Introducing G2.ai, the future of software buying.Try now

Best Cloud Workload Protection Platforms - Page 4

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud workload protection platforms help protect servers and cloud infrastructure and virtual machines (VMs) from web-based threats.

To qualify for inclusion in the Cloud Workload Protection Platforms category, a product must:

Protect cloud infrastructure and virtual machines.
Support container-based application security
Monitor and protect public, private, or hybrid-cloud environments
Show More
Show Less

Best Cloud Workload Protection Platforms At A Glance

Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Easiest to Use:
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
88 Listings in Cloud Workload Protection Platforms Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers id

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sonrai Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Security
    12
    Security
    12
    Cloud Management
    10
    Ease of Use
    9
    Cloud Technology
    8
    Cons
    Complexity
    3
    Expensive
    3
    Feature Limitations
    3
    Improvement Needed
    3
    Limited Customization
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sonrai Security features and usability ratings that predict user satisfaction
    10.0
    Governance
    Average: 8.7
    8.3
    Ease of Admin
    Average: 9.0
    6.7
    API / Integrations
    Average: 8.6
    10.0
    Security Auditing
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers id

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Sonrai Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Security
12
Security
12
Cloud Management
10
Ease of Use
9
Cloud Technology
8
Cons
Complexity
3
Expensive
3
Feature Limitations
3
Improvement Needed
3
Limited Customization
3
Sonrai Security features and usability ratings that predict user satisfaction
10.0
Governance
Average: 8.7
8.3
Ease of Admin
Average: 9.0
6.7
API / Integrations
Average: 8.6
10.0
Security Auditing
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Integrated Cyber Defense (ICD is a comprehensive cybersecurity platform designed to unify and streamline security across an organization's entire digital infrastructure. By integrating advanc

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Integrated Cyber Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Security
    5
    Monitoring
    4
    Alert Notifications
    3
    Cybersecurity Protection
    3
    Cons
    Slow Performance
    4
    Complexity
    3
    Performance Issues
    3
    Delays
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
    7.5
    Governance
    Average: 8.7
    8.6
    Ease of Admin
    Average: 9.0
    5.8
    API / Integrations
    Average: 8.6
    6.7
    Security Auditing
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,049 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Integrated Cyber Defense (ICD is a comprehensive cybersecurity platform designed to unify and streamline security across an organization's entire digital infrastructure. By integrating advanc

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Enterprise
  • 38% Mid-Market
Symantec Integrated Cyber Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Security
5
Monitoring
4
Alert Notifications
3
Cybersecurity Protection
3
Cons
Slow Performance
4
Complexity
3
Performance Issues
3
Delays
2
Difficult Learning
2
Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
7.5
Governance
Average: 8.7
8.6
Ease of Admin
Average: 9.0
5.8
API / Integrations
Average: 8.6
6.7
Security Auditing
Average: 8.8
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,049 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC Helix Cloud Security automates cloud configuration security checks and remediation - no coding required! - so that the IaaS and PaaS services your stakeholders use are configured securely, consist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Helix Cloud Security features and usability ratings that predict user satisfaction
    8.3
    Governance
    Average: 8.7
    8.3
    Ease of Admin
    Average: 9.0
    8.3
    API / Integrations
    Average: 8.6
    6.7
    Security Auditing
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BMC Helix
    Year Founded
    2025
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    909 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BMC Helix Cloud Security automates cloud configuration security checks and remediation - no coding required! - so that the IaaS and PaaS services your stakeholders use are configured securely, consist

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 40% Mid-Market
BMC Helix Cloud Security features and usability ratings that predict user satisfaction
8.3
Governance
Average: 8.7
8.3
Ease of Admin
Average: 9.0
8.3
API / Integrations
Average: 8.6
6.7
Security Auditing
Average: 8.8
Seller Details
Seller
BMC Helix
Year Founded
2025
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
909 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Xshield stops the lateral spread of malware & ransomware by putting a micro-perimeter around every network asset. With Xshield, you can visualize a map of all your network assets, applications, an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ColorTokens Xshield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    1
    Security
    1
    Visibility
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ColorTokens Xshield features and usability ratings that predict user satisfaction
    10.0
    Governance
    Average: 8.7
    9.2
    Ease of Admin
    Average: 9.0
    10.0
    API / Integrations
    Average: 8.6
    10.0
    Security Auditing
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    San Jose, California, United States
    Twitter
    @ColorTokensInc
    424 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    280 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Xshield stops the lateral spread of malware & ransomware by putting a micro-perimeter around every network asset. With Xshield, you can visualize a map of all your network assets, applications, an

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ColorTokens Xshield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
1
Security
1
Visibility
1
Cons
Slow Performance
1
ColorTokens Xshield features and usability ratings that predict user satisfaction
10.0
Governance
Average: 8.7
9.2
Ease of Admin
Average: 9.0
10.0
API / Integrations
Average: 8.6
10.0
Security Auditing
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
San Jose, California, United States
Twitter
@ColorTokensInc
424 Twitter followers
LinkedIn® Page
www.linkedin.com
280 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Conjur features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.7
    Ease of Admin
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,022 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Enterprise
  • 29% Mid-Market
CyberArk Conjur features and usability ratings that predict user satisfaction
0.0
No information available
8.7
Ease of Admin
Average: 9.0
0.0
No information available
0.0
No information available
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,662 Twitter followers
LinkedIn® Page
www.linkedin.com
5,022 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Morphisec fortifies your organization by diminishing the blast radius of attacks, to preemptively reduce the organization’s exposure to cyber risk, pro-actively prevent advanced threats, and ensure op

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Morphisec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    1
    Threat Detection
    1
    Threat Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Morphisec features and usability ratings that predict user satisfaction
    9.2
    Governance
    Average: 8.7
    9.7
    Ease of Admin
    Average: 9.0
    7.5
    API / Integrations
    Average: 8.6
    10.0
    Security Auditing
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Morphisec
    Year Founded
    2014
    HQ Location
    Waltham, US
    Twitter
    @morphisec
    2,248 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Morphisec fortifies your organization by diminishing the blast radius of attacks, to preemptively reduce the organization’s exposure to cyber risk, pro-actively prevent advanced threats, and ensure op

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Mid-Market
  • 17% Enterprise
Morphisec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
1
Threat Detection
1
Threat Protection
1
Cons
This product has not yet received any negative sentiments.
Morphisec features and usability ratings that predict user satisfaction
9.2
Governance
Average: 8.7
9.7
Ease of Admin
Average: 9.0
7.5
API / Integrations
Average: 8.6
10.0
Security Auditing
Average: 8.8
Seller Details
Seller
Morphisec
Year Founded
2014
HQ Location
Waltham, US
Twitter
@morphisec
2,248 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Upwind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Visibility
    3
    Customer Support
    2
    Detection Efficiency
    2
    Implementation Ease
    2
    Cons
    Alert Overload
    1
    Compliance Issues
    1
    Data Management
    1
    Data Overload
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Upwind features and usability ratings that predict user satisfaction
    10.0
    Governance
    Average: 8.7
    9.2
    Ease of Admin
    Average: 9.0
    10.0
    API / Integrations
    Average: 8.6
    10.0
    Security Auditing
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Upwind
    Company Website
    Year Founded
    2022
    HQ Location
    San Francisco, California, United States
    LinkedIn® Page
    www.linkedin.com
    217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 29% Enterprise
Upwind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Visibility
3
Customer Support
2
Detection Efficiency
2
Implementation Ease
2
Cons
Alert Overload
1
Compliance Issues
1
Data Management
1
Data Overload
1
False Positives
1
Upwind features and usability ratings that predict user satisfaction
10.0
Governance
Average: 8.7
9.2
Ease of Admin
Average: 9.0
10.0
API / Integrations
Average: 8.6
10.0
Security Auditing
Average: 8.8
Seller Details
Seller
Upwind
Company Website
Year Founded
2022
HQ Location
San Francisco, California, United States
LinkedIn® Page
www.linkedin.com
217 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure Cloud Interconnect helps you connect to our global ecosystem of leading Cloud Service Providers (CSPs) from your Verizon Private IP Multiprotocol Label Switching (MPLS)-based VPN network—simply

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verizon Secure Cloud Interconnect features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Basking Ridge, NJ
    Twitter
    @VerizonEnterpr
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,200 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure Cloud Interconnect helps you connect to our global ecosystem of leading Cloud Service Providers (CSPs) from your Verizon Private IP Multiprotocol Label Switching (MPLS)-based VPN network—simply

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Verizon Secure Cloud Interconnect features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Basking Ridge, NJ
Twitter
@VerizonEnterpr
6 Twitter followers
LinkedIn® Page
www.linkedin.com
16,200 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Virsec provides Zero Trust cybersecurity for legacy and modern workloads with the Virsec Security Platform (VSP). Using a default-deny, allow-on-trust security compensating control, VSP protects appli

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virsec Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    7.5
    Ease of Admin
    Average: 9.0
    0.0
    No information available
    6.7
    Security Auditing
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    San Jose, US
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Virsec provides Zero Trust cybersecurity for legacy and modern workloads with the Virsec Security Platform (VSP). Using a default-deny, allow-on-trust security compensating control, VSP protects appli

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 50% Enterprise
Virsec Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
7.5
Ease of Admin
Average: 9.0
0.0
No information available
6.7
Security Auditing
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
San Jose, US
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ADEPT Egress Control blocks breaches and protects your cloud workloads. Our product essentially zero-trusts your software, protecting against supply chain threats, command and control, and data leaks

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ADEPT Egress Control features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Ashburn, US
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ADEPT Egress Control blocks breaches and protects your cloud workloads. Our product essentially zero-trusts your software, protecting against supply chain threats, command and control, and data leaks

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
ADEPT Egress Control features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Ease of Admin
Average: 9.0
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Ashburn, US
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Dom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Enterprise Threat Protector features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    115,592 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,286 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Dom

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Akamai Enterprise Threat Protector features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
115,592 Twitter followers
LinkedIn® Page
www.linkedin.com
10,286 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardicore is a data center and cloud security company that protects your organization’s core assets using flexible, quickly deployed, and easy to understand micro-segmentation controls.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Guardicore Segmentation features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    115,592 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,286 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Product Description
How are these determined?Information
This description is provided by the seller.

Guardicore is a data center and cloud security company that protects your organization’s core assets using flexible, quickly deployed, and easy to understand micro-segmentation controls.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Akamai Guardicore Segmentation features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Ease of Admin
Average: 9.0
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
115,592 Twitter followers
LinkedIn® Page
www.linkedin.com
10,286 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Server Guard is a host security software system. It provides functions such as host vulnerability detection, baseline check, virus scan and removal, and unified asset management

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alibaba Server Guard features and usability ratings that predict user satisfaction
    10.0
    Governance
    Average: 8.7
    10.0
    Ease of Admin
    Average: 9.0
    10.0
    API / Integrations
    Average: 8.6
    10.0
    Security Auditing
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Alibaba
    HQ Location
    Hangzhou
    Twitter
    @alibaba_cloud
    1,092,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,774 employees on LinkedIn®
    Ownership
    BABA
    Total Revenue (USD mm)
    $509,711
Product Description
How are these determined?Information
This description is provided by the seller.

Server Guard is a host security software system. It provides functions such as host vulnerability detection, baseline check, virus scan and removal, and unified asset management

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Alibaba Server Guard features and usability ratings that predict user satisfaction
10.0
Governance
Average: 8.7
10.0
Ease of Admin
Average: 9.0
10.0
API / Integrations
Average: 8.6
10.0
Security Auditing
Average: 8.8
Seller Details
Seller
Alibaba
HQ Location
Hangzhou
Twitter
@alibaba_cloud
1,092,998 Twitter followers
LinkedIn® Page
www.linkedin.com
4,774 employees on LinkedIn®
Ownership
BABA
Total Revenue (USD mm)
$509,711
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Atomic Enterprise OSSEC is the commercially enhanced version of the OSSEC Intrusion Detection System brought to you by the sponsors of the OSSEC project. OSSEC is the world’s most popular open source

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Atomic Enterprise OSSEC features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Atomicorp
    Year Founded
    2015
    HQ Location
    Chantilly, US
    Twitter
    @atomicorp
    713 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Atomic Enterprise OSSEC is the commercially enhanced version of the OSSEC Intrusion Detection System brought to you by the sponsors of the OSSEC project. OSSEC is the world’s most popular open source

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Atomic Enterprise OSSEC features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Atomicorp
Year Founded
2015
HQ Location
Chantilly, US
Twitter
@atomicorp
713 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AtomicWP Workload Security helps to secure workloads in a variety of environments while enhancing security. Meets virtually all cloud workload protection and compliance requirements in a single lightw

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AtomicWP Workload Protection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Atomicorp
    Year Founded
    2015
    HQ Location
    Chantilly, US
    Twitter
    @atomicorp
    713 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AtomicWP Workload Security helps to secure workloads in a variety of environments while enhancing security. Meets virtually all cloud workload protection and compliance requirements in a single lightw

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
AtomicWP Workload Protection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Atomicorp
Year Founded
2015
HQ Location
Chantilly, US
Twitter
@atomicorp
713 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®