We performed a comparison between BMC Helix Cloud Security and Cisco Secure Workload based on real PeerSpot user reviews.
Find out in this report how the two Cloud Workload Protection Platforms (CWPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is fairly simple. Anybody can use it."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"The management console is highly intuitive to comprehend and operate."
"We really appreciate the Slack integration. When we have an incident, we get an instant notification. We also use Joe Sandbox, which Singularity can integrate with, so we can verify if a threat is legitimate."
"The UI is very good."
"The ease of use of the platform is very nice."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"It's also multi-cloud. You can look at several cloud providers: AWS, Azure, or GCP."
"The most valuable aspects of BMC Helix Cloud Security are its security features and regulatory compliance capabilities."
"The features that I've found most valuable are its container security aspect. I also like its vulnerability management tools."
"The best feature is time to value. With very minimal effort, you are able to have a cohesive view into your security posture on one or multiple cloud accounts, particularly if you are dealing with multicloud. If you have Azure and AWS deployments, you might have multiple subscriptions in Azure and usually multiple accounts in AWS. You may even be doing some GCP work (around Google Cloud Platform). It's very difficult to manage a common set of policies, even less reporting, across multiple subscriptions, accounts, and cloud environments. What BMC Helix Cloud Security does is provide a unified view or single pane of glass as to your baseline. Then, it also facilitates the ability for Level 1 or 2 operations support to take action and report on security vulnerabilities."
"Role-based security is a valuable feature."
"The cool feature of Helix Cloud Security is that you can do all that — understand and remediate issues — in one dashboard, based on the different policies that are available for security, out-of-the-box."
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"The product offers great visibility into the network so we can enforce security measures."
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"The product provides multiple-device integration."
"Scalability is its most valuable feature."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time."
"The most valuable feature of the solution is that we don't have to do packet captures on the network."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"I'd like to see better onboarding documentation."
"It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."
"I want PingSafe to integrate additional third-party resources. For example, PingSafe is compatible with Azure and AWS, but Azure AD isn't integrated with AWS. If PingSafe had that ability, it would enrich the data because how users interact with our AWS environment is crucial. All the identity-related features require improvement."
"PingSafe can improve by eliminating 100 percent of the false positives."
"Bugs need to be disclosed quickly."
"The integration with Oracle has room for improvement."
"BMC Helix Cloud Security has room for improvement in terms of integrating its various features."
"I want the role-based security feature to be improved."
"We've had some with issues connectors. The connectors have seemed to have caused a little bit of trouble, perhaps with the APIs trying to scan the environment. The only time I've had to reach out to tech support was for that. It seems it may not have been scanning correctly or I wasn't seeing data within a specific time. But we've set up a couple of connectors in the past couple of weeks and they actually scanned the AWS environment and we had data within about 10 minutes. It's working a lot faster and I think they're making improvements as they go."
"Every organization out there doesn't rely on just one control body. They use FISMA control. They may use HIPAA, CIS, PCI, or SOX, then blend them. One of the things that is now in big demand for BMC Helix Cloud Security is content. That's the next journey in its lifespan, making it easier for the community to share and collaborate on content for security controls that can be measured and remediated."
"The UI could be more user-friendly."
"It has an uninviting interface."
"The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools."
"I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
BMC Helix Cloud Security is ranked 25th in Cloud Workload Protection Platforms (CWPP) with 5 reviews while Cisco Secure Workload is ranked 20th in Cloud Workload Protection Platforms (CWPP) with 13 reviews. BMC Helix Cloud Security is rated 8.0, while Cisco Secure Workload is rated 8.4. The top reviewer of BMC Helix Cloud Security writes "A highly scalable and straightforward solution with a knowledgeable support team". On the other hand, the top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". BMC Helix Cloud Security is most compared with Red Hat Advanced Cluster Security for Kubernetes, VMware Aria Operations, Threat Stack Cloud Security Platform and CloudBolt, whereas Cisco Secure Workload is most compared with Akamai Guardicore Segmentation, Illumio, VMware NSX, Prisma Cloud by Palo Alto Networks and Cisco ACI. See our BMC Helix Cloud Security vs. Cisco Secure Workload report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.