We performed a comparison between Check Point CloudGuard Posture Management and Illumio Zero Trust Segmentation based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point CloudGuard Posture Management provides solid data security, advanced incident detection, and detailed reporting. It offers IAM role control and governance support. Illumio Zero Trust Segmentation has been praised for its automated policy writing and visibility into application communication and network protocols. Check Point CloudGuard Posture Management could be more customizable and improve its false positives rate and vulnerability assessments. Users suggested that Zero Trust Segmentation should support more operating systems and improve its labeling functionality.
Service and Support: Check Point CloudGuard Posture Management customer service has garnered positive feedback, highlighting prompt responses and pleasant support experiences. Some Illumio Zero Trust Segmentation customers commended the support team, while others expressed discontentment.
Ease of Deployment: The setup for Check Point CloudGuard Posture Management is fast and straightforward, requiring only a few minutes. Setting up Illumio Zero Trust Segmentation is significantly lengthier, taking around six months to finish.
Pricing: Some users found Check Point CloudGuard Posture Management affordable, but a few reviewers thought it was expensive and recommend exploring alternative options. Illumio Zero Trust Segmentation is generally considered expensive.
ROI: Check Point CloudGuard Posture Management provided our reviewers with a solid return by simplifying administration and compliance solutions. We have not received feedback on ROI from Illumio Zero Trust Segmentation users.
Comparison Results: Our users prefer Check Point CloudGuard Posture Management over Illumio Zero Trust Segmentation. CloudGuard is praised for its comprehensive data security, granular reporting, and ruleset customization. It offers visibility into traffic flow, threat detection, and real-time attack prevention. Users appreciate its intuitive dashboard, powerful reporting, and ability to enhance security. Illumio Zero Trust Segmentation is criticized for its limited operating system support and lack of effective agents in certain environments. Users also desire better customer service and improved data security.
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"My favorite feature is Storyline."
"The ease of use of the platform is very nice."
"The solution helped free other staff to work on other projects or other tasks. We basically just had to do a bunch of upfront configuring. With it, we do not have to spend as much time in the console."
"With PingSafe, it's easy to onboard new accounts."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"PingSafe's most valuable feature is its unified console."
"The user interface is well-designed and easy to navigate."
"The comprehensive security for IaaS and PaaS cloud assets provides efficient security awareness to all the teams."
"We really liked its ease of implementation against our Microsoft Azure environment."
"The most valuable feature is the separate environment."
"The visibility in our cloud environment is the most valuable feature."
"The new scanning function is a valuable feature that wasn't available until recently."
"It provides complete visibility of workload hosted on different cloud platforms including AWS and Azure, along with multiple tenants."
"It learns from behavior, attacks, management, detections, captures packets, real-time analysis, et cetera. It's generating knowledge from a variety of sources for an excellent analysis."
"This solution provides threat prevention and detection of anomalies automatically and investigates the activity of each one of them."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The Explorer allows you to know the traffic between source and destination."
"The solution is easy to use."
"The flexibility of the solution is its most valuable feature."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"We'd like to have better notifications. We'd like them to happen faster."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"They need more experienced support personnel."
"One area for improvement could be the internal analysis process, specifically the guidance provided for remediation."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"The dashboard customization has room for improvement."
"The Check Point solution is somewhat expensive."
"Dome9 should also support deployments that are on-premises and in a hybrid cloud."
"Automatic remediation requires read/write access. When providing read/write access to third-party applications, this can add risk. It should have some options of triggering API calls to the cloud platform, which in turn, can make the required changes."
"The product must provide different features like antivirus."
"The costs are really high if you want the entire capabilities of the platform."
"In Dome9, there should be a policy validation option where we can validate the policy before we push it into production."
"Currently, worldwide, there are many companies of all sizes that do not understand the value that their data has, but even with all existing clouds, they also do not understand what the shared responsibility model is. They only assume that by having a cloud, the provider must ensure safety, when the truth is that the providers only secure their sites. Everything we do in the cloud and how we configure it is actually our responsibility."
"I would like to see better data security in the product."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"It requires a low-level re-architecting of the product."
"The customer service is lagging a bit. It could be better."
"The product’s agents don't work very well in OT environments."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Check Point CloudGuard CNAPP is ranked 8th in Cloud and Data Center Security with 64 reviews while Illumio is ranked 4th in Cloud and Data Center Security with 8 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Illumio is rated 8.0. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, Wiz, AWS GuardDuty, Microsoft Defender for Cloud and Qualys VMDR, whereas Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Zero Networks Microsegmentation. See our Check Point CloudGuard CNAPP vs. Illumio report.
See our list of best Cloud and Data Center Security vendors and best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.