Aporeto Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
Fahd Mirza Chughtai
Consultant
Cloud Architect, Oracle ACE, Oracle DBA at Pythian
Jan 14 2019

What is most valuable?

The dynamic workload identity creation, attestation, and assignment is the best feature. In addition, the application dependency map across heterogeneous environments for compliance is a striking feature. It integrates quite well with the… more»

How has it helped my organization?

Aporeto has accelerated our client's expansion to the cloud. With Aporeto, they have secured their Linux workloads on any infrastructure with end-to-end encryption and have a path for modernizing with a security layer that is… more»

What needs improvement?

More documentation with real-world use cases would be helpful. Another useful feature would be greater transparency and visibility into the security checks being implemented.

What's my experience with pricing, setup cost, and licensing?

The purchasing process was easy and quick. It is a very economical solution. We chose to procure this solution via AWS Marketplace because that's where we get all other solutions and to make sure it's supported by AWS.

What other advice do I have?

I would rate it as a nine out of ten, due to its cloud-facing features which fit in nicely with the whole cloud ecosystem.

Articles

User Assessments By Topic About Aporeto

Find out what your peers are saying about Aporeto, GuardiCore, Palo Alto Networks and others in Cloud Workload Security. Updated: October 2019.
372,124 professionals have used our research since 2012.

Aporeto Questions

What is Aporeto?

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload. Aporeto alleviates reliance on un-manageable error-prone IP white-list policies. A distributed homogenous security policy is enforced per workload independent of network or infrastructure configuration, enabling uniform security orchestration across multi-cloud environments.

Aporeto customers
Informatica, Etherparty, Exact Transactions
BUYER'S GUIDE
Download our free Cloud Workload Security Report and find out what your peers are saying about Aporeto, GuardiCore, Palo Alto Networks, and more!
Sign Up with Email