CloudPassage and Illumio are well-regarded network security solutions. CloudPassage is noted for its ease of use and efficient deployment, but Illumio's robust feature set and scalability make it preferred for larger organizations.
Features: CloudPassage offers strong cloud workload protection, noted for its user-friendly automation and integration capabilities. CloudPassage provides competitive pricing while maintaining efficient support. Illumio is recognized for micro-segmentation and comprehensive security policies, featuring advanced analytics.
Room for Improvement: CloudPassage users suggest enhancements in reporting tools and increased integration options. Illumio users seek improvements in documentation and performance for high-traffic situations. Both could benefit from more responsive update cycles.
Ease of Deployment and Customer Service: CloudPassage is known for straightforward deployment and reliable support. Illumio's deployment is more complex, but users appreciate the effective support that helps during setup.
Pricing and ROI: CloudPassage offers competitive pricing with a positive return on investment due to low setup costs, ideal for small to medium enterprises. Illumio's higher cost corresponds to its advanced features, beneficial for larger organizations seeking comprehensive security solutions.
Product | Market Share (%) |
---|---|
SentinelOne Singularity Cloud Security | 3.2% |
Illumio | 6.5% |
CloudPassage | 0.2% |
Other | 90.1% |
Company Size | Count |
---|---|
Small Business | 43 |
Midsize Enterprise | 21 |
Large Enterprise | 53 |
Company Size | Count |
---|---|
Small Business | 3 |
Midsize Enterprise | 1 |
Large Enterprise | 7 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
CloudPassage Halo is an agile security and compliance platform that works in any cloud infrastructure: public, private or hybrid. The platform is unique because it provides continuous visibility and enforcement delivered as a service, so it’s on-demand, fast to deploy, fully automated and works at any scale.
The CloudPassage platform delivers a comprehensive set of security and compliance features, so you don’t have pay for and manage point solutions that often don’t integrate well with each other. Hundreds of companies use CloudPassage as a strategy to take full advantage of the business benefits of their cloud investments, with the confidence that critical business assets are protected. Using CloudPassage, security organizations achieve 6 critical control objectives with a platform that is flexible, fast and scalable:
Visibility: Immediate, consistent, continuous knowledge of what assets exist, where they reside, and what they’re doing.
Strong Access Control: Strong, layered controls enabling authorized access & denial of resources to unauthorized entities.
Vulnerability Management: Continuous detection & elimination of issues that create exploitable points of weakness.
Data Protection: Assurance that critical data is encrypted & used appropriately by authorized entities while in motion or at rest.
Compromise Management: Capabilities that enable detection & response to malicious or accidental compromise of resources.
Operational Automation: Day-to-day management of technologies & processes that ensure security & compliance.
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
Illumio Zero Trust Segmentation Features
Illumio Zero Trust Segmentation has many valuable key features. Some of the most useful ones include:
Illumio Zero Trust Segmentation Benefits
There are many benefits to implementing Illumio Zero Trust Segmentation. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Illumio Zero Trust Segmentation is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has a good auto policy writing feature, great mapping, and useful monitoring.
Shashi, Technical Consultant at a financial services firm, explains which features she really likes. “The auto policy writing is great. The feature will give you the option of inbound-outbound traffic. The Explorer allows you to know the traffic between source and destination. The illumination definitely stands out. Mapping is great. The application group mapping is useful.”
The solution has “helpful support, useful monitoring, and high availability,” according to Edwin L., Security Architect at MGM.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.