Illumio and SUSE NeuVector compete in the security software category, focusing on network and container security. Illumio appears to have an edge in providing comprehensive application interaction insights, whereas SUSE NeuVector offers robust container-centric features.
Features: Illumio provides exceptional visibility and mapping of network traffic, enhancing understanding of application dependencies. Its micro-segmentation capabilities improve security posture while monitoring and blocking unnecessary traffic. SUSE NeuVector focuses on container security, offering features like image scanning and anti-malware, ensuring strong run-time security.
Room for Improvement: Illumio could improve integration capabilities and customer support, with better guidance in policy tagging. More support for various operating systems and OT environments is needed. SUSE NeuVector should enhance monitoring and reporting, better integrate with existing tools, and improve cloud support for flexible deployment.
Ease of Deployment and Customer Service: Illumio supports on-premises and cloud environments but faces criticism for technical support responsiveness. SUSE NeuVector receives positive feedback for support but needs better documentation and integration processes for user-friendliness during deployment.
Pricing and ROI: Illumio offers flexible pricing based on workload size, delivering high ROI through extensive visibility and security benefits. SUSE NeuVector is low-priced and open-source, requiring additional support expenditure. Illumio's detailed traffic insights may justify higher costs for enterprises seeking in-depth security insights.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Cloud Security | 3.6% |
| Illumio | 6.1% |
| SUSE NeuVector | 1.1% |
| Other | 89.2% |



| Company Size | Count |
|---|---|
| Small Business | 47 |
| Midsize Enterprise | 20 |
| Large Enterprise | 52 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 1 |
| Large Enterprise | 2 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
Illumio Zero Trust Segmentation Features
Illumio Zero Trust Segmentation has many valuable key features. Some of the most useful ones include:
Illumio Zero Trust Segmentation Benefits
There are many benefits to implementing Illumio Zero Trust Segmentation. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Illumio Zero Trust Segmentation is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has a good auto policy writing feature, great mapping, and useful monitoring.
Shashi, Technical Consultant at a financial services firm, explains which features she really likes. “The auto policy writing is great. The feature will give you the option of inbound-outbound traffic. The Explorer allows you to know the traffic between source and destination. The illumination definitely stands out. Mapping is great. The application group mapping is useful.”
The solution has “helpful support, useful monitoring, and high availability,” according to Edwin L., Security Architect at MGM.
SUSE NeuVector is a full lifecycle container security solution that helps your organization secure its container infrastructures, manage Kubernetes security risks, and block threats. The NeuVector continuous container security and compliance platform simplifies data protection from pipeline to production, enforces compliance, and provides complete visibility and automated controls for protection against known and unknown threats. In addition, NeuVector is the only Kubernetes-native container security solution that offers a comprehensive risk profile of known vulnerabilities and also delivers immediate protection from all vulnerabilities.
SUSE NeuVector Features
SUSE NueVector has many valuable key features. Some of the most useful ones include:
SUSE NeuVector Benefits
There are many benefits to implementing NeuVector. Some of the biggest advantages the solution offers include:
Reviews from Real Users
A Platform Solution Architect at a tech services company says, “The solution is feature-rich, easy to set up, and has good support.”
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.