Illumio surpasses its competitors by offering dynamic security segmentation, real-time visibility, and simplified security management, enabling organizations to protect critical applications and data across any environment seamlessly and efficiently.
Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.Â
Purchasing on the AWS Marketplace is like shopping on Amazon Prime.
We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency.
Purchasing on the AWS Marketplace is like shopping on Amazon Prime.
We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency.
Amazon Guard Duty is a continuous cloud security monitoring service that consistently monitors and administers several data sources. These include AWS CloudTrail data events for EKS (Elastic Kubernetes Service) audit logs, VPC (Virtual Private Cloud) flow logs, DNS (Domain Name System) logs, S3 (Simple Cloud Storage), and AWS CloudTrail event logs.
Amazon GuardDuty intuitively uses threat intelligence data - such as lists of malicious domains and IP addresses - and ML (machine learning) to quickly discover suspicious and problematic activity in a user's AWS ecosystem. Activities may include concerns such as interactions with malicious IP addresses or domains, exposed credentials usage, or changes and/or escalation of privileges.
GuardDuty is able to easily determine problematic AWS EC2 (Elastic Compute Cloud) instances delivering malware or mining bitcoin. It is also able to trace AWS account access history for evidence of destabilization. such as suspicious API calls resulting in changing password policies to minimize password strength or anomalous infrastructure deployments in new or different never-used regions.
We use a pay-as-you-use license, which is competitively priced in the market.
I don't have all the details in terms of licensing for Amazon GuardDuty, but my organization does have a license set up for it.
We use a pay-as-you-use license, which is competitively priced in the market.
I don't have all the details in terms of licensing for Amazon GuardDuty, but my organization does have a license set up for it.
At Orca Security, we’re on a mission to make it fast, easy, and cost effective for organizations to address critical cloud security issues so they can operate in the cloud with confidence.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
Akamai Guardicore Segmentation is a software-based microsegmentation solution that provides the simplest, fastest, and most intuitive way to enforce Zero Trust principles. It enables you to prevent malicious lateral movement in your network through precise segmentation policies, visuals of activity within your IT environment, and network security alerts. Akamai Guardicore Segmentation works across your data centers, multicloud environments, and endpoints. It is faster to deploy than infrastructure segmentation approaches and provides you with unparalleled visibility and control of your network.
Compared to the pricing we were seeing from both Illumio and Edgewise, Guardicore was very competitive.
Guardicore Centra provides better value for money than NSX, was the other solution that we looked at, which was too expensive for what it does.
Compared to the pricing we were seeing from both Illumio and Edgewise, Guardicore was very competitive.
Guardicore Centra provides better value for money than NSX, was the other solution that we looked at, which was too expensive for what it does.
VMware NSX aids in transitioning from physical to VM infrastructure, micro-segmentation, network virtualization, building private clouds, and enhancing network security. Companies benefit from configuring virtual networks, reducing physical devices, and advanced security measures. However, cost, certification, routing, automation, and scalability require improvements, as do security features, integration, and support.
Pricing and licensing could be improved as we are a government entity. Lower pricing could always help.
It has helped to save CAPEX.
Pricing and licensing could be improved as we are a government entity. Lower pricing could always help.
It has helped to save CAPEX.
Aqua Security stops cloud native attacks, preventing them before they happen and stopping them when they happen. Dedicated cloud native threat research and the most loved cloud native security open source community in the world put innovation at your fingertips so you can transform your business. Born cloud native, The Aqua Platform is the most integrated Cloud Native Application Protection Platform (CNAPP), securing from day one and protecting in real-time. Aqua has been stopping real cloud native attacks on hundreds of thousands of production nodes across the world since 2015.
Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle.
The pricing of this solution could be improved.
Aqua Security is not cheap, and it's not very expensive, such as Splunk, they are in the middle.
The pricing of this solution could be improved.
Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.
Having information stolen by a hacker would be more expensive than purchasing a license.
Being able to keep the phishing campaigns out of my company has been ROI for me.
Having information stolen by a hacker would be more expensive than purchasing a license.
Being able to keep the phishing campaigns out of my company has been ROI for me.
Cisco Secure Workload is a cloud and data security solution that offers a zero-trust policy of keeping an organization’s application workloads safe and secure throughout the entire on-premise and cloud data center ecosystems.
The pricing is a bit higher than we anticipated.
The price is outrageous. If you have money to throw at the product, then do it.
The pricing is a bit higher than we anticipated.
The price is outrageous. If you have money to throw at the product, then do it.
Check Point CloudGuard CNAPP offers cloud workload security, vulnerability management, compliance enforcement, and centralized visibility across multi-cloud environments. It supports AWS, Azure, GCP, and hybrid infrastructures with automated remediation, threat detection, IAM management, customizable governance, threat intel integration, and granular reports. Enhancements needed in policy validation, customer support, and integration simplicity.
It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution.
Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges.
It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution.
Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges.
SUSE NeuVector is a full lifecycle container security solution that helps your organization secure its container infrastructures, manage Kubernetes security risks, and block threats. The NeuVector continuous container security and compliance platform simplifies data protection from pipeline to production, enforces compliance, and provides complete visibility and automated controls for protection against known and unknown threats. In addition, NeuVector is the only Kubernetes-native container security solution that offers a comprehensive risk profile of known vulnerabilities and also delivers immediate protection from all vulnerabilities.
Licensing fees are paid yearly.
The solution's pricing could be better. The cost of a subscription is calculated on the basis of work.
Licensing fees are paid yearly.
The solution's pricing could be better. The cost of a subscription is calculated on the basis of work.
A big company can automate it themselves or spend a lot of money and buy it.
The price could be improved. It is expensive, but then again, it is Cisco. The price is worth what you pay for.
A big company can automate it themselves or spend a lot of money and buy it.
The price could be improved. It is expensive, but then again, it is Cisco. The price is worth what you pay for.
Check Point CloudGuard Network Security provides firewall security, VPN connections, and network traffic protection in AWS, Azure, and other cloud environments. Users value its flexibility, scalability, centralized management, and integration with major cloud providers. However, they note complexity, high costs, stability issues, and a need for better zero-day threat detection.
On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco.
It is more expensive than other solutions and would be more competetive in the market if it came down in price.
On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco.
It is more expensive than other solutions and would be more competetive in the market if it came down in price.
Zero Networks offers a cybersecurity solution designed to automate network security by implementing a zero-trust model. It focuses on ensuring that every network connection is authenticated and authorized, reducing the risk of unauthorized access and lateral movement within an organization’s network.
Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.
vArmour addresses these data center security challenges by delivering the industry’s first distributed security system that provides application-aware micro-segmentation with advanced security analytics. Built in software, vArmour DSS Distributed Security System is architected to scale security across multi-clouds with deep insight and control of individual workloads. With its patented application-aware micro-segmentation capabilities, vArmour DSS moves security controls that were traditionally at the perimeter down next to each asset, wrapping fine-grained protection around every workload, regardless of where it resides. Workload-level visibility and control of inbound, outbound, and lateral traffic patterns from vArmour DSS helps organizations detect and prevent application misuse, policy violations, and advanced persistent threats across complex multi-cloud environments from a single system.
Airgap Zero Trust Enterprise stands out in the cybersecurity realm, catering to organizations seeking robust network security and access management solutions. Designed for a variety of key applications, it ensures secure access across any network condition, crucial for remote work setups. It effectively protects sensitive data from unauthorized access, thus preventing breaches. The enforcement of least-privilege access controls by limiting users' access to what's necessary for their roles, paired with the automation of security policy compliance, underlines its comprehensive security approach.
Users most value the Ransomware Kill Switch feature for its immediate response capabilities, alongside the platform's ease of deployment and use. Enhanced visibility and control over network access, coupled with exceptional support for secure remote workforces, further emphasize its effectiveness. Notably, organizations report significant benefits including enhanced operational efficiency, boosted team collaboration, and cost reductions, attributed to the platform's user-friendly interface and efficient resource use.
In essence, Airgap Zero Trust Enterprise is a pivotal tool for organizations aiming to fortify their cybersecurity posture while optimizing performance and resource use.
Segmentation projects fail when security teams lack accurate records of how applications operate. Only TrueFort provides a deep mapping of assets operating in the environment and the continuous behavior analysis needed to enforce automated blocking policies. Best-in-class microsegmentation means lateral movement control across network, process, and service account activity.