

Find out what your peers are saying about Akamai, Broadcom, Illumio and others in Cloud and Data Center Security.
| Product | Mindshare (%) |
|---|---|
| Illumio | 16.1% |
| Akamai Guardicore Segmentation | 15.2% |
| VMware NSX | 10.2% |
| Other | 58.5% |
| Product | Mindshare (%) |
|---|---|
| Tigera | 0.5% |
| Wiz | 9.7% |
| Prisma Cloud by Palo Alto Networks | 8.0% |
| Other | 81.8% |

| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 1 |
| Large Enterprise | 12 |
Illumio enhances security through micro-segmentation and real-time traffic control, offering detailed network visibility and precise application communication management. It supports scalability across environments, improving security posture and reducing lateral movement.
Illumio's features include real-time traffic control, micro-segmentation, and scalable policy management, allowing organizations to establish strict security measures against threats like ransomware. Its visibility map offers granular security insights essential for creating effective policies and auditing traffic. Centralized rule distribution and comprehensive traffic mapping augment security across environments. The platform's design ensures ease of deployment and compatibility, reducing unauthorized access by focusing on threat isolation and breach containment. While Illumio excels in flexibility and visibility, it requires advancements in technical support, third-party integrations, and user-friendly policy management to better support diverse operating systems and larger environments. Improved reporting, analytics, and automation for policy creation are necessary alongside reduced dependency on agents and enhanced data security measures.
What are Illumio's most important features?Illumio is frequently deployed in industries where network segmentation is critical, such as finance and healthcare, offering detailed network visibility and control over application communication. Organizations integrate it seamlessly with existing infrastructures, facilitating the deployment of VENs and effective policy management to secure hybrid cloud and on-premises environments, ensuring compliance and defending against evolving threats.
Tigera offers a cloud-native network security and observability platform designed for Kubernetes, enhancing the security posture and performance insights of container environments.
Tigera specializes in providing a comprehensive solution tailored for Kubernetes environments, addressing the complex challenges of securing containerized applications. It stands out with its capability to offer security, compliance, and observability in a single framework, enabling IT teams to manage workloads effectively. Users value its seamless integration with Kubernetes and the ability to automate security processes, ensuring high-level protection across clusters.
What features make Tigera valuable?Industries implementing Tigera, like finance and healthcare, benefit from its advanced security and compliance features, crucial for protecting sensitive data. By integrating Tigera, organizations improve not only security measures but also gain deeper operational insights, aligning security with regulatory requirements in dynamic environments.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.