


Find out what your peers are saying about Akamai, Broadcom, Illumio and others in Cloud and Data Center Security.
| Product | Mindshare (%) |
|---|---|
| Symantec Data Center Security | 3.0% |
| Illumio | 16.1% |
| Akamai Guardicore Segmentation | 15.2% |
| Other | 65.7% |
| Product | Mindshare (%) |
|---|---|
| Trellix Embedded Control | 2.5% |
| Nozomi Networks | 13.3% |
| Armis | 11.9% |
| Other | 72.3% |
| Product | Mindshare (%) |
|---|---|
| TrendAI Deep Security | 35.7% |
| Juniper vSRX | 18.9% |
| Sophos Virtualization Security | 16.9% |
| Other | 28.5% |


| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 2 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 37 |
| Midsize Enterprise | 24 |
| Large Enterprise | 47 |
Symantec Data Center Security provides comprehensive server protection with features like hard disk protection, file integrity monitoring, and centralized management, making it suitable for securing legacy systems and preventing unauthorized access.
Focusing on server integrity and data protection, Symantec Data Center Security delivers robust intrusion prevention, system lockdown, and specific control over server access. With a customizable rule set, it enhances server hardening by fine-tuning access controls without relying on IPS signature detection. While offering significant advantages for managing legacy infrastructure, it also requires improvements in platform metrics, compatibility, speed, and integration with third-party products. Users face challenges with false positives, policy complexity, and compatibility issues, particularly regarding Microsoft and virtualization improvements.
What Key Features Does Symantec Data Center Security Offer?In industries like finance, healthcare, and technology, Symantec Data Center Security is implemented to protect server integrity particularly in environments using Docker containers and legacy systems. It supports remote operations, enforces stringent access policies, and locks down systems while offering valuable audit capabilities for code changes, especially on Linux.
Trellix Embedded Control offers robust security and compliance for embedded systems, ensuring protection against unauthorized changes and cyber threats.
This security solution efficiently safeguards critical applications by providing a proactive defense for embedded systems in industries like energy, healthcare, and manufacturing. It enhances the reliability and resilience of operations through a novel approach to application whitelisting and change control, maintaining integrity across complex deployments.
What features define Trellix Embedded Control?Adoption of Trellix Embedded Control varies across industries, but in healthcare, it ensures that medical devices remain uncompromised. In energy, it secures grid control systems from unauthorized access, while in manufacturing, it guards against tampering with production systems, maintaining the integrity crucial for operational success.
TrendAI Deep Security offers advanced protection with anti-malware, virtual patching, and intrusion prevention. It supports hybrid and cloud environments, providing comprehensive security solutions for large organizations.
TrendAI Deep Security provides a robust suite of features tailored for defending systems against evolving threats. With centralized management, it seamlessly integrates with hybrid and cloud environments. Notable is its virtual patching, which reduces zero-day vulnerability risks and downtime, making it an optimal choice for large corporations seeking extensive protection. Despite challenges like less intuitive dashboards, compatibility, and performance issues during scanning, it excels in server and endpoint protection, intrusion detection, and application control. It's particularly effective in financial sectors and integrates with cloud platforms to automate security policy deployment.
What are TrendAI Deep Security's most significant features?Organizations in sectors like finance deploy TrendAI Deep Security for its virtual patching and hybrid environment support. The solution's adaptability across cloud platforms ensures secure workloads, making it essential for environments requiring robust threat detection and monitoring.