Try our new research platform with insights from 80,000+ expert users

Illumio vs Symantec Data Center Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 14, 2024
 

Categories and Ranking

Illumio
Ranking in Cloud and Data Center Security
3rd
Average Rating
8.0
Reviews Sentiment
6.4
Number of Reviews
10
Ranking in other categories
Cloud Workload Protection Platforms (CWPP) (14th), Microsegmentation Software (3rd)
Symantec Data Center Security
Ranking in Cloud and Data Center Security
11th
Average Rating
7.6
Reviews Sentiment
5.0
Number of Reviews
11
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2024, in the Cloud and Data Center Security category, the mindshare of Illumio is 23.5%, up from 16.2% compared to the previous year. The mindshare of Symantec Data Center Security is 4.1%, down from 5.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud and Data Center Security
 

Featured Reviews

Vincent TOH - PeerSpot reviewer
Offers real-time application dependency mapping that is useful
The product's initial setup phase is not difficult. We are using a cloud version of the tool. Picking up the PC for the setup was difficult because Illumio's service provider took care of it. In our company, we only installed the tool on our devices, so it wasn't much of a difficult process. On a scale of one to ten, one is difficult, and ten is easy, I rate the setup phase as nine. I didn't deploy Illumio. My company uses the cloud version of the tool. I created my account and paired my device, which was all that was required.
Shahram Dehghani - PeerSpot reviewer
A robust solution that provides comprehensive protection for data centers, offering agentless security, powerful intrusion prevention, and a wide range of security features
The primary focus of data center security often revolves around serving customers who offer services to other clients within the data center. For example, if I operate a data center and provide security services, third-party customers might purchase virtual machine products within my data center. These products are automatically deployed, and we safeguard these virtual machines using intrusion prevention system features. This aspect is considered the most valuable part because when we set up these security policies, it's as if we're fortifying the entire infrastructure. It's not just about having good technical support; it's about having a robust IPS and comprehensive DOS prevention system on those operating systems. The advantage of Data Center Security is its ease of use and that it serves as a single unified platform, where I can apply all my security policies to protect that server.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Customer support is excellent."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The tool helps with my company's security posture."
"The solution is easy to use."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"The Explorer allows you to know the traffic between source and destination."
"The flexibility of the solution is its most valuable feature."
"The real strength lies in its straightforward approach, offering just two key policies: prevention and detection."
"We use the product to prevent unauthorized access to data, systems, and servers. It provides essential features for data center security."
"The most valuable feature is the endpoint protection system."
"The monitoring in the management console allows us to find out what is going wrong, and it gets reports even before the user reports it."
"The tool will then detect any anomalies, such as an intruder who has breached the network, which can trigger the system lockdown feature if it's enabled and meets the defined threshold."
"The most valuable feature is the centralized console, which can handle different products that we have."
"The console and tools are very user-friendly."
"The granularity of applying the policies is valuable."
 

Cons

"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"There should be an option to upgrade from the console to the latest version instead of performing manual upgrades. This would be more helpful to streamline processes."
"It requires a low-level re-architecting of the product."
"The customer service is lagging a bit. It could be better."
"We need more details on areas where there is an error or a traffic blockage. I would like the tool to offer a more detailed view."
"There should be an option to upgrade from the console to the latest version instead of performing manual upgrades."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"The product’s agents don't work very well in OT environments."
"Could have better reporting capabilities and better support."
"The product blocks certain processes, even after allowlisting them."
"They need to develop a more flexible product that can be scaled such that it fits well into a small business or a bigger, enterprise-level solution."
"This solution clashes with Microsoft defender, which results in performance degradation on the machine."
"Agent management is a challenging task."
"The support is very bad. They're not fast at all. Trend Micro's support is much better."
"There is plenty of room for improvement with this product, and it could start with platform metrics."
"A user or administrator making the policy in the DCS should have a very thorough knowledge of the operating system or policy making. You have to be very specific about the data structure."
 

Pricing and Cost Advice

"The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis."
"There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive."
"It is notably more expensive when compared to other solutions."
"The product is a bit costly."
"Compared to some other solutions, such as CrowdStrike, Symantec is more expensive."
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
824,145 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
19%
Computer Software Company
16%
Manufacturing Company
9%
Government
6%
Manufacturing Company
20%
Financial Services Firm
17%
Computer Software Company
12%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Illumio Adaptive Security Platform?
The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging poli...
What is your experience regarding pricing and costs for Illumio Adaptive Security Platform?
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
What needs improvement with Illumio Adaptive Security Platform?
The log collection part needs improvement, and the tool should offer more details about the logs. We need more details on areas where there is an error or a traffic blockage. I would like the tool ...
What do you like most about Symantec Data Center Security?
The granularity of applying the policies is valuable.
What needs improvement with Symantec Data Center Security?
Agent management is a challenging task. We cannot do it from the console. We will have to use other tools.
What is your primary use case for Symantec Data Center Security?
One key use case for data center security is protecting files within the data center. This is especially important for Linux systems, where locking down specific files is essential to prevent unaut...
 

Also Known As

Illumio Adaptive Security Platform, Illumio ASP
No data available
 

Learn More

 

Overview

 

Sample Customers

Plantronics, NTT Innovation Institute Inc.
Information Not Available
Find out what your peers are saying about Illumio vs. Symantec Data Center Security and other solutions. Updated: December 2024.
824,145 professionals have used our research since 2012.