CloudPassage Archived Reviews (More than two years old)

Filter by:
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Real User
Lead Information Security Engineer
Apr 25 2018

What is most valuable?

The Software Vulnerability Assessment and the CSM, which is the configuration check.

How has it helped my organization?

* Our scores let us know when to trigger workflow to go out in a patch. * It has reduced the amount of time we had to take to manually verify software and check our… more »

What needs improvement?

Anything outside of the software vulnerability management and the CSM, things like the GhostPort, need some improvement. The dashboard is in beta. It looks really good, I… more »

What's my experience with pricing, setup cost, and licensing?

I would rate the pricing value at about a six or seven out of 10, because I can't use all the functions. Of all the advertised functions, I only find two things that… more »

Which solution did I use previously and why did I switch?

I wasn't using a different solution. We were just using in-house scripting. We wanted to reduce our overhead so we went with CloudPassage.

What other advice do I have?

I would say CloudPassage is very useful for certain things. If you just want a few modules then focus on what you need and negotiate the price based on the individual… more »

Which other solutions did I evaluate?

We tested CloudPassage against Dome9, and we tried using a combination of AWS with CloudInspect. We also look at Evident.io and Alert Logic.
Alysson Almeida
Real User
Information Security Analyst at a transportation company with 1,001-5,000 employees
Jul 19 2017

What is most valuable?

Policies are very easy to manage on a day-to-day basis. With few clicks in their cloud management portal, you can implement and change security policies in thousand of… more »

How has it helped my organization?

Before CloudPassage, the management of security policies in our servers was painful and time-consuming. CloudPassage allowed us to implement changes that affected hundred… more »

What needs improvement?

The reports and graphs are unintuitive. Also, there is no feature or CloudPassage tool that facilitates the implementation of the agents. We had to use third-party… more »

What's my experience with pricing, setup cost, and licensing?

I cannot help with this.

Which solution did I use previously and why did I switch?

No.

What other advice do I have?

CloudPassage has a bunch of features. Be sure you understand all of them and how to extract value to your organization. In addition, make sure you have a reliable software… more »

Which other solutions did I evaluate?

We also evaluated VMware NSX, but the pricing and features available in a CloudPassage implementation were decisive in deciding to go with CP.

What is CloudPassage?

CloudPassage Halo is an agile security and compliance platform that works in any cloud infrastructure: public, private or hybrid. The platform is unique because it provides continuous visibility and enforcement delivered as a service, so it’s on-demand, fast to deploy, fully automated and works at any scale.

The CloudPassage platform delivers a comprehensive set of security and compliance features, so you don’t have pay for and manage point solutions that often don’t integrate well with each other. Hundreds of companies use CloudPassage as a strategy to take full advantage of the business benefits of their cloud investments, with the confidence that critical business assets are protected. Using CloudPassage, security organizations achieve 6 critical control objectives with a platform that is flexible, fast and scalable:

Visibility: Immediate, consistent, continuous knowledge of what assets exist, where they reside, and what they’re doing.

Strong Access Control: Strong, layered controls enabling authorized access & denial of resources to unauthorized entities.

Vulnerability Management: Continuous detection & elimination of issues that create exploitable points of weakness.

Data Protection: Assurance that critical data is encrypted & used appropriately by authorized entities while in motion or at rest.

Compromise Management: Capabilities that enable detection & response to malicious or accidental compromise of resources.

Operational Automation: Day-to-day management of technologies & processes that ensure security & compliance.

Also known as
CloudPassage Halo
CloudPassage customers
Citrix
BUYER'S GUIDE
Download our free Cloud Workload Security Report and find out what your peers are saying about CloudPassage, Check Point, Illumio, and more!