Try our new research platform with insights from 80,000+ expert users

Cisco Secure Workload vs Illumio comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud and Data Center Security
5th
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
8.0
Number of Reviews
99
Ranking in other categories
Vulnerability Management (6th), Container Security (3rd), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Cisco Secure Workload
Ranking in Cloud and Data Center Security
8th
Ranking in Cloud Workload Protection Platforms (CWPP)
16th
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
15
Ranking in other categories
Microsegmentation Software (5th), Cisco Security Portfolio (9th)
Illumio
Ranking in Cloud and Data Center Security
3rd
Ranking in Cloud Workload Protection Platforms (CWPP)
14th
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
9
Ranking in other categories
Microsegmentation Software (3rd)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Raj Metkar - PeerSpot reviewer
Discover internal application dependencies and create a dependency map
We actively seek improvements in integrating the Infoblox DDI platform with Cisco Secure Workload. This integration allows Cisco Secure Workload to learn about our networks and network tags, providing valuable insights into vulnerabilities related to the operating system and various applications installed on our servers. Recently, Cisco announced a new product called HyperShield, an AI-based autonomous micro-segmentation solution. While Cisco has not stated that HyperShield will replace Cisco Secure Workload, it represents a natural evolution for the company. HyperShield features dynamic policy discovery and enforcement; however, once policies are enforced, they do not change until a discovery occurs, requiring a re-enforcement process. This new platform operates autonomously, minimizing the need for user or security engineer intervention. I would have expected Cisco to incorporate more automatic discovery and enforcement features within the existing Cisco Secure Workload product. Instead of enhancing the current product, they have introduced a new solution. Cisco plans to honor existing Tetration licenses, allowing users to transition to HyperShield without additional costs, reflecting the investment enterprises have already made. From Cisco’s perspective, this represents a natural progression in their product line. While the product name changes, it seems more of a rebranding effort. The enhancements are greater autonomy, improved discovery, and automatic enforcement, which are now being introduced in HyperShield. Cisco Secure Workload offers automatic policy enforcement but cannot adjust policies dynamically as the application needs to change. Having used the platform for the past five years, the recent announcement has been reassuring. Cisco has confirmed that our investment in the platform will not go to waste. They will honor our existing licenses, providing a natural migration path to the new solution without any disruption
Vincent TOH - PeerSpot reviewer
Offers real-time application dependency mapping that is useful
The product's initial setup phase is not difficult. We are using a cloud version of the tool. Picking up the PC for the setup was difficult because Illumio's service provider took care of it. In our company, we only installed the tool on our devices, so it wasn't much of a difficult process. On a scale of one to ten, one is difficult, and ten is easy, I rate the setup phase as nine. I didn't deploy Illumio. My company uses the cloud version of the tool. I created my account and paired my device, which was all that was required.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloud Security has provided a single view to observe all workloads, prioritization for handling cloud assets, and reduced noise by distinguishing false positives effectively."
"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"We noted immediate benefits from using the solution."
"The most valuable aspect of Singularity Cloud Security is its unified dashboard."
"The user-friendliness is the most valuable feature."
"Singularity Cloud Security's most valuable features are its ease of scalability and comprehensive security measures."
"For Singularity, the task capability is easy to use and it has a very intuitive dashboard, which streamlines the processes."
"The product provides multiple-device integration."
"Scalability is its most valuable feature."
"The product offers great visibility into the network so we can enforce security measures."
"A complete and powerful micro-segmentation solution."
"Generally speaking, Cisco support is considered one of the best in the networking products and stack."
"Secure Workload's best feature is that it's an end-to-end offering from Cisco."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"The most valuable feature of this solution is security."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"The flexibility of the solution is its most valuable feature."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The solution is easy to use."
"The Explorer allows you to know the traffic between source and destination."
 

Cons

"Crafting customized policies can be tricky."
"The main area for improvement I want to see is for the platform to become less resource-intensive. Right now, it can slow down processes on the machine, and it would be a massive improvement if it were more lightweight than it currently is."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"The integration with Oracle has room for improvement."
"PingSafe's current documentation could be improved to better assist customers during the cluster onboarding process."
"We use PingSafe and also SentinelOne. If PingSafe integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"We are experiencing problems with Cloud Native Security reporting."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"There was a controversy when Cisco reduced the amount of data they kept, and the solution became quite cost-intensive, which made its adoption challenging….Although they have modified it now, I preferred the previous version, and I wish all the functionality were back under the same product."
"There's room for improvement when it comes to Cisco Secure Workload. A couple of internal areas could be refined a little bit. They are trying to solve it, depending on where you suppose the agent is. Suppose you have the agent on both the server and the client, which could be the front-end server or web server connecting to the. In that case, if those two are communicating on RPC, the server can look into its configuration. It could go down and find the configuration file on the FTP server and then set the policies to it. But there are a lot of different FTP servers out there. It's also a complex case for the tool to support all FTP servers."
"It has an uninviting interface."
"The interface is really helpful for technical people, but it is not user-friendly."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"The emailed notifications are either hard to find or they are not available. Search capabilities can be improved."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"The product’s agents don't work very well in OT environments."
"I would like to see better data security in the product."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"We need more details on areas where there is an error or a traffic blockage. I would like the tool to offer a more detailed view."
"The customer service is lagging a bit. It could be better."
"It requires a low-level re-architecting of the product."
 

Pricing and Cost Advice

"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"The tool is cost-effective."
"It is cheap."
"SentinelOne offers excellent pricing and licensing options."
"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"PingSafe is fairly priced."
"I would rate the cost a seven out of ten with ten being the most costly."
"The pricing is a bit higher than we anticipated."
"Pricing depends on the scope of the application and the features. Larger installations save more."
"The price is outrageous. If you have money to throw at the product, then do it."
"It is not cheap and pricing may limit scalability."
"The cost for the hardware is around 300k."
"The price is based on how many computers you're going to install it on."
"Regarding price, Cisco Secure Workload can be expensive if you don't have a budget. If you're not doing micro-segmentation, every extra security measure or enforcement you're putting on top of your existing environment will be an extra cost. It's not a cheap solution at all. But from my point of view, if you need to do micro-segmentation, this is one of the best tools I've seen for it. I can't compare that to Microsoft's solution because I haven't looked into it. I've looked into VMware and Cisco. Those are the only two that I know of. I didn't know that Microsoft could do micro-segmentation at all. Maybe they can, but I haven't heard anything about it."
"The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis."
"There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive."
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Computer Software Company
28%
Financial Services Firm
12%
Manufacturing Company
7%
Government
6%
Financial Services Firm
19%
Computer Software Company
16%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
The pricing is somewhat high compared to other market tools. This cost can be particularly prohibitive for small busi...
What needs improvement with PingSafe?
To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal. Currentl...
What do you like most about Cisco Secure Workload?
The product provides multiple-device integration.
What is your experience regarding pricing and costs for Cisco Secure Workload?
CloudStrike offers antivirus capabilities and firewall features for servers and VDI but lacks automatic policy discov...
What needs improvement with Cisco Secure Workload?
We actively seek improvements in integrating the Infoblox DDI platform with Cisco Secure Workload. This integration a...
What do you like most about Illumio Adaptive Security Platform?
The features that I have found most useful is the ability to centralize all the rules and then distribute them across...
What is your experience regarding pricing and costs for Illumio Adaptive Security Platform?
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
What needs improvement with Illumio Adaptive Security Platform?
The log collection part needs improvement, and the tool should offer more details about the logs. We need more detail...
 

Also Known As

PingSafe
Cisco Tetration
Illumio Adaptive Security Platform, Illumio ASP
 

Overview

 

Sample Customers

Information Not Available
ADP, University of North Carolina Charlotte (UNCC)
Plantronics, NTT Innovation Institute Inc.
Find out what your peers are saying about Cisco Secure Workload vs. Illumio and other solutions. Updated: November 2024.
824,053 professionals have used our research since 2012.