We performed a comparison between Check Point CloudGuard Posture Management and Illumio Zero Trust Segmentation based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point CloudGuard Posture Management provides solid data security, advanced incident detection, and detailed reporting. It offers IAM role control and governance support. Illumio Zero Trust Segmentation has been praised for its automated policy writing and visibility into application communication and network protocols. Check Point CloudGuard Posture Management could be more customizable and improve its false positives rate and vulnerability assessments. Users suggested that Zero Trust Segmentation should support more operating systems and improve its labeling functionality.
Service and Support: Check Point CloudGuard Posture Management customer service has garnered positive feedback, highlighting prompt responses and pleasant support experiences. Some Illumio Zero Trust Segmentation customers commended the support team, while others expressed discontentment.
Ease of Deployment: The setup for Check Point CloudGuard Posture Management is fast and straightforward, requiring only a few minutes. Setting up Illumio Zero Trust Segmentation is significantly lengthier, taking around six months to finish.
Pricing: Some users found Check Point CloudGuard Posture Management affordable, but a few reviewers thought it was expensive and recommend exploring alternative options. Illumio Zero Trust Segmentation is generally considered expensive.
ROI: Check Point CloudGuard Posture Management provided our reviewers with a solid return by simplifying administration and compliance solutions. We have not received feedback on ROI from Illumio Zero Trust Segmentation users.
Comparison Results: Our users prefer Check Point CloudGuard Posture Management over Illumio Zero Trust Segmentation. CloudGuard is praised for its comprehensive data security, granular reporting, and ruleset customization. It offers visibility into traffic flow, threat detection, and real-time attack prevention. Users appreciate its intuitive dashboard, powerful reporting, and ability to enhance security. Illumio Zero Trust Segmentation is criticized for its limited operating system support and lack of effective agents in certain environments. Users also desire better customer service and improved data security.
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"The ease of use of the platform is very nice."
"We use the infrastructure as code scanning, which is good."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"With PingSafe, it's easy to onboard new accounts."
"PingSafe's most valuable feature is its unified console."
"We liked the search bar in PingSafe. It is a global search. We were able to get some insights from there."
"The reporting is quite good. It is the most powerful aspect of this solution."
"The solution offers an excellent price, benefit, and installation relationship."
"The solution has intelligence that integrates with a range of threat intelligence feeds, including Check Point's ThreatCloud, to provide real-time intelligence on emerging threats."
"This solution provides threat prevention and detection of anomalies automatically and investigates the activity of each one of them."
"It provides complete visibility of workload hosted on different cloud platforms including AWS and Azure, along with multiple tenants."
"The two most valuable features for us are the central firewall administrator and the real-time cloud compliance monitoring."
"Gives us centralized firewall management for both Windows and Linux distros. Also provides a clear view of the security configurations and connections across environments (DMZ, external and internal networks)."
"The audit feature is the most valuable for compliance reasons. It gives you a full view of the whole environment, no matter how many accounts you have in AWS or Azure. You have it all under one umbrella."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"The solution is easy to use."
"The Explorer allows you to know the traffic between source and destination."
"The flexibility of the solution is its most valuable feature."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"They can work on policies based on different compliance standards."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"We'd like to have better notifications. We'd like them to happen faster."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"The performance can be better. Sometimes, the performance is not up to the mark. There is also integration complexity with third-party software and tools."
"We want to be able to customize the solution more in order to meet the needs of our company."
"Reporting should have more options."
"The support must be more effective."
"The accuracy of its remediation is a 7.5 out of 10. Before, I would have given it a ten but now, to handle remediation for fully qualified domain names, it's not working as it did in the past. We're finding some difficulties there."
"The tool has a lot of potential, but today, it lacks a lot of Scripts/Bots for Azure."
"The support it provides is not very good. They should improve it since we have had several setbacks due to support issues."
"The dashboard customization has room for improvement."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"The product’s agents don't work very well in OT environments."
"I would like to see better data security in the product."
"It requires a low-level re-architecting of the product."
"The customer service is lagging a bit. It could be better."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Check Point CloudGuard CNAPP is ranked 8th in Cloud and Data Center Security with 64 reviews while Illumio is ranked 4th in Cloud and Data Center Security with 8 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Illumio is rated 8.0. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, Wiz, AWS GuardDuty, Microsoft Defender for Cloud and Qualys VMDR, whereas Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Zero Networks Microsegmentation. See our Check Point CloudGuard CNAPP vs. Illumio report.
See our list of best Cloud and Data Center Security vendors and best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.