We performed a comparison between CloudPassage and Illumio based on real PeerSpot user reviews.
Find out in this report how the two Cloud Workload Protection Platforms (CWPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"The user interface is well-designed and easy to navigate."
"PingSafe's most valuable feature is its unified console."
"It is scalable, stable, and can detect any threat on a machine. It uses artificial intelligence and can lock down any virus."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"PingSafe offers an intuitive user interface that lets us navigate quickly and easily."
"The UI is responsive and user-friendly."
"It is fairly simple. Anybody can use it."
"Key features are the Software Vulnerability Assessment and the CSM, which is the configuration check."
"Policies are very easy to manage on a day-to-day basis."
"The flexibility of the solution is its most valuable feature."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"The solution is easy to use."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The Explorer allows you to know the traffic between source and destination."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"Scanning capabilities should be added for the dark web."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"Maybe container runtime security could be improved."
"I want PingSafe to integrate additional third-party resources. For example, PingSafe is compatible with Azure and AWS, but Azure AD isn't integrated with AWS. If PingSafe had that ability, it would enrich the data because how users interact with our AWS environment is crucial. All the identity-related features require improvement."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"Of all the advertised functions, I only find two things that really work in my environment, even though I wanted to use all of them. They're not flexible enough to be used."
"Anything outside of the software vulnerability management and the CSM, things like the GhostPort, need some improvement. The dashboard is in beta. It looks really good, I wish it would come out of beta."
"The reports and graphs are unintuitive."
"In the CSM module the policies are really hard to work with it. It is not very flexible at all. I would suggest that they change that. Right now, the scan is based on the group that the server is in. What happens if the server is in multiple groups?"
"I would like to see better data security in the product."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
"The customer service is lagging a bit. It could be better."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"The product’s agents don't work very well in OT environments."
"It requires a low-level re-architecting of the product."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Earn 20 points
CloudPassage is ranked 41st in Cloud Workload Protection Platforms (CWPP) while Illumio is ranked 14th in Cloud Workload Protection Platforms (CWPP) with 8 reviews. CloudPassage is rated 8.0, while Illumio is rated 8.0. The top reviewer of CloudPassage writes "CloudPassage has a bunch of features. Be sure you understand all of them and how to extract value to your organization". On the other hand, the top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". CloudPassage is most compared with , whereas Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Zero Networks Microsegmentation. See our CloudPassage vs. Illumio report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.