machines to collect the log. When I look at the status, even though at some places, it shows that it is connected, but when I actually go and check, I'm not getting any alerts from those. There are some discrepancies on the agent, and the agent features are not up to the mark."
"As an analyst, there is no way to configure or create a playbook to automate the process of flagging suspicious domains."
"We would like to have better transparency as to how the security score is calculated because as it is now, it is difficult to understand."
"Pricing could be improved. There are limited options based on pricing for the government."
BigID is ranked 8th in Data Security Posture Management (DSPM) with 6 reviews while Microsoft Defender for Cloud is ranked 3rd in Data Security Posture Management (DSPM) with 46 reviews. BigID is rated 8.0, while Microsoft Defender for Cloud is rated 8.0. The top reviewer of BigID writes "Commendable and robust data-centric tool". On the other hand, the top reviewer of Microsoft Defender for Cloud writes "Provides multi-cloud capability, is plug-and-play, and improves our security posture". BigID is most compared with Varonis Platform, Microsoft Purview Data Governance, Cyera , Collibra Governance and OneTrust DataGovernance, whereas Microsoft Defender for Cloud is most compared with AWS GuardDuty, Prisma Cloud by Palo Alto Networks, Microsoft Defender XDR, Wiz and Microsoft Defender for Endpoint. See our BigID vs. Microsoft Defender for Cloud report.
See our list of best Data Security Posture Management (DSPM) vendors.
We monitor all Data Security Posture Management (DSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.