Dome9 Primary Use Case

BasilDange
Sr Manager IT Security at a financial services firm with 10,001+ employees
* Visibility for cloud workloads, including server, serverless and Kubernetes. * Security configuration review along with automatic remediation. * Posture management and compliance for a complete cloud environment. * Centralize visibility for a complete cloud environment of the workload hosted on multiple cloud platforms (AWS and Azure). * Baseline for security policy as per the workload based on services, such as S3, EC2, etc. * Visibility of an API call within the environment. * IAM management providing access to the cloud network in a controlled manner. * Alerts and notifications for any security breach/changes in the cloud environment. * Flow visibility of traffic to and from the cloud environment. * Real-time alerting for any security incidents. They provide support for Azure, Amazon, GCP, and Alibaba. However, we just have AWS and Azure. View full review »
reviewer1986
Network Security Architect at a financial services firm with 1,001-5,000 employees
The primary use case has been for auditing the cloud infrastructure in terms of security, because our company has been audited a lot of times. For the cloud, this is a tool that we use to audit the cloud environment. For example, all of the S3 buckets are encrypted to know if we don't have servers exposed to the Internet where they shouldn't be. This solution runs some compliance reports. That is why we use it. We use it the most to check if things are complaint, because the compliancy checking is accurate. View full review »
reviewer1398609
Senior Manager at a financial services firm with 10,001+ employees
1) Visibility for Cloud Work Load for Server, Server Less & Container environment 2) Security configuration review along with auto-remediation 3) Posture management and Compliance for complete Cloud Environment 4) Centralize Visibility for Complete Cloud Environment of Workload hosted on Multiple Cloud Platform (AWS, Azure, and GCP) 5) The baseline for Security Policy as per Workload based on Services such as S3, EC2, etc 6) Visibility of API call within the environment 7) IAM management providing access to cloud network in a control manner 8) Alert and Notification for any Security breach/Changes in Cloud environment 9) Flow Visibility of traffic from and to Cloud Environment 10) Real-time alerting for any incident View full review »
Learn what your peers think about Dome9. Get advice and tips from experienced pros sharing their opinions. Updated: August 2020.
441,850 professionals have used our research since 2012.
reviewer1343916
Product Manager at a tech services company with 51-200 employees
We are a reseller of security solutions, and we also offer professional and managed services around them. We cover network security, web application firewalls, email, web security, security information and event management, privilege access management, and other such products. Dome9 is one of the solutions that we implement for our customers, and they use it to help secure their cloud. It works on several cloud platforms, including Azure and AWS. It will handle security issues such as ensuring a proper configuration, that the credentials are set up correctly, and that the storage of sensitive data is appropriately configured. Some of our customers use Dome9 for discovery, to help them understand the different accounts that they have in the cloud. Very often, there can be a proliferation of cloud-based accounts and applications that the organization on a wider basis is not aware of. Dome9 is very good if you need to get an inventory and reporting on the current state of your environment. View full review »
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
We use the Check Point CloudGuard IaaS within our company is for the protection of our cloud assets. It is deployed on Google Cloud Platform with the help of the Firewall, Application Control, and Intrusion Prevention System software blades. In addition, we rely heavily on the GeoIP module to restrict undesired countries from accessing our services, as for now, you can't achieve it with the GCP firewall. There are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways. Dome9 is used as an additional compliance tool to improve the security of these environments and avoid any configuration errors. View full review »
Paul Liversidge
Owner at Liversidge Consulting Ltd
We have been researching this solution as something to provide for clients who are interested in implementing a high-security AWS environment. View full review »
Naveen Govindappa
Solution Architect Cloud Security at a tech vendor with 10,001+ employees
We are a solution provider and we are evaluating multiple tools for cloud workload security and vulnerability management. We are evaluating products such as Dome9 to figure out which one would be best for our customers. This solution is used to replace a variety of cloud security and management tools. View full review »
Yasdy Yasin
Cloud Infrastructure Architect at Maxis Berhad
The primary use case for this solution is associated with a challenge whereby we have multiple cloud computing platforms. We have our past cloud platforms in AWS and ECP. Therefore, we can configure management and policy governance tools to deployment across all sites. View full review »
Learn what your peers think about Dome9. Get advice and tips from experienced pros sharing their opinions. Updated: August 2020.
441,850 professionals have used our research since 2012.