We performed a comparison between Cisco Secure Workload, RedSeal, and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about VMware, Cisco, Akamai and others in Cloud and Data Center Security."Scalability is its most valuable feature."
"The product offers great visibility into the network so we can enforce security measures."
"The product provides multiple-device integration."
"A complete and powerful micro-segmentation solution."
"The most valuable feature of the solution is that we don't have to do packet captures on the network."
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time."
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"This is the only solution in the world that gives you a digital resilience score."
"The most valuable features are network mapping and configuration."
"RedSeal integrates the network and gives us a visual or graphical overview of our network. If an organization is geographically dispersed, for instance, with one office in Canada and one office in the Philippines, the whole network, including all devices, is integrated into RedSeal, and you can see from where the traffic is going in and out."
"Technical support is good."
"Easy to scale, stable solution for workload and server security and protection. It's easy to set up and has a good ransomware protection feature."
"The solution has a low footprint and does not have a lot of impact on the host."
"Very user-friendly interface, easy to understand."
"In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time."
"The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
"Very straightforward and very easy to implement."
"Some of the main features of this solution are it is reliable and can be used in small to large size businesses."
"The integration could be better, especially with different types of solutions."
"The product must be integrated with the cloud."
"There was a controversy when Cisco reduced the amount of data they kept, and the solution became quite cost-intensive, which made its adoption challenging….Although they have modified it now, I preferred the previous version, and I wish all the functionality were back under the same product."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"It has an uninviting interface."
"The interface is really helpful for technical people, but it is not user-friendly."
"One of the areas of concern is the GUI. It is important to our customers that the GUI looks beautiful. It's a Java Client, so you have a Java dependency."
"The dashboard should be improved to make correlating data easier to do."
"Sometimes, it required us to refresh the configuration. When we integrated any of the configurations into the device, sometimes, it could not detect the exact picture of that device. So, we had to reset the device to see that if it was giving true-positive results or false-positive results. In some cases, we were not able to get true-positive results. There was some kind of bug in that version. Its interface is not user-friendly and needs to be improved. It takes time to understand the interface and various options. Skybox has quite a user-friendly interface. They could provide a feature for compliance audit policy if it is already not there. A compliance audit policy ensures that all configurations are based on the best practices standards, such as CIS benchmarks standard or other similar standards. It provides visibility about whether your device configuration is based on best practices or not. Usually, such a feature is provided by other solutions such as Meteor or Tenable Nessus."
"Trend Micro Deep Security security and scalability could be improved."
"The price could be reduced."
"The situation with the currency in Turkey makes this solution a little bit on the expensive side, and if it were lowered then it would be more competitive."
"As for what could be improved, I think it should come with an XDR facility without any extra cost. They're always releasing new features, but we need to pay extra for them."
"The updates for legacy systems are not rolled out frequently."
"Requires simplification, a fair amount of trouble shooting required."
"The working interface and the reports for non-technical people could use improvement. They are a bit scary."
"They need to build in a central console because central integration is not very good right now."
Earn 20 points