


Find out what your peers are saying about Akamai, Broadcom, Illumio and others in Cloud and Data Center Security.
| Product | Mindshare (%) |
|---|---|
| Illumio | 16.1% |
| SentinelOne Singularity Cloud Security | 3.4% |
| Xtended ZeroTrust Security Platform | 1.0% |
| Other | 79.5% |



| Company Size | Count |
|---|---|
| Small Business | 52 |
| Midsize Enterprise | 23 |
| Large Enterprise | 58 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 1 |
| Large Enterprise | 12 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?
What benefits should users expect from SentinelOne Singularity Cloud Security?
SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Illumio enhances security through micro-segmentation and real-time traffic control, offering detailed network visibility and precise application communication management. It supports scalability across environments, improving security posture and reducing lateral movement.
Illumio's features include real-time traffic control, micro-segmentation, and scalable policy management, allowing organizations to establish strict security measures against threats like ransomware. Its visibility map offers granular security insights essential for creating effective policies and auditing traffic. Centralized rule distribution and comprehensive traffic mapping augment security across environments. The platform's design ensures ease of deployment and compatibility, reducing unauthorized access by focusing on threat isolation and breach containment. While Illumio excels in flexibility and visibility, it requires advancements in technical support, third-party integrations, and user-friendly policy management to better support diverse operating systems and larger environments. Improved reporting, analytics, and automation for policy creation are necessary alongside reduced dependency on agents and enhanced data security measures.
What are Illumio's most important features?Illumio is frequently deployed in industries where network segmentation is critical, such as finance and healthcare, offering detailed network visibility and control over application communication. Organizations integrate it seamlessly with existing infrastructures, facilitating the deployment of VENs and effective policy management to secure hybrid cloud and on-premises environments, ensuring compliance and defending against evolving threats.
Xtended ZeroTrust Security Platform offers a comprehensive approach to securing digital infrastructures by implementing a zero-trust model that enhances protection across all endpoints and improves threat detection.
Designed to prioritize security by verifying every user and device, Xtended ZeroTrust Security Platform integrates seamlessly into existing IT infrastructure. Recognized for its robust authentication mechanisms and real-time analytics, it strengthens compliance and risk management frameworks. Organizations value its capability to reduce attack surfaces while fostering adaptive access controls.
What are the most important features of Xtended ZeroTrust Security Platform?In industries like finance and healthcare, Xtended ZeroTrust Security Platform is instrumental in safeguarding sensitive data. Its implementation often includes deploying multi-factor authentication and micro-segmentation to protect critical assets. Clients in these sectors appreciate its role in maintaining data integrity and confidentiality, ensuring compliance with stringent industry standards while supporting digital transformation initiatives.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.