Introducing G2.ai, the future of software buying.Try now

Best Data Center Security Solutions

Lauren Worth
LW
Researched and written by Lauren Worth

Data center security tools are used to secure on-premise computing infrastructure located in data centers. These tools provide prevention, detection, and/or remediation tools for securing data center networks and server endpoints. They typically provide some level of firewall and security monitoring capabilities to stop threats and detect unauthorized access. Many data center security solutions come with various additional features for security-related tasks and compliance maintenance.

Companies use data center security solutions to ensure their networks and physical computing infrastructure remain secure and functional. Third-party infrastructure providers and companies with their own dedicated data centers will use these tools to ensure their offerings and services are delivered securely. Companies rely on this infrastructure to deploy applications, maintain websites, and host databases, and for hundreds of various additional computing purposes.

To qualify for inclusion in the Data Center Security category, a product must:

Facilitate the security of on-premise computing infrastructure
Provide a server firewall and malware prevention tools
Provide intrusion prevention and detection capabilities
Assist in security risk analysis and the enforcement of security standards

Best Data Center Security Solutions At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
29 Listings in Data Center Security Solutions Available
(180)4.7 out of 5
2nd Easiest To Use in Data Center Security Solutions software
View top Consulting Services for FortiGate NGFW
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

    Users
    • Network Engineer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 21% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate NGFW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    12
    Security
    11
    Security Protection
    7
    Customer Support
    6
    Cons
    Update Issues
    5
    Slow Performance
    4
    Upgrade Issues
    4
    Limited Features
    3
    Pricing Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate NGFW features and usability ratings that predict user satisfaction
    9.4
    Security hardening
    Average: 8.7
    9.3
    Intrusion Detection
    Average: 8.6
    9.3
    Compliance
    Average: 8.6
    8.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Users
  • Network Engineer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 21% Enterprise
FortiGate NGFW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
12
Security
11
Security Protection
7
Customer Support
6
Cons
Update Issues
5
Slow Performance
4
Upgrade Issues
4
Limited Features
3
Pricing Issues
3
FortiGate NGFW features and usability ratings that predict user satisfaction
9.4
Security hardening
Average: 8.7
9.3
Intrusion Detection
Average: 8.6
9.3
Compliance
Average: 8.6
8.8
Quality of Support
Average: 8.6
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(30)4.8 out of 5
1st Easiest To Use in Data Center Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 57% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appgate SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Reliability
    6
    Customer Support
    5
    Performance Efficiency
    5
    Cons
    Performance Issues
    5
    Connection Issues
    3
    Connectivity Issues
    3
    Complex Setup
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate SDP features and usability ratings that predict user satisfaction
    8.5
    Security hardening
    Average: 8.7
    7.1
    Intrusion Detection
    Average: 8.6
    8.6
    Compliance
    Average: 8.6
    9.2
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    916 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    394 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 57% Enterprise
  • 27% Mid-Market
Appgate SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Reliability
6
Customer Support
5
Performance Efficiency
5
Cons
Performance Issues
5
Connection Issues
3
Connectivity Issues
3
Complex Setup
2
Access Issues
1
Appgate SDP features and usability ratings that predict user satisfaction
8.5
Security hardening
Average: 8.7
7.1
Intrusion Detection
Average: 8.6
8.6
Compliance
Average: 8.6
9.2
Quality of Support
Average: 8.6
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
916 Twitter followers
LinkedIn® Page
www.linkedin.com
394 employees on LinkedIn®
Ownership
OTC: APGT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Our intelligent data discovery and transformation platform provides data analytics and storage performance monitoring to improve workforce productivity and reveal actionable business insights.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Small-Business
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hitachi Content Intelligence features and usability ratings that predict user satisfaction
    8.2
    Security hardening
    Average: 8.7
    7.9
    Intrusion Detection
    Average: 8.6
    8.1
    Compliance
    Average: 8.6
    8.5
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Santa Clara, CA
    Twitter
    @HitachiVantara
    28,760 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,406 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Our intelligent data discovery and transformation platform provides data analytics and storage performance monitoring to improve workforce productivity and reveal actionable business insights.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Small-Business
  • 42% Mid-Market
Hitachi Content Intelligence features and usability ratings that predict user satisfaction
8.2
Security hardening
Average: 8.7
7.9
Intrusion Detection
Average: 8.6
8.1
Compliance
Average: 8.6
8.5
Quality of Support
Average: 8.6
Seller Details
HQ Location
Santa Clara, CA
Twitter
@HitachiVantara
28,760 Twitter followers
LinkedIn® Page
www.linkedin.com
11,406 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppViewX ADC+ provides role-based management, automation, and orchestration of multi-vendor ADC environments that serve applications across data centers.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Small-Business
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ADC+ features and usability ratings that predict user satisfaction
    8.5
    Security hardening
    Average: 8.7
    8.5
    Intrusion Detection
    Average: 8.6
    8.6
    Compliance
    Average: 8.6
    8.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AppViewX
    Year Founded
    2008
    HQ Location
    Plano, TX
    Twitter
    @AppViewX
    834 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    517 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppViewX ADC+ provides role-based management, automation, and orchestration of multi-vendor ADC environments that serve applications across data centers.

Users
No information available
Industries
No information available
Market Segment
  • 54% Small-Business
  • 23% Enterprise
ADC+ features and usability ratings that predict user satisfaction
8.5
Security hardening
Average: 8.7
8.5
Intrusion Detection
Average: 8.6
8.6
Compliance
Average: 8.6
8.8
Quality of Support
Average: 8.6
Seller Details
Seller
AppViewX
Year Founded
2008
HQ Location
Plano, TX
Twitter
@AppViewX
834 Twitter followers
LinkedIn® Page
www.linkedin.com
517 employees on LinkedIn®
(15)4.5 out of 5
3rd Easiest To Use in Data Center Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitdefender GravityZone Datacenter Security features and usability ratings that predict user satisfaction
    8.5
    Security hardening
    Average: 8.7
    8.8
    Intrusion Detection
    Average: 8.6
    7.9
    Compliance
    Average: 8.6
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Bucuresti, Romania
    Twitter
    @Bitdefender
    113,319 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,287 employees on LinkedIn®
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Small-Business
  • 27% Mid-Market
Bitdefender GravityZone Datacenter Security features and usability ratings that predict user satisfaction
8.5
Security hardening
Average: 8.7
8.8
Intrusion Detection
Average: 8.6
7.9
Compliance
Average: 8.6
8.3
Quality of Support
Average: 8.6
Seller Details
Year Founded
2001
HQ Location
Bucuresti, Romania
Twitter
@Bitdefender
113,319 Twitter followers
LinkedIn® Page
www.linkedin.com
2,287 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Data Center Security is a software that secures, hardens, and monitors the compliance posture of server systems for on-premise, public, and private cloud data centers.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Data Center Security features and usability ratings that predict user satisfaction
    8.8
    Security hardening
    Average: 8.7
    8.0
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    8.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Data Center Security is a software that secures, hardens, and monitors the compliance posture of server systems for on-premise, public, and private cloud data centers.

Users
No information available
Industries
No information available
Market Segment
  • 53% Small-Business
  • 29% Mid-Market
Symantec Data Center Security features and usability ratings that predict user satisfaction
8.8
Security hardening
Average: 8.7
8.0
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
8.8
Quality of Support
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Small-Business
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Access Centralization
    1
    Centralized Management
    1
    Ease of Connectivity
    1
    Performance Efficiency
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
    8.3
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    9.4
    Compliance
    Average: 8.6
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Small-Business
  • 28% Mid-Market
Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Access Centralization
1
Centralized Management
1
Ease of Connectivity
1
Performance Efficiency
1
Cons
This product has not yet received any negative sentiments.
Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
8.3
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
9.4
Compliance
Average: 8.6
8.3
Quality of Support
Average: 8.6
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 45% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Juniper Security Director features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Compliance
    Average: 8.6
    8.9
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    105,379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,845 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 45% Small-Business
Juniper Security Director features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Compliance
Average: 8.6
8.9
Quality of Support
Average: 8.6
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
105,379 Twitter followers
LinkedIn® Page
www.linkedin.com
11,845 employees on LinkedIn®
(45)4.3 out of 5
4th Easiest To Use in Data Center Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    9.4
    Security hardening
    Average: 8.7
    9.4
    Intrusion Detection
    Average: 8.6
    7.9
    Compliance
    Average: 8.6
    7.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    98,579 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,529 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 33% Enterprise
HashiCorp Vault features and usability ratings that predict user satisfaction
9.4
Security hardening
Average: 8.7
9.4
Intrusion Detection
Average: 8.6
7.9
Compliance
Average: 8.6
7.8
Quality of Support
Average: 8.6
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
98,579 Twitter followers
LinkedIn® Page
www.linkedin.com
2,529 employees on LinkedIn®
Ownership
NASDAQ: HCP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro TippingPoint features and usability ratings that predict user satisfaction
    8.8
    Security hardening
    Average: 8.7
    7.4
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    9.0
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Mid-Market
Trend Micro TippingPoint features and usability ratings that predict user satisfaction
8.8
Security hardening
Average: 8.7
7.4
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
9.0
Quality of Support
Average: 8.6
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Integrated Cyber Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alert Notifications
    3
    Ease of Use
    3
    Security
    3
    Cybersecurity
    2
    Cybersecurity Protection
    2
    Cons
    Slow Performance
    4
    Performance Issues
    3
    Complexity
    2
    Delays
    2
    High Resource Consumption
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
    8.9
    Security hardening
    Average: 8.7
    9.6
    Intrusion Detection
    Average: 8.6
    8.9
    Compliance
    Average: 8.6
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Symantec Integrated Cyber Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alert Notifications
3
Ease of Use
3
Security
3
Cybersecurity
2
Cybersecurity Protection
2
Cons
Slow Performance
4
Performance Issues
3
Complexity
2
Delays
2
High Resource Consumption
2
Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
8.9
Security hardening
Average: 8.7
9.6
Intrusion Detection
Average: 8.6
8.9
Compliance
Average: 8.6
8.3
Quality of Support
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Application Centric Infrastructure (ACI) simplifies, optimizes, and accelerates the application deployment lifecycle in next-generation data centers and clouds.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Application Centric Infrastructure (ACI) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Configuration Ease
    3
    Configuration Management
    3
    Automation
    2
    Automation Efficiency
    2
    Centralized Management
    2
    Cons
    Complexity
    2
    Complex Setup
    2
    Configuration Difficulty
    2
    Expensive
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Application Centric Infrastructure (ACI) features and usability ratings that predict user satisfaction
    8.1
    Security hardening
    Average: 8.7
    8.6
    Intrusion Detection
    Average: 8.6
    8.6
    Compliance
    Average: 8.6
    8.1
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Application Centric Infrastructure (ACI) simplifies, optimizes, and accelerates the application deployment lifecycle in next-generation data centers and clouds.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 32% Enterprise
Cisco Application Centric Infrastructure (ACI) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Configuration Ease
3
Configuration Management
3
Automation
2
Automation Efficiency
2
Centralized Management
2
Cons
Complexity
2
Complex Setup
2
Configuration Difficulty
2
Expensive
2
Learning Curve
2
Cisco Application Centric Infrastructure (ACI) features and usability ratings that predict user satisfaction
8.1
Security hardening
Average: 8.7
8.6
Intrusion Detection
Average: 8.6
8.6
Compliance
Average: 8.6
8.1
Quality of Support
Average: 8.6
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maximum data security, minimal impact on hardware resources

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 36% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Database Security features and usability ratings that predict user satisfaction
    8.1
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    8.0
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maximum data security, minimal impact on hardware resources

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 36% Small-Business
  • 33% Enterprise
Trellix Database Security features and usability ratings that predict user satisfaction
8.1
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
8.0
Quality of Support
Average: 8.6
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 14% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • vSRX features and usability ratings that predict user satisfaction
    9.2
    Security hardening
    Average: 8.7
    8.9
    Intrusion Detection
    Average: 8.6
    9.2
    Compliance
    Average: 8.6
    7.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    105,379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,845 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 14% Enterprise
vSRX features and usability ratings that predict user satisfaction
9.2
Security hardening
Average: 8.7
8.9
Intrusion Detection
Average: 8.6
9.2
Compliance
Average: 8.6
7.3
Quality of Support
Average: 8.6
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
105,379 Twitter followers
LinkedIn® Page
www.linkedin.com
11,845 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Cloud Secure Virtualization combines the power of IBM Cloud, VMware Cloud Foundation, HyTrust security software, and Intel TXT-enabled hardware to protect virtualized workloads down to the microch

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Secure Virtualization features and usability ratings that predict user satisfaction
    8.0
    Security hardening
    Average: 8.7
    8.7
    Intrusion Detection
    Average: 8.6
    8.7
    Compliance
    Average: 8.6
    7.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Cloud Secure Virtualization combines the power of IBM Cloud, VMware Cloud Foundation, HyTrust security software, and Intel TXT-enabled hardware to protect virtualized workloads down to the microch

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 30% Enterprise
IBM Secure Virtualization features and usability ratings that predict user satisfaction
8.0
Security hardening
Average: 8.7
8.7
Intrusion Detection
Average: 8.6
8.7
Compliance
Average: 8.6
7.8
Quality of Support
Average: 8.6
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

     Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications,

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Illumio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Malware Protection
    1
    Security
    1
    Threat Protection
    1
    Cons
    Expensive
    1
    Integration Issues
    1
    Time-Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Illumio features and usability ratings that predict user satisfaction
    9.6
    Security hardening
    Average: 8.7
    9.6
    Intrusion Detection
    Average: 8.6
    8.8
    Compliance
    Average: 8.6
    9.5
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Illumio
    Year Founded
    2013
    HQ Location
    Sunnyvale, California
    Twitter
    @illumio
    3,409 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    792 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

 Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications,

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Illumio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Malware Protection
1
Security
1
Threat Protection
1
Cons
Expensive
1
Integration Issues
1
Time-Consumption
1
Illumio features and usability ratings that predict user satisfaction
9.6
Security hardening
Average: 8.7
9.6
Intrusion Detection
Average: 8.6
8.8
Compliance
Average: 8.6
9.5
Quality of Support
Average: 8.6
Seller Details
Seller
Illumio
Year Founded
2013
HQ Location
Sunnyvale, California
Twitter
@illumio
3,409 Twitter followers
LinkedIn® Page
www.linkedin.com
792 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Agilio OVS Firewall Software is designed to enable zero-trust stateful security in data centers using OpenStack-based automation. Agilio OVS Firewall Software, combined with Agilio SmartNICs, enab

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Small-Business
    • 14% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Agilio OVS Firewall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Firewall Efficiency
    1
    Hardware Compatibility
    1
    Network Connectivity
    1
    Cons
    Complex Configuration
    2
    Difficult Learning Curve
    1
    Expensive
    1
    Hardware Issues
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Agilio OVS Firewall features and usability ratings that predict user satisfaction
    8.3
    Security hardening
    Average: 8.7
    8.9
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    7.7
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netronome
    Year Founded
    2003
    HQ Location
    Santa Clara, CA
    Twitter
    @Netronome
    2,919 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Agilio OVS Firewall Software is designed to enable zero-trust stateful security in data centers using OpenStack-based automation. Agilio OVS Firewall Software, combined with Agilio SmartNICs, enab

Users
No information available
Industries
No information available
Market Segment
  • 86% Small-Business
  • 14% Mid-Market
Agilio OVS Firewall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Firewall Efficiency
1
Hardware Compatibility
1
Network Connectivity
1
Cons
Complex Configuration
2
Difficult Learning Curve
1
Expensive
1
Hardware Issues
1
Integration Issues
1
Agilio OVS Firewall features and usability ratings that predict user satisfaction
8.3
Security hardening
Average: 8.7
8.9
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
7.7
Quality of Support
Average: 8.6
Seller Details
Seller
Netronome
Year Founded
2003
HQ Location
Santa Clara, CA
Twitter
@Netronome
2,919 Twitter followers
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Small-Business
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Digital Guardian Secure Collaboration Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Encryption
    1
    Product Quality
    1
    Protection
    1
    Cons
    Complexity
    1
    Complex Processes
    1
    Difficult Learning Curve
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Digital Guardian Secure Collaboration features and usability ratings that predict user satisfaction
    8.3
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    7.6
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

Users
No information available
Industries
No information available
Market Segment
  • 53% Small-Business
  • 27% Enterprise
Digital Guardian Secure Collaboration Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Encryption
1
Product Quality
1
Protection
1
Cons
Complexity
1
Complex Processes
1
Difficult Learning Curve
1
Difficult Setup
1
Digital Guardian Secure Collaboration features and usability ratings that predict user satisfaction
8.3
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
7.6
Quality of Support
Average: 8.6
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Centripetal CleanINTERNET ® Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    1
    Integration Capabilities
    1
    Network Security
    1
    Reliability
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
    9.2
    Security hardening
    Average: 8.7
    9.2
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    10.0
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Reston, VA
    Twitter
    @Centripetal_AI
    475 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Small-Business
Centripetal CleanINTERNET ® Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
1
Integration Capabilities
1
Network Security
1
Reliability
1
Security
1
Cons
This product has not yet received any negative sentiments.
Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
9.2
Security hardening
Average: 8.7
9.2
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
10.0
Quality of Support
Average: 8.6
Seller Details
Year Founded
2009
HQ Location
Reston, VA
Twitter
@Centripetal_AI
475 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetAppRAID-DPtechnology, a standard feature of the Data ONTAPoperating system, is a double-parity RAID 6 implementation that prevents data loss when two drives fail.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Raid DP features and usability ratings that predict user satisfaction
    10.0
    Security hardening
    Average: 8.7
    10.0
    Intrusion Detection
    Average: 8.6
    10.0
    Compliance
    Average: 8.6
    10.0
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetApp
    Year Founded
    1992
    HQ Location
    Sunnyvale, California
    Twitter
    @NetApp
    119,705 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,660 employees on LinkedIn®
    Ownership
    NASDAQ
Product Description
How are these determined?Information
This description is provided by the seller.

NetAppRAID-DPtechnology, a standard feature of the Data ONTAPoperating system, is a double-parity RAID 6 implementation that prevents data loss when two drives fail.

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
Raid DP features and usability ratings that predict user satisfaction
10.0
Security hardening
Average: 8.7
10.0
Intrusion Detection
Average: 8.6
10.0
Compliance
Average: 8.6
10.0
Quality of Support
Average: 8.6
Seller Details
Seller
NetApp
Year Founded
1992
HQ Location
Sunnyvale, California
Twitter
@NetApp
119,705 Twitter followers
LinkedIn® Page
www.linkedin.com
12,660 employees on LinkedIn®
Ownership
NASDAQ
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Software Defined Perimeter acts as your bouncer, allowing only approved users to access network resources. It authenticates identities and devices, letting you “hide” enterprise apps and resources fro

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verizon Software Defined Perimeter features and usability ratings that predict user satisfaction
    8.3
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Basking Ridge, NJ
    Twitter
    @VerizonEnterpr
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,671 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Software Defined Perimeter acts as your bouncer, allowing only approved users to access network resources. It authenticates identities and devices, letting you “hide” enterprise apps and resources fro

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
Verizon Software Defined Perimeter features and usability ratings that predict user satisfaction
8.3
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
0.0
No information available
8.3
Quality of Support
Average: 8.6
Seller Details
Year Founded
1988
HQ Location
Basking Ridge, NJ
Twitter
@VerizonEnterpr
6 Twitter followers
LinkedIn® Page
www.linkedin.com
16,671 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Avi Networks enables public-cloud-like simplicity and flexibility for application services such as load balancing, application analytics, and security in any data center or cloud.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VMware Avi Load Balancer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Versatility
    2
    API Usability
    1
    Deployment Speed
    1
    Flexibility
    1
    Integrations
    1
    Cons
    Learning Difficulty
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VMware Avi Load Balancer features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Avi Networks enables public-cloud-like simplicity and flexibility for application services such as load balancing, application analytics, and security in any data center or cloud.

Users
No information available
Industries
No information available
Market Segment
  • 56% Enterprise
  • 33% Small-Business
VMware Avi Load Balancer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Versatility
2
API Usability
1
Deployment Speed
1
Flexibility
1
Integrations
1
Cons
Learning Difficulty
1
Poor Documentation
1
VMware Avi Load Balancer features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Quality of Support
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudPassage is a security and compliance automation platform designed to provide instant visibility and continuous protection for servers in any combination of data centers, private clouds and public

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fidelis Halo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Efficiency
    2
    Internet Security
    2
    Protection
    2
    Real-time Monitoring
    2
    Security
    2
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fidelis Halo features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Bethesda, MD
    Twitter
    @FidelisCyber
    2,246 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudPassage is a security and compliance automation platform designed to provide instant visibility and continuous protection for servers in any combination of data centers, private clouds and public

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Fidelis Halo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Efficiency
2
Internet Security
2
Protection
2
Real-time Monitoring
2
Security
2
Cons
This product has not yet received any negative sentiments.
Fidelis Halo features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Quality of Support
Average: 8.6
Seller Details
Year Founded
2002
HQ Location
Bethesda, MD
Twitter
@FidelisCyber
2,246 Twitter followers
LinkedIn® Page
www.linkedin.com
197 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FirstWave Cloud is a fully virtualised solution allowing telcos to deliver advanced cloud security solutions.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FirstWave Cloud features and usability ratings that predict user satisfaction
    8.3
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

FirstWave Cloud is a fully virtualised solution allowing telcos to deliver advanced cloud security solutions.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
FirstWave Cloud features and usability ratings that predict user satisfaction
8.3
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
8.3
Quality of Support
Average: 8.6
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudControl helps you protect your virtual infrastructure with authentication, authorization and auditing. Better visibility and control simplify compliance and accelerate further virtualization

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HyTrust Cloud Control features and usability ratings that predict user satisfaction
    10.0
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    10.0
    Compliance
    Average: 8.6
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HyTrust
    HQ Location
    Minneapolis, Minnesota, United States
    Twitter
    @HyTrust
    1,601 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,812 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudControl helps you protect your virtual infrastructure with authentication, authorization and auditing. Better visibility and control simplify compliance and accelerate further virtualization

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
HyTrust Cloud Control features and usability ratings that predict user satisfaction
10.0
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
10.0
Compliance
Average: 8.6
8.3
Quality of Support
Average: 8.6
Seller Details
Seller
HyTrust
HQ Location
Minneapolis, Minnesota, United States
Twitter
@HyTrust
1,601 Twitter followers
LinkedIn® Page
www.linkedin.com
3,812 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your workloads, users and critical assets from zero-day and advanced persistent threats in minutes

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ColorTokens Xtended ZeroTrust Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Intuitive
    1
    User Interface
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ColorTokens Xtended ZeroTrust Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @ColorTokensInc
    415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    151 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your workloads, users and critical assets from zero-day and advanced persistent threats in minutes

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ColorTokens Xtended ZeroTrust Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Intuitive
1
User Interface
1
Cons
This product has not yet received any negative sentiments.
ColorTokens Xtended ZeroTrust Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Quality of Support
Average: 8.6
Seller Details
Twitter
@ColorTokensInc
415 Twitter followers
LinkedIn® Page
www.linkedin.com
151 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At DC Pulse, we are a passionate team of analysts, writers, and technology experts united by one goal: delivering trusted, data-driven insights into the ever-evolving world of data centers. Our res

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DC Pulse features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DC Pulse
    Year Founded
    2017
    HQ Location
    Pune, IN
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At DC Pulse, we are a passionate team of analysts, writers, and technology experts united by one goal: delivering trusted, data-driven insights into the ever-evolving world of data centers. Our res

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DC Pulse features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
DC Pulse
Year Founded
2017
HQ Location
Pune, IN
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetSpective Content Filter is a security solutions that can be used to create tiered service levels where service providers can structure revenue generating offerings.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetSpective Content Filter features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

NetSpective Content Filter is a security solutions that can be used to create tiered service levels where service providers can structure revenue generating offerings.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NetSpective Content Filter features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privafy’s security-as-a-service application secures data wherever it travels. The company’s cloud-native technology integrates all the functionality of traditional point solutions, such as encryption,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privafy features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Privafy
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Privafy’s security-as-a-service application secures data wherever it travels. The company’s cloud-native technology integrates all the functionality of traditional point solutions, such as encryption,

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Privafy features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Quality of Support
Average: 8.6
Seller Details
Seller
Privafy
LinkedIn® Page
www.linkedin.com