One area for improvement in Symantec Cloud Workload Protection is integration. Other features that could be improved are defense control and encryption, particularly in the USB. For example, users should be able to control the USB and have the capability of blocking and allowing USB reading and writing. Having a USB encryption feature in Symantec Cloud Workload Protection would also be very useful. An additional feature I'd like to see in the next release of Symantec Cloud Workload Protection is more advanced defense on mobile devices such as iOS and Android. For example, even offline or with no internet connection, it would be good if the solution could defend devices against malware and ransomware.
Find out what your peers are saying about Broadcom, Check Point Software Technologies, Amazon Web Services (AWS) and others in Cloud Workload Protection Platforms (CWPP). Updated: April 2025.
Cloud Workload Protection Platforms (CWPP) offer comprehensive security and protection for applications running in cloud environments. These solutions help organizations ensure their workloads are secure from various cyber threats, enhancing overall cloud security.
Targeting organizations with substantial cloud footprint, Cloud Workload Protection Platforms integrate with existing cloud infrastructure to provide seamless security features. These solutions typically include threat detection,...
One area for improvement in Symantec Cloud Workload Protection is integration. Other features that could be improved are defense control and encryption, particularly in the USB. For example, users should be able to control the USB and have the capability of blocking and allowing USB reading and writing. Having a USB encryption feature in Symantec Cloud Workload Protection would also be very useful. An additional feature I'd like to see in the next release of Symantec Cloud Workload Protection is more advanced defense on mobile devices such as iOS and Android. For example, even offline or with no internet connection, it would be good if the solution could defend devices against malware and ransomware.
In the future, we may need to use features that are only available in one of the competing products.