Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.
Most Views
From IT Central Station visitors
Most Reviews
Within the last 24 months

Virtualization Security Reviews

Read top reviews of Virtualization Security solutions from the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Real User
Firewall Engineer at a tech services company with 10,001+ employees
Jun 25 2017

What is most valuable?

Currently we use Juniper products, SSG and SRX firewalls in about a 50/50 mix both standalone and in HA clusters. We also use their NSM for device management and logging. The SSG models are mostly EOL and are being replaced with new “Next... more»

How has it helped my organization?

I can’t really say a firewall improves anything other than security, but we have been able to solve a lot of extranet connectivity issues with these firewalls that the bigger name devices didn’t handle so well. It is bomb proof as seen by the... more»

What needs improvement?

While the OS supports a pretty full UTM option, we found in testing that the hardware was not powerful enough to run with all the bells and whistles turned on for the amount of traffic we process. So we use other hardware for those services... more»
Consultant
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Jul 06 2017

What do you think of Trend Micro Deep Security?

Valuable Features: It is lightweight and provides a multi-platform for the client. It combines host intrusion prevention and provides AV, file monitoring, log collection, etc. in a single agent. There are a good signature set and a high rate of detection. It is one of the best client protection available for cloud computing. • Use of Solution: I have used this product for three years. • Stability Issues: Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver. The typical client-server issues exist as with any other product. • Initial Setup: The setup is simple as the agent provides a feature called as the Recommendation Scan. This scans the profiles of the host computer and...

Have A Question About Virtualization Security?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
Real User
Technical Specialist at Wysetek Systems Technologists Pvt. Ltd.
Jan 18 2018

What do you think of Trend Micro Deep Security?

Improvements to My Organization There are compliance issues of legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime. • Valuable Features Hassle-free implementation, no downtime required and no scaling issues at all. Very user-friendly interface, easy to understand. • Room for Improvement Reports. The default reports provided don't provide much insight. • Use of Solution One to three years. • Stability Issues No stability issues. • Scalability Issues No scalability issues. • Customer Service and Technical Support I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved. • Previous...
Real User
Co-Founder at a tech services company with 51-200 employees
Jan 15 2017

What is most valuable?

Working mostly with the virtual security data center (the server security platform) feature has been crucial in day-to-day businesses of the company because we're in data center services.

How has it helped my organization?

It's enabled us to protect our enterprise applications and data from breaches and business disruptions without emergency patching. Not only do these benefits reduce both capital and operational expenditures, but they also provide resource... more»

What needs improvement?

They need to improve their perimeter detection and tenancy.
25,178
Manager, Enterprise Risk Consulting
Dynamic 9 years of IT career, reflecting progressive experience and performance in the computer and Internet industries. Specialized in providing cutting-edge solutions to traditional Security issues; establishing strategic ideas in various domains and demonstrating self-motivation, creativity,... more>>
Reviewed IBM QRadar: Qradar vs. ArcSight

Sign Up with Email