Over 279,075 professionals have used IT Central Station research.
Compare the best Cloud Workload Security vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
The ability to scan our AWS accounts to understand what is not in alignment with our best practices is huge for us. Evident.io currently only queries AWS accounts for certain configuration values that it regards as security issues. For... more»
This enables us to clean up our existing AWS accounts and update our processes for new accounts. This improves our overall security process to an acceptable level. We are building out new AWS accounts which are secured from the beginning... more»
This product needs to focus on real-time analysis. Currently, it only focuses on configuration settings. Giving us the ability to analyze CloudTrail results would enable us to take security to the next level. If someone made an error and... more»
I know when we first got it, it covered all aspects of our AWS account. There was some infrastructure that someone else on my team built out. In doing so, it left something open to the public that normally wouldn't have been caught. But we... more»
I don't really have any areas in which they can improve. Throughout our use of it, there have been things here and there. I've always opened a support ticket and everything's been taken care of within a couple of weeks. There are no open... more»
* Our scores let us know when to trigger workflow to go out in a patch. * It has reduced the amount of time we had to take to manually verify software and check our updates. * It helped us be more aware of what our security posture is. We use... more»
Anything outside of the software vulnerability management and the CSM, things like the GhostPort, need some improvement. The dashboard is in beta. It looks really good, I wish it would come out of beta. Also, in the CSM module the policies... more»
* Centralized firewall management for both Windows and Linux distros - This is something that everyone is looking for. The initial version of Dome9 was one where you managed all the rules centrally in Linux and Windows, which was quite... more»
We have an FTP infrastructure that is accessed by customers. As FTP service is quite vulnerable if not secured properly, before implementing Dome9 we had to apply multiple security solutions on the FTP servers. Dome9 wrapped the FTP... more»
Clarity and Compliance have become two of our favorite features. Clarity allows us to visually depict our security groups and effective policy for both our current environment and can do predictive visualization based on cloud formation... more»
Dome9 continues to be a major piece of our cloud security architecture and has given our senior leadership team a high degree of confidence in our ability to protect our cloud environment. We have more visibility than ever before,... more»
Dome9 continues to enrich its features at a blazingly fast pace. I would like to see tighter integration with other compliance tools, like Chef Compliance, in addition to Inspector. Also, I would love to add more richness to the Splunk add-on... more»
The ability to audit each AWS account at a high level so we can see critical vulnerabilities that might otherwise be overlooked. The granular approach helps me to drill down and deal with each alert properly and individually.
I would like to see integration of PCI audits into the dashboard. That would help greatly in passing our PCI audits for AWS in an easy-to-view method. I would also like the ability to integrate Evident with AWS in such a way that we could... more»
I like being able to see the alerts that are going on and being able to remediate them. I like the dashboards and the recording is good. They're coming out with newer features and they have a feature request thing.
It allows me to do is see what's happening in our AWS account. I have several, so this is a nice, single pane, point of view for me whenever I have to make sure that configurations are as secure as possible.
Policies are very easy to manage on a day-to-day basis. With few clicks in their cloud management portal, you can implement and change security policies in thousand of servers. This feature allowed us to implement changes in our environment... more»
Before CloudPassage, the management of security policies in our servers was painful and time-consuming. CloudPassage allowed us to implement changes that affected hundred of servers within our environments in seconds.
The reports and graphs are unintuitive. Also, there is no feature or CloudPassage tool that facilitates the implementation of the agents. We had to use third-party software to implement and update the agents.
We started long ago with the dynamic access and protected assets, and it has always been a cornerstone for our highly mobile, distributed development team. We require tight control on access, and when our team travels it helps us gain access... more»
The governance and compliance areas are becoming very useful, and continue to expand in very user-friendly ways. Addressing the large amount of compliance information and benchmarks we need to observe, the tools are becoming our goto dashboards.
It has allowed our credit union to achieve the Evolving status on the FFIEC Cybersecurity Maturity model. Vibrant has worked for the last three years to adopt a cloud-first strategy. By doing so, we have become more agile and cost competitive... more»