Cisco Secure Workload vs Illumio comparison

Cancel
You must select at least 2 products to compare!
Cisco Logo
3,396 views|2,251 comparisons
100% willing to recommend
Illumio Logo
4,418 views|3,349 comparisons
85% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Jul 26, 2023

We compared Illumio Zero Trust Segmentation and Cisco Secure Workload based on our users' reviews in six categories. After reading the collected data, you can find our conclusion below:

  • Ease of Deployment: Illumio Zero Trust Segmentation takes significantly longer to set up compared to Cisco Secure Workload. However, Illumio is highly effective in blocking and micro-segmenting, whereas Cisco provides additional controls in scoring for more targeted and actionable alerts.
  • Features: Illumio Zero Trust Segmentation provides useful functionalities like monitoring, automatic policy creation, and insight into application communication. On the other hand, Cisco Secure Workload stands out for its intuitive interface, scalability, and comprehensive solution.
  • Room for Improvement: Illumio Zero Trust Segmentation has room for improvement in terms of operating system support and customer service. The labeling features should be enhanced to avoid accidental edits. Cisco Secure Workload could benefit from better integration with various solutions. Users find the product complicated to use and the dashboard is not intuitive. 
  • Pricing: Illumio Zero Trust Segmentation incurs a recurring subscription fee every three years. On the other hand, it is reported that Cisco Secure Workload has a hardware cost of approximately 300k.
  • ROI: Illumio Zero Trust Segmentation has proven beneficial and valuable. Conversely, Cisco Secure Workload does not prioritize return on investment.
  • Service and Support: Illumio Zero Trust Segmentation's customer service received a mix of positive and negative feedback. Some users appreciated the support team's quick response and round-the-clock assistance. However, others were disappointed due to unhelpful and delayed replies. In contrast, customers generally found Cisco Secure Workload's customer service to be satisfactory. They praised its responsiveness and the quality of technical support, particularly for networking products. 

Comparison Results: Illumio Zero Trust Segmentation offers a simpler setup and advanced monitoring features, including auto policy writing and the Explorer tool. However, it lacks support for some operating systems and needs improvement in customer service and data security. Cisco Secure Workload has a moderate setup process and additional security controls with user-friendly features and helpful technical support. However, it faces integration issues and has a complicated dashboard. 

To learn more, read our detailed Cisco Secure Workload vs. Illumio Report (Updated: March 2024).
767,667 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.""By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself.""The most valuable feature of the solution is that we don't have to do packet captures on the network.""The product provides multiple-device integration.""Scalability is its most valuable feature.""Secure Workload's best feature is that it's an end-to-end offering from Cisco.""The most valuable feature is micro-segmentation, which is the most important with respect to visibility.""Generally speaking, Cisco support is considered one of the best in the networking products and stack."

More Cisco Secure Workload Pros →

"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies.""It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation.""The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build.""The solution is easy to use.""The product provides visibility into how the applications communicate and how the network protocols are being used.""The flexibility of the solution is its most valuable feature.""The Explorer allows you to know the traffic between source and destination.""The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."

More Illumio Pros →

Cons
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge.""Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it.""The interface is really helpful for technical people, but it is not user-friendly.""The emailed notifications are either hard to find or they are not available. Search capabilities can be improved.""They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.""The integration could be better, especially with different types of solutions.""The product must be integrated with the cloud.""The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."

More Cisco Secure Workload Cons →

"The product’s agents don't work very well in OT environments.""The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules.""It requires a low-level re-architecting of the product.""The interaction we've had with the support team hasn't been ideal. Technical support should be improved.""I would like to see better data security in the product.""Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances.""Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial.""The customer service is lagging a bit. It could be better."

More Illumio Cons →

Pricing and Cost Advice
  • "The pricing is a bit higher than we anticipated."
  • "The price is outrageous. If you have money to throw at the product, then do it."
  • "Pricing depends on the scope of the application and the features. Larger installations save more."
  • "It is not cheap and pricing may limit scalability."
  • "The price is based on how many computers you're going to install it on."
  • "The cost for the hardware is around 300k."
  • More Cisco Secure Workload Pricing and Cost Advice →

  • "There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive."
  • "The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis."
  • More Illumio Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
    767,667 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The product provides multiple-device integration.
    Top Answer:The product must be integrated with the cloud.
    Top Answer:The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging… more »
    Top Answer:The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
    Top Answer:Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial.
    Ranking
    Views
    3,396
    Comparisons
    2,251
    Reviews
    1
    Average Words per Review
    235
    Rating
    7.0
    Views
    4,418
    Comparisons
    3,349
    Reviews
    6
    Average Words per Review
    384
    Rating
    8.0
    Comparisons
    Also Known As
    Cisco Tetration
    Illumio Adaptive Security Platform, Illumio ASP
    Learn More
    Overview

    Cisco Secure Workload is a cloud and data security solution that offers a zero-trust policy of keeping an organization’s application workloads safe and secure throughout the entire on-premise and cloud data center ecosystems.

    Cisco Secure Workload will consistently provide protection by discovering workload process anomalies, stopping threats immediately, minimizing the risk threat surface, and aborting any lateral movement.

    Today’s ecosystems are very elastic, and in the application-focused dynamic of today’s aggressive marketplace, Cisco Secure Workload delivers a robust security solution that works effectively with today’s most popular applications. The solution uniquely surrounds each and every workload to ensure organizations are able to keep their data, network, and applications safe and secure at all times. Cisco Secure Workload ensures that enterprise organizations can maintain secure applications by consistently building firewalls around every workload level throughout the entire ecosystem. The solution can manage applications that are deployed on containers, virtual machines, or bare-metal servers.

    Cisco Secure workload is able to meet an organization's busy needs and offers flexible options such as Software-as-a-Service (SaaS) and on-premises options. Using the Secure Workload SaaS options, users receive all the benefits of Cisco Secure Workload protection without the hassle of having to deploy and maintain the platform on premises. Users are responsible for acquiring the necessary software licensing and deploying software agents. Using SaaS, Secure Workload runs in the cloud and is operated and maintained by Cisco. This option offers the ability to scale easily and is a popular choice for SaaS-first and SaaS-only clients. Many organizations find they get the best TCO and achieve the best productivity and profitability using the SaaS options.

    When choosing on-premises options, organizations choose between hardware-based appliance models (large or small form factors). Platform selection is dependent on scalability goals, the desired fidelity level of flow telemetry, and the actual number of workloads. When a user chooses to configure Cisco Secure Workload for a conversation-only flow telemetry for all workloads, each platform has the capability to scale up vertically twice the default platform scale. Additionally, with Secure Workload, it is possible for the platform to be scaled horizontally in order to satisfy the demands of extra large widely distributed enterprise environments using federation capabilities.

    Cisco Secure Workload also provides a robust disaster recovery (DR) tool, which helps to make it a complete, comprehensive solution. The DR allows for continuous restore and backup capabilities that enable users to quickly remediate operations and data to a standby cluster in the event of a drastic failure or disaster.

    Reviews from Real Users

    The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network. Other valuable features include vast support for annotations, flexible user applications, machine learning, automatic classification, and hierarchical policies.” - CTO at a tech vendor

    Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.

    Illumio Zero Trust Segmentation Features

    Illumio Zero Trust Segmentation has many valuable key features. Some of the most useful ones include:

    • Scalability: Illumio Zero Trust Segmentation scales up to 200,000 managed workloads or over 700,000 unmanaged workloads. These workloads can be in the cloud, on-premises, and in hybrid environments.
    • Single pane of visibility: The solution’s single pane of visibility improves your security posture and ability to prevent and respond rapidly to cyberattacks.
    • Simplicity: With Illumio Zero Trust Segmentation, setting up groups and tags is simple. The solution is easy to integrate with next-generation firewalls and can also integrate with IT service management tools to import workload tags to provide more context to workloads.
    • Ransomware containment: The solution provides enforcement boundaries to contain attackers from moving laterally across your organization, enabling security architects to immediately isolate any workload or endpoint compromised in an attack. Enforcement boundaries can be activated instantly through scripts or by manual control, isolating workloads and endpoints already infected from spreading across the organization.

    Illumio Zero Trust Segmentation Benefits

    There are many benefits to implementing Illumio Zero Trust Segmentation. Some of the biggest advantages the solution offers include:

    • Visibility everywhere: The Illumio Zero Trust Segmentation solution helps ensure that every interaction on your network is accounted for. 
    • Least-privilege access: By implementing Illumio Zero Trust Segmentation, your organization can prevent unexpected breaches from propagating.
    • Adaptability and consistency: The solution guarantees consistent network behavior everywhere. 
    • Proactive posture: Using the solution enables your organization to always be on the lookout for an attack. 
    • Improve breach containment: With the solution, you can prevent unauthorized lateral movement and reduce your blast radius. Creating micro-perimeters around specific assets breaks up your attack surface and gives you the granular control needed to contain breaches.
    • Streamline policy management: The solution enables organizations to decouple segmentation from the underlying network to define policies based on the language that IT uses. Illumio's human-readable labels make policy creation much simpler and faster than traditional network segmentation approaches like VLANs, IP addresses, and port numbers.

    Reviews from Real Users

    Illumio Zero Trust Segmentation is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has a good auto policy writing feature, great mapping, and useful monitoring. 

    Shashi, Technical Consultant at a financial services firm, explains which features she really likes. “The auto policy writing is great. The feature will give you the option of inbound-outbound traffic. The Explorer allows you to know the traffic between source and destination. The illumination definitely stands out. Mapping is great. The application group mapping is useful.”

    The solution has “helpful support, useful monitoring, and high availability,” according to Edwin L., Security Architect at MGM.

    Sample Customers
    ADP, University of North Carolina Charlotte (UNCC)
    Plantronics, NTT Innovation Institute Inc.
    Top Industries
    REVIEWERS
    Comms Service Provider44%
    Media Company11%
    Energy/Utilities Company11%
    Computer Software Company11%
    VISITORS READING REVIEWS
    Computer Software Company29%
    Financial Services Firm13%
    Government6%
    Insurance Company5%
    VISITORS READING REVIEWS
    Financial Services Firm18%
    Computer Software Company16%
    Manufacturing Company9%
    Government6%
    Company Size
    REVIEWERS
    Small Business29%
    Midsize Enterprise21%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise13%
    Large Enterprise70%
    REVIEWERS
    Small Business25%
    Midsize Enterprise13%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise12%
    Large Enterprise69%
    Buyer's Guide
    Cisco Secure Workload vs. Illumio
    March 2024
    Find out what your peers are saying about Cisco Secure Workload vs. Illumio and other solutions. Updated: March 2024.
    767,667 professionals have used our research since 2012.

    Cisco Secure Workload is ranked 9th in Cloud and Data Center Security with 13 reviews while Illumio is ranked 4th in Cloud and Data Center Security with 8 reviews. Cisco Secure Workload is rated 8.4, while Illumio is rated 8.0. The top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". On the other hand, the top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". Cisco Secure Workload is most compared with Akamai Guardicore Segmentation, VMware NSX, Prisma Cloud by Palo Alto Networks, Cisco ACI and Cisco ISE (Identity Services Engine), whereas Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Zscaler Internet Access, Microsoft Defender for Cloud and Zero Networks Microsegmentation. See our Cisco Secure Workload vs. Illumio report.

    See our list of best Cloud and Data Center Security vendors, best Cloud Workload Protection Platforms (CWPP) vendors, and best Microsegmentation Software vendors.

    We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.