Cisco Umbrella Competitors and Alternatives

Read reviews of Cisco Umbrella competitors and alternatives
Consultant
IT Security Specialist at a consultancy with 10,001+ employees
Nov 17 2016

What is most valuable?

We use the Application Discovery & Control feature. With Google’s G Suite, it is very easy for a user to give full control of their Google data to a third party. For example, when Pokémon Go was first released, it gave the vendor full... more»

How has it helped my organization?

With RegEx-based reporting on Google Drive data, we can report any inappropriate or privileged data that should not be stored in Google.

What needs improvement?

The issues with CloudLock are mostly for Google to address. Google is all about trusting users, which is a nightmare for an administrator. It allows any user to intentionally or accidentally give a random third party full access to a Google... more»
Real User
Desktop And Telephony Support Engineer at a financial services firm with 1,001-5,000 employees
Jan 26 2017

What is most valuable?

From a user’s perspective, ease-of-use is what separates it from others like RSA SecurID. It is very easy to download to mobile phones, laptops, and desktops of any platform. From the admin’s perspective, its GUI is very user friendly and... more»

How has it helped my organization?

When using Symantec VIP, not much configuration is needed in order for it to work. It works in any platform, including macOS. In our case, we just simply download and install the application online, install Citrix Receiver and that’s it. You... more»

What needs improvement?

The Credential ID part where you need to register it: Sometimes, it does not register a device, for some reason. As a workaround, we register it for our users from the Symantec VIP Manager portal.
Qualys
Real User
Shared Information Security Officer at a university with 1,001-5,000 employees
Sep 06 2016

What do you think of Qualys VM?

Valuable Features Totally vendor-managed appliance Highly scalable and deployable portal interface Ability to easily distribute administration functions based on access roles • Improvements to My Organization It provides fully automated internal and external vulnerability management. • Room for Improvement Streamline PCI integration and attestation. • Use of Solution I have used it for five years. • Scalability Issues I have not encountered any scalability issues. • Customer Service and Technical Support Technical staff are excellent. • Previous Solutions We previously used Rapid 7. The product was not staying current with shifting trends, sales staff were pushy and management were arrogant. • Initial Setup Initial setup was simple. • Pricing,...

Sign Up with Email