


Find out what your peers are saying about Akamai, Broadcom, SentinelOne and others in Cloud and Data Center Security.
Illumio is known to be the cheapest solution among the security solutions we evaluated.
There is a net positive return on investment
The management console is very useful and easy to operate, allowing policy deployment in a minimal amount of time.
It adds value by providing centralized control over servers and endpoints.
If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working.
Even if we raise an issue on non-working days like Saturdays or Sundays, we receive prompt responses.
From my experience, they are very responsive.
The product is reliable, making customer support less frequently needed.
I usually need to raise the alarm and contact a couple of people within Palo Alto Networks to just respond quicker, so technical support should be much better.
We rarely need to contact support due to having a strong internal team and a robust product.
Whenever I raise a ticket, whether critical or high priority, their team responds immediately, often over calls, and works towards closing the request with the highest priority.
They have very professional engineers, and they often respond effectively.
A dedicated support engineer will come in within three hours.
Scaling it to a large level is not an issue for us.
To scale, one would need to upgrade or acquire more hardware.
Prisma Access provides significant scalability, allowing integration of different systems.
Prisma Access by Palo Alto Networks is a cloud-based solution, and from my experience, there are no issues with scalability.
Trend Micro Deep Security is highly scalable.
In most organizations, they are using a mix of these security solutions.
You can install it on a script basis for Linux and Windows.
Illumio is a stable solution with no glitches or bugs reported, making it a reliable product for us.
I think the stability of Prisma Access by Palo Alto Networks is excellent, and I would rate it ten out of ten.
Prisma Access by Palo Alto Networks works efficiently during peak usage times.
GlobalProtect is a satisfying solution, and the product is robust without major stability issues.
It has been extremely stable throughout our usage, with no major disturbances.
Trend Micro Deep Security is very stable and provides protection at all times without issues.
We believe that software works fine until it is patched, managed, or monitored by the IT teams.
There could also be more examples of how the automations can be done using Illumio.
That's why I'm looking for comparisons with other products.
There should be an option to upgrade from the console to the latest version instead of performing manual upgrades.
Hosting it in the cloud can mitigate these issues by allowing connection through the nearest Palo Alto or Prisma Cloud regional hub.
There is a lack of integration with third-party solutions like CrowdStrike or SentinelOne in Prisma Access by Palo Alto Networks.
Sometimes a third-party outage could impact the whole operability.
User experience improvement is most crucial, along with enhancements in policy management and the accuracy of the IPS, IDS features for real-time protection.
Additionally, the product is overpriced, which makes it difficult to sell to many customers.
The user interface could be more user-friendly, as navigation sometimes requires familiarity with the console.
I know that Illumio is the cheapest solution in the security area.
I think it's not very expensive if we compare it with Guardicore.
The pricing is on the higher side, rating it around eight to nine out of ten.
From my experience, Palo Alto is more expensive compared to solutions like Netskope and Triscale.
Pricing for Prisma Access and Prisma SD WAN is high due to the need for different hardware flavors like IONs.
We give a fair comparison of all the products, and give them clear insights of the products, which makes it helpful for the customer to make a final decision to purchase the license or product.
Trend Micro Deep Security is considered overpriced, which poses a challenge in selling it to many customers.
The pricing is moderate, not expensive or very cheap.
Illumio helps in audit purposes by saving data and showing blocked traffic, ensuring no outside traffic is allowed.
The most important feature is the traffic review analysis, where we use the draft view and the reported view that helps us understand how the application interacts with other applications in the environment, and based on that, we are able to define the policies.
The dependency map is the most valuable aspect.
These features are security-driven, providing robust protection against increasing cyber threats by integrating NG Firewalls, SD WAN, and CASB, all within a fully cloud-native solution.
GlobalProtect has been beneficial for its cloud security capabilities, which are vital as businesses seek hybrid options and need to support remote workers while addressing latency issues.
One of the most valuable features of Prisma Access by Palo Alto Networks is the ability to manage on-premise firewalls.
It has multiple security layers, including anti-malware, intrusion prevention, integrity monitoring, web reputation, application control, firewall, and log inspection.
Patching allows us to virtually patch servers without downtime, which is critical given our limited patching windows, and helps prevent servers from being exploited.
The IPS module offers virtual patches to resolve issues immediately, making it an excellent product that I recommend for anyone with servers.
| Product | Market Share (%) |
|---|---|
| Illumio | 18.6% |
| Akamai Guardicore Segmentation | 18.0% |
| Cisco Secure Workload | 11.0% |
| Other | 52.4% |
| Product | Market Share (%) |
|---|---|
| Prisma Access by Palo Alto Networks | 12.3% |
| Cato SASE Cloud Platform | 10.2% |
| Zscaler Zero Trust Exchange Platform | 9.7% |
| Other | 67.8% |
| Product | Market Share (%) |
|---|---|
| Trend Micro Deep Security | 38.5% |
| Juniper vSRX | 19.1% |
| Sophos Virtualization Security | 18.9% |
| Other | 23.5% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 24 |
| Midsize Enterprise | 21 |
| Large Enterprise | 27 |
| Company Size | Count |
|---|---|
| Small Business | 36 |
| Midsize Enterprise | 24 |
| Large Enterprise | 46 |
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
Illumio Zero Trust Segmentation Features
Illumio Zero Trust Segmentation has many valuable key features. Some of the most useful ones include:
Illumio Zero Trust Segmentation Benefits
There are many benefits to implementing Illumio Zero Trust Segmentation. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Illumio Zero Trust Segmentation is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has a good auto policy writing feature, great mapping, and useful monitoring.
Shashi, Technical Consultant at a financial services firm, explains which features she really likes. “The auto policy writing is great. The feature will give you the option of inbound-outbound traffic. The Explorer allows you to know the traffic between source and destination. The illumination definitely stands out. Mapping is great. The application group mapping is useful.”
The solution has “helpful support, useful monitoring, and high availability,” according to Edwin L., Security Architect at MGM.
Prisma Access by Palo Alto Networks provides consistent security for all users and applications across your remote networks. Prisma Access grants users safe access to the cloud and data center applications and the internet as well. In addition, the solution combines all of your security and networking capabilities into a single cloud-delivered platform, enabling flexible hybrid workforces.
Prisma Access can be managed two ways:
Prisma Access delivers both networking and security services, including:
Prisma Access by Palo Alto Networks Features
Prisma Access by Palo Alto Networks has many valuable key features including: App-ID, User-ID, Device-ID, SSL Decryption, Dynamic User Group (DUG) Monitoring, AI/ML-Based Detection, IoT Security, Reporting, URL Filtering, Enterprise Data Loss Prevention (DLP), Digital Experience Monitoring (DEM)*, Logging, Policy Automation, Intrusion Prevention System (IPS), and many more.
Prisma Access by Palo Alto Networks Benefits
Some of the benefits of using Prisma Access by Palo Alto Networks include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Microsoft Azure Synapse Analytics
users who are currently using the solution.
PeerSpot user Partha D., Global Network Tech Lead at a computer software company, speaks about his experience using the product, saying, "It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
Tejas J., a Sr. Cloud Security Architect at a computer software company, mentions that "it is geographically dispersed, and it sits on top of Google and AWS platforms. Therefore, you don't face the standard issues, such as latency or bandwidth issues, that you usually face in the case of on-prem data centers.”
Another PeerSpot reviewer, Max I., Associate Director at Cognizant, comments that "Security is absolutely spot-on, really top-notch. It's the result of all the components that come together, such as the HIP [Host Information Profile] and components like Forcepoint, providing end-user content inspection, and antivirus. It incorporates DLP features and that's fantastic because Prisma Access makes sure that all of the essential prerequisites are in place before a user can log in or can be tunneled into."
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.
Trend Micro Deep Security Features
Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:
Reviews from Real Users
Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:
One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”
Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”