We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution."
"The licensing and costs are straightforward, as they have a baseline of 100 workloads (number of instances) within one license with no additional nor hidden charges. If you want to have 200 workloads under Dome9, then you need to take out two licenses for that. Also, it does not have any impact on cloud billing, as data is shared using the API call. This is well within the limit of free API calls provided by the cloud provider."
"I suggest that you pay attention to the product pricing because while there are no tricks, and the licensing model is transparent, the final numbers may surprise you."
"Right now, we have licenses on 500 machines, and they are not cheap."
"The pricing is tremendous and super cheap. It is shockingly cheap for what you get out of it. I am happy with that. I hope that doesn't get reported back and they increase the prices. I love the pricing and the licensing makes sense. It is just assets: The more stuff that you have, the more you pay."
"In the beginning, the price of Dome9 was cheap, whereas now it is not."
"Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges."
Earn 20 points
Check Point CloudGuard provides cloud native security for all your assets and workloads, across multi-clouds, allowing you to automate security everywhere, with unified threat prevention and posture management. The only solution that provides context to secure your cloud with confidence.
CloudPassage Halo is an agile security and compliance platform that works in any cloud infrastructure: public, private or hybrid. The platform is unique because it provides continuous visibility and enforcement delivered as a service, so it’s on-demand, fast to deploy, fully automated and works at any scale.
The CloudPassage platform delivers a comprehensive set of security and compliance features, so you don’t have pay for and manage point solutions that often don’t integrate well with each other. Hundreds of companies use CloudPassage as a strategy to take full advantage of the business benefits of their cloud investments, with the confidence that critical business assets are protected. Using CloudPassage, security organizations achieve 6 critical control objectives with a platform that is flexible, fast and scalable:
Visibility: Immediate, consistent, continuous knowledge of what assets exist, where they reside, and what they’re doing.
Strong Access Control: Strong, layered controls enabling authorized access & denial of resources to unauthorized entities.
Vulnerability Management: Continuous detection & elimination of issues that create exploitable points of weakness.
Data Protection: Assurance that critical data is encrypted & used appropriately by authorized entities while in motion or at rest.
Compromise Management: Capabilities that enable detection & response to malicious or accidental compromise of resources.
Operational Automation: Day-to-day management of technologies & processes that ensure security & compliance.
Check Point CloudGuard Posture Management is ranked 2nd in Cloud Workload Security with 13 reviews while CloudPassage is ranked 20th in Cloud Workload Security. Check Point CloudGuard Posture Management is rated 8.2, while CloudPassage is rated 0.0. The top reviewer of Check Point CloudGuard Posture Management writes "Security visibility accuracy is tremendous, letting us see who is trying to access what". On the other hand, Check Point CloudGuard Posture Management is most compared with Prisma Cloud by Palo Alto Networks, Prisma SaaS by Palo Alto Networks, Check Point Harmony Email & Office and Azure Security Center, whereas CloudPassage is most compared with Prisma Cloud by Palo Alto Networks, Qualys VM, Threat Stack Cloud Security Platform and Illumio Adaptive Security Platform.
See our list of best Cloud Workload Security vendors.
We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.