# Best Data Center Security Solutions

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Data center security tools are used to secure on-premise computing infrastructure located in data centers. These tools provide prevention, detection, and/or remediation tools for securing data center networks and server endpoints. They typically provide some level of [firewall](https://www.g2.com/categories/firewall) and security monitoring capabilities to stop threats and detect unauthorized access. Many data center security solutions come with various additional features for security-related tasks and compliance maintenance.

Companies use data center security solutions to ensure their networks and physical computing infrastructure remain secure and functional. Third-party infrastructure providers and companies with their own dedicated data centers will use these tools to ensure their offerings and services are delivered securely. Companies rely on this infrastructure to deploy applications, maintain websites, and host databases, and for hundreds of various additional computing purposes.

To qualify for inclusion in the Data Center Security category, a product must:

- Facilitate the security of on-premise computing infrastructure
- Provide a server firewall and malware prevention tools
- Provide intrusion prevention and detection capabilities
- Assist in security risk analysis and the enforcement of security standards





## Category Overview

**Total Products under this Category:** 27


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 800+ Authentic Reviews
- 27+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Data Center Security Solutions At A Glance

- **Leader:** [FortiGate-VM NGFW](https://www.g2.com/products/fortigate-vm-ngfw/reviews)
- **Highest Performer:** [Illumio](https://www.g2.com/products/illumio/reviews)
- **Easiest to Use:** [Appgate SDP](https://www.g2.com/products/appgate-sdp/reviews)
- **Top Trending:** [FortiGate-VM NGFW](https://www.g2.com/products/fortigate-vm-ngfw/reviews)
- **Best Free Software:** [FortiGate-VM NGFW](https://www.g2.com/products/fortigate-vm-ngfw/reviews)


---

**Sponsored**

### Guardian

Alert Enterprise Guardian is a leading Physical Identity and Access Management (PIAM), Visitor Management, and Identity &amp; Access Management (IAM) platform that unifies physical security, identity governance, and physical access control systems (PACS) into a single, automated solution. Guardian provides a single pane of glass to manage access for employees, contractors, and visitors, helping organizations reduce manual effort, automate workflows, improve compliance, and gain real-time visibility across facilities. 🔐 Physical Identity &amp; Access Management (PIAM) Guardian transforms systems like LenelS2, C•CURE, Honeywell and Genetec into an identity-driven platform with lifecycle automation and governance. By integrating with HR systems (Workday, SAP, Oracle) and IT identity platforms, Guardian enables: Automated provisioning and deprovisioning Real-time access visibility User access reviews (UAR) and compliance reporting (NERC, SOC 2, HIPAA) This replaces fragmented processes with centralized, policy-based access control. 🏢 Enterprise Visitor Management Guardian delivers enterprise-grade visitor management beyond tools like Envoy, connecting visitor workflows directly to PACS and identity systems. Pre-registration, check-in, and badge printing Integration with turnstiles and access systems Real-time visibility into site activity This ensures secure, consistent visitor experiences across locations. 🧠 IAM with Cyber-Physical Convergence Guardian extends IAM solutions like Saviynt, SailPoint and Okta by bridging digital identity and physical access. Identity lifecycle automation (joiner, mover, leaver) Role-based access control (RBAC) Access certifications and audit reporting Organizations gain full control over who has access to what, across IT and physical environments. 🚀 Why Organizations Choose Guardian Guardian combines: End-to-end access automation HR–IT–PACS integration Enterprise visitor management Faster provisioning and reduced manual effort Improved compliance and audit readiness Mobile credentials and AI-driven insights Customers highlight ease of use, scalability, strong integrations, and responsive support. 🏭 Built for Enterprise &amp; Regulated Environments Ideal for: Healthcare, energy, and utilities (NERC) Global enterprises with multiple PACS Financial services, manufacturing, and education Technology, Data Centers, Telecommunication Pharmaceuticals, Life Sciences, Biotech 📈 Key Outcomes Automated access processes Faster onboarding and provisioning Reduced risk (e.g., eliminating orphaned access) Enterprise-wide visibility Improved user experience 🌐 Flexible Deployment &amp; Global Support Deploy Guardian your way—SaaS (US/EU), AWS, Azure, GCP, ServiceNow, or on-premise. Backed by a global services team and 24/7, 365 support with SLA, Guardian ensures success from implementation through operations.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1615&amp;secure%5Bdisplayable_resource_id%5D=1615&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1615&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=21372&amp;secure%5Bresource_id%5D=1615&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fdata-center-security-solutions%2Fsmall-business&amp;secure%5Btoken%5D=eec227270856a8e12e627a298b99bd5c7dcb5244b7b16ed8a2a7c3fbd9695495&amp;secure%5Burl%5D=https%3A%2F%2Falertenterprise.com%2Fcontact%2F&amp;secure%5Burl_type%5D=book_demo)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [FortiGate-VM NGFW](https://www.g2.com/products/fortigate-vm-ngfw/reviews)
  FortiGate-VM is a virtual firewall solution designed to help users secure their cloud environments and on-premises networks. As a next-generation firewall developed by Fortinet, FortiGate-VM integrates advanced security features with the flexibility of virtualization, making it suitable for deployment in various public and private cloud infrastructures. This solution is particularly beneficial for organizations looking to enhance their cybersecurity posture while leveraging the scalability and efficiency of cloud technologies. Targeted at enterprises and organizations of all sizes, FortiGate-VM is ideal for IT security teams that require robust protection against increasingly sophisticated cyber threats. Its deployment across diverse environments allows businesses to maintain consistent security policies and practices, regardless of whether their infrastructure is on-premises, in the cloud, or a hybrid of both. Specific use cases include protecting sensitive data in cloud applications, securing remote access for employees, SD-WAN, and ensuring compliance with industry regulations. One of the key features of FortiGate-VM is its AI-powered threat intelligence. FortiGuard utilizes machine learning algorithms to analyze vast amounts of data, enabling the identification of emerging threats in real time. This proactive approach to threat detection ensures that organizations can respond swiftly to potential vulnerabilities before they can be exploited. Additionally, the behavioral analysis capabilities of FortiGate-VM allow for the identification of anomalous activities, further enhancing its ability to mitigate risks associated with cyberattacks. FortiGate-VM stands out in the virtual firewall category due to its seamless integration with existing Fortinet security solutions, providing a comprehensive security architecture. The solution offers advanced features such as intrusion prevention, web filtering, and application control, all of which contribute to a multi-layered defense strategy. Furthermore, its scalability allows organizations to easily adjust their security resources in response to changing business needs, ensuring that they remain protected as they grow. FortiGate-VM delivers unmatched security and value, making it a vital component for organizations seeking to fortify their defenses against the evolving landscape of cyber threats. Its combination of advanced threat protection, AI-driven insights, and flexible deployment options positions it as a critical tool for maintaining a secure and resilient network environment.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 212

**User Satisfaction Scores:**

- **Security hardening:** 9.4/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 9.4/10 (Category avg: 8.6/10)
- **Compliance:** 9.4/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.7/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Company Website:** https://www.fortinet.com
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, IT Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 63% Mid-Market, 22% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (12 reviews)
- Features (10 reviews)
- Security (8 reviews)
- Protection (7 reviews)
- Control (6 reviews)

**Cons:**

- Difficult Learning Curve (4 reviews)
- Expensive (4 reviews)
- Update Issues (4 reviews)
- Upgrade Issues (4 reviews)
- Limited Features (3 reviews)

### 2. [Illumio](https://www.g2.com/products/illumio/reviews)
   Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications, and isolate high-value assets to stop breaches and ransomware from spreading.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 31

**User Satisfaction Scores:**

- **Security hardening:** 9.7/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 9.7/10 (Category avg: 8.6/10)
- **Compliance:** 9.0/10 (Category avg: 8.6/10)
- **Quality of Support:** 9.5/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Illumio](https://www.g2.com/sellers/illumio)
- **Company Website:** https://www.illumio.com/
- **Year Founded:** 2013
- **HQ Location:** Sunnyvale, California
- **Twitter:** @illumio (3,415 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/illumio/ (854 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 44% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Security (5 reviews)
- Centralized Management (3 reviews)
- Implementation Ease (3 reviews)
- Installation Ease (3 reviews)

**Cons:**

- Difficult Learning Curve (2 reviews)
- Integration Issues (2 reviews)
- Compatibility Issues (1 reviews)
- Difficult Learning (1 reviews)
- Expensive (1 reviews)

### 3. [Appgate SDP](https://www.g2.com/products/appgate-sdp/reviews)
  Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency. The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 36

**User Satisfaction Scores:**

- **Security hardening:** 8.5/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 7.1/10 (Category avg: 8.6/10)
- **Compliance:** 8.6/10 (Category avg: 8.6/10)
- **Quality of Support:** 9.2/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Appgate](https://www.g2.com/sellers/appgate)
- **Year Founded:** 2020
- **HQ Location:** Coral Gables, US
- **Twitter:** @AppgateSecurity (1,171 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/appgate-security (377 employees on LinkedIn®)
- **Ownership:** OTC: APGT

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 56% Enterprise, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Security (10 reviews)
- Customer Support (7 reviews)
- Ease of Use (6 reviews)
- Network Security (6 reviews)
- Reliability (6 reviews)

**Cons:**

- Performance Issues (6 reviews)
- Complex Setup (4 reviews)
- Connection Issues (2 reviews)
- Connectivity Issues (2 reviews)
- Difficult Configuration (2 reviews)

### 4. [ADC+](https://www.g2.com/products/adc/reviews)
  ADC+ is a comprehensive Application Delivery Controller (ADC) lifecycle automation platform designed to empower network and application teams with self-service capabilities for automating, orchestrating, and managing application delivery services. By streamlining these processes, ADC+ accelerates time-to-market and enhances the availability of services. Key Features and Functionality: - Centralized Management: Provides a unified interface for managing multi-vendor ADC environments across data centers, offering real-time visibility into application and ADC performance. - Automation and Orchestration: Facilitates the creation of automation workflows through a drag-and-drop visual builder, enabling zero-touch virtual server provisioning and efficient orchestration of ADC devices. - Role-Based Access Control (RBAC): Enables granular permissions, allowing application owners to self-service workflows while ensuring security and compliance. - App-Centric Visibility: Offers customizable dashboards and actionable reports, providing detailed insights into application health and performance. - Integration Capabilities: Supports integration with various IT Service Management (ITSM) systems and other network components, facilitating seamless automation of routine changes and processes. Primary Value and Solutions Provided: ADC+ addresses the complexities associated with managing diverse application landscapes by automating and orchestrating ADC infrastructures. It reduces the reliance on manual processes, minimizes errors, and enhances operational efficiency. By offering self-service capabilities and real-time insights, ADC+ empowers organizations to achieve higher application availability, faster deployment times, and improved security compliance.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 29

**User Satisfaction Scores:**

- **Security hardening:** 8.6/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.6/10 (Category avg: 8.6/10)
- **Compliance:** 8.8/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.8/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [AppViewX](https://www.g2.com/sellers/appviewx)
- **Year Founded:** 2008
- **HQ Location:** Plano, TX
- **Twitter:** @AppViewX (839 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2646853/ (559 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 50% Small-Business, 27% Mid-Market


### 5. [Juniper Security Director](https://www.g2.com/products/juniper-security-director/reviews)
  Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 11

**User Satisfaction Scores:**

- **Compliance:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Juniper Networks](https://www.g2.com/sellers/juniper-networks)
- **Year Founded:** 1996
- **HQ Location:** Sunnyvale, CA
- **LinkedIn® Page:** https://www.linkedin.com/company/2240/ (9,799 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 64% Enterprise, 45% Small-Business


### 6. [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews)
  The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with slow connections and complex management. Check Point SASE is a game-changing solution that delivers 10x faster internet security, SaaS Security, and full mesh Zero Trust Access and optimized SD-WAN performance—all with an emphasis on streamlined management. Combining innovative on-device and cloud-delivered network protections, Check Point SASE offers a local browsing experience with tighter security and privacy, and an identity-centric zero trust access policy that accommodates everyone: employees, BYOD and third parties. Its SD-WAN solution unifies industry-leading threat prevention with optimized connectivity, automated steering for over 10,000 applications and seamless link failover for uninterrupted web conferencing. Using Check Point SASE, business can build a secure corporate network over a private global backbone in less than an hour. The service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 210

**User Satisfaction Scores:**

- **Security hardening:** 8.3/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.3/10 (Category avg: 8.6/10)
- **Compliance:** 9.4/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 46% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Security (46 reviews)
- Ease of Use (39 reviews)
- Secure Access (34 reviews)
- Protection (26 reviews)
- Reliability (25 reviews)

**Cons:**

- Complex Implementation (28 reviews)
- Complex Configuration (24 reviews)
- Complex Setup (22 reviews)
- Expensive (17 reviews)
- Learning Curve (17 reviews)

### 7. [Bitdefender GravityZone Datacenter Security](https://www.g2.com/products/bitdefender-gravityzone-datacenter-security/reviews)
  Bitdefender GravityZone Datacenter Security is a comprehensive solution designed to protect modern data centers by integrating seamlessly with both on-premises and cloud environments. It offers advanced, next-generation security tailored for software-defined data centers, ensuring robust protection against evolving cyber threats while maintaining optimal performance and efficiency. Key Features and Functionality: - Reliable Protection: Utilizes tunable machine learning to adapt to evolving attack strategies, providing consistent and effective defense mechanisms. - Cost-Efficiency: Minimizes security impact on resources, maximizing virtualization density and application performance without compromising protection. - Easy Deployment: Facilitates fast deployment and easy integration, enabling rapid implementation and time-to-security. - Universal Compatibility: Supports all software-defined data center technologies, ensuring seamless integration across various platforms. - VMware Ready: Serves as a single point of security management for both on-premises and cloud-based virtual machines, enhancing administrative efficiency. - Agentless Security: Integrates with NSX-T Data Center to fortify agentless security against advanced threats, reducing the need for individual agents on each virtual machine. Primary Value and Problem Solved: GravityZone Datacenter Security addresses the critical need for agile, efficient, and flexible security solutions in today&#39;s hybrid software-defined data centers. By providing reliable protection through advanced machine learning, it adapts to evolving cyber threats, ensuring data integrity and system resilience. Its cost-efficient design minimizes resource consumption, allowing businesses to maximize their virtualization density and application performance. The solution&#39;s easy deployment and universal compatibility simplify the integration process across diverse environments, reducing administrative overhead. By offering agentless security and centralized management, it streamlines operations, enhances scalability, and ensures comprehensive protection across both on-premises and cloud workloads.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Security hardening:** 8.5/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.6/10 (Category avg: 8.6/10)
- **Compliance:** 7.9/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Bitdefender](https://www.g2.com/sellers/bitdefender)
- **Year Founded:** 2001
- **HQ Location:** Bucuresti, Romania
- **Twitter:** @Bitdefender (113,880 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6825/ (2,317 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 50% Small-Business, 25% Enterprise


### 8. [Symantec Data Center Security](https://www.g2.com/products/symantec-data-center-security/reviews)
  Symantec Data Center Security is a software that secures, hardens, and monitors the compliance posture of server systems for on-premise, public, and private cloud data centers.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Security hardening:** 8.8/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.0/10 (Category avg: 8.6/10)
- **Compliance:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.8/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Company Size:** 53% Small-Business, 29% Mid-Market


### 9. [IBM Vault (formerly HashiCorp Vault)](https://www.g2.com/products/ibm-vault-formerly-hashicorp-vault/reviews)
  IBM Vault (formerly HashiCorp Vault) tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault&#39;s main use cases include: - Secrets Management - Identity Brokering - Data Encryption


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 46

**User Satisfaction Scores:**

- **Security hardening:** 9.4/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 9.4/10 (Category avg: 8.6/10)
- **Compliance:** 7.9/10 (Category avg: 8.6/10)
- **Quality of Support:** 7.9/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [HashiCorp](https://www.g2.com/sellers/hashicorp)
- **Company Website:** https://www.hashicorp.com/
- **Year Founded:** 2012
- **HQ Location:** San Francisco, CA
- **Twitter:** @hashicorp (102,195 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2830763/ (2,193 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 40% Mid-Market, 36% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Integrations (1 reviews)
- Easy Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Expensive (1 reviews)

### 10. [Hitachi Content Intelligence](https://www.g2.com/products/hitachi-content-intelligence/reviews)
  Our intelligent data discovery and transformation platform provides data analytics and storage performance monitoring to improve workforce productivity and reveal actionable business insights.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 24

**User Satisfaction Scores:**

- **Security hardening:** 8.2/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 7.9/10 (Category avg: 8.6/10)
- **Compliance:** 8.1/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.5/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Hitachi Vantara](https://www.g2.com/sellers/hitachi-vantara)
- **HQ Location:** Santa Clara, CA
- **Twitter:** @HitachiVantara (28,434 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/hitachi-vantara/ (10,576 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 42% Small-Business, 42% Mid-Market


### 11. [Symantec Enterprise Cloud](https://www.g2.com/products/symantec-enterprise-cloud/reviews)
  Symantec Integrated Cyber Defense (ICD is a comprehensive cybersecurity platform designed to unify and streamline security across an organization&#39;s entire digital infrastructure. By integrating advanced threat protection, information security, identity management, and compliance solutions, ICD effectively safeguards enterprises against sophisticated cyber threats. This unified approach reduces the complexity and cost associated with managing multiple security products, while enhancing the organization&#39;s overall security posture. Key Features and Functionality: - Endpoint Security: Provides multi-layered protection across all endpoints—including desktops, servers, mobile devices, and cloud workloads—ensuring robust defense against emerging threats. - Network Security: Offers both cloud and on-premises solutions to secure network traffic, utilizing advanced proxy architecture to defend against complex threats and ensure secure use of web applications. - Identity Security: Enforces granular security policies to prevent unauthorized access, protecting user identities and their associated privileges from exploitation. - Information Security: Integrates data loss prevention, encryption, and analytics to protect sensitive information across various platforms, including endpoints, cloud services, and on-premises systems. - Cloud Security: Delivers advanced solutions to secure cloud access, infrastructure, and applications, providing visibility and threat protection across public and private cloud environments. - Threat Intelligence: Leverages a global intelligence network that analyzes vast amounts of security data, enabling proactive identification and blocking of advanced targeted attacks. Primary Value and Problem Solved: Symantec Integrated Cyber Defense addresses the challenge of managing disparate security solutions by providing a unified platform that integrates various security technologies. This integration reduces operational complexity and costs, while enhancing the effectiveness of threat detection and response. By offering comprehensive protection across endpoints, networks, applications, and cloud environments, ICD enables organizations to proactively mitigate evolving cyber threats and maintain a robust security posture.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Security hardening:** 8.9/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 9.6/10 (Category avg: 8.6/10)
- **Compliance:** 8.9/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 38% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (3 reviews)
- Integrations (3 reviews)
- Monitoring (3 reviews)
- Security (3 reviews)
- Centralized Management (2 reviews)

**Cons:**

- Complexity (2 reviews)
- Difficult Learning (2 reviews)
- Expensive (2 reviews)
- Complex Configuration (1 reviews)
- Complex Implementation (1 reviews)

### 12. [Trend Micro TippingPoint](https://www.g2.com/products/trend-micro-tippingpoint/reviews)
  Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight and prioritization, and real-time enforcement and remediation.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 25

**User Satisfaction Scores:**

- **Security hardening:** 8.8/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 7.4/10 (Category avg: 8.6/10)
- **Compliance:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 9.0/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 38% Small-Business, 31% Enterprise


### 13. [Trellix Database Security](https://www.g2.com/products/trellix-database-security/reviews)
  Maximum data security, minimal impact on hardware resources


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 33

**User Satisfaction Scores:**

- **Security hardening:** 8.1/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.3/10 (Category avg: 8.6/10)
- **Compliance:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.0/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Trellix](https://www.g2.com/sellers/trellix)
- **Year Founded:** 2004
- **HQ Location:** Milpitas, CA
- **Twitter:** @Trellix (241,709 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/44195/ (811 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 36% Small-Business, 33% Enterprise


### 14. [vSRX](https://www.g2.com/products/vsrx/reviews)
  The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features as the SRX appliance, including core firewall, robust networking, full next-gen capabilities, and automated life-cycle management. Handling speeds up to 100 Gbps, the vSRX is the industry&#39;s fastest virtual firewall.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Security hardening:** 9.2/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.9/10 (Category avg: 8.6/10)
- **Compliance:** 9.2/10 (Category avg: 8.6/10)
- **Quality of Support:** 7.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Juniper Networks](https://www.g2.com/sellers/juniper-networks)
- **Year Founded:** 1996
- **HQ Location:** Sunnyvale, CA
- **LinkedIn® Page:** https://www.linkedin.com/company/2240/ (9,799 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 71% Mid-Market, 14% Small-Business


### 15. [IBM Secure Virtualization](https://www.g2.com/products/ibm-secure-virtualization/reviews)
  IBM Cloud Secure Virtualization combines the power of IBM Cloud, VMware Cloud Foundation, HyTrust security software, and Intel TXT-enabled hardware to protect virtualized workloads down to the microchip level


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Security hardening:** 8.0/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.7/10 (Category avg: 8.6/10)
- **Compliance:** 8.7/10 (Category avg: 8.6/10)
- **Quality of Support:** 7.8/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,023 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)
- **Ownership:** SWX:IBM

**Reviewer Demographics:**
  - **Company Size:** 50% Small-Business, 30% Enterprise


### 16. [Agilio OVS Firewall](https://www.g2.com/products/agilio-ovs-firewall/reviews)
  The Agilio OVS Firewall Software is designed to enable zero-trust stateful security in data centers using OpenStack-based automation. Agilio OVS Firewall Software, combined with Agilio SmartNICs, enable zero-trust stateful security while significantly improving server-based networking performance. Agilio OVS Firewall Software restores valuable CPU cores by offloading OVS and connection tracking (Conntrack) to Netronome&#39;s SmartNICs.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 7

**User Satisfaction Scores:**

- **Security hardening:** 8.3/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.9/10 (Category avg: 8.6/10)
- **Compliance:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 7.7/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Netronome](https://www.g2.com/sellers/netronome)
- **Year Founded:** 2003
- **HQ Location:** Santa Clara, CA
- **Twitter:** @Netronome (2,871 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/39441 (57 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 86% Small-Business, 14% Mid-Market


### 17. [Fortra Secure Collaboration](https://www.g2.com/products/fortra-secure-collaboration/reviews)
  Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – external or internal – is always quick and secure, with the option to revoke access instantly at any time.​ A Key Part of Fortra (the new face of HelpSystems) Secure Collaboration is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of the powerful protection from Secure Collaboration and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Security hardening:** 8.3/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.3/10 (Category avg: 8.6/10)
- **Compliance:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 7.6/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Fortra](https://www.g2.com/sellers/fortra)
- **Year Founded:** 1982
- **HQ Location:** Eden Prairie, Minnesota
- **Twitter:** @fortraofficial (2,758 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/fortra (1,738 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 53% Small-Business, 27% Enterprise


### 18. [Centripetal CleanINTERNET ®](https://www.g2.com/products/centripetal-cleaninternet/reviews)
  CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alternative protection strategy at significantly lower cost. CleanINTERNET® presents an alternative approach to cybersecurity, putting threat intelligence at the forefront, moving from reactive to proactive defense, and helping security teams be more efficient and effective. Now available as a cloud-based solution, Centripetal&#39;s CleanINTERNET® service is a revolutionary approach to defending your cloud based enterprise assets from cyber threats by leveraging dynamic threat intelligence on a mass scale. CleanINTERNET® CLOUD is designed to protect cloud environments, providing unparalleled cyber defense and removing the need for more costly cybersecurity infrastructure.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Security hardening:** 9.2/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 9.2/10 (Category avg: 8.6/10)
- **Compliance:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 10.0/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Centripetal](https://www.g2.com/sellers/centripetal-9291e3f9-fc74-4f11-8f6c-18c15042e2b7)
- **Year Founded:** 2009
- **HQ Location:** Reston, US
- **Twitter:** @Centripetal_AI (467 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/centripetal-ai (118 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 80% Mid-Market, 20% Small-Business


### 19. [Real-Time Technology Solutions](https://www.g2.com/products/real-time-technology-solutions/reviews)
  Avi Networks enables public-cloud-like simplicity and flexibility for application services such as load balancing, application analytics, and security in any data center or cloud.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 9

**User Satisfaction Scores:**

- **Quality of Support:** 8.8/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Company Size:** 56% Enterprise, 33% Small-Business


### 20. [Verizon Software Defined Perimeter](https://www.g2.com/products/verizon-software-defined-perimeter/reviews)
  Software Defined Perimeter acts as your bouncer, allowing only approved users to access network resources. It authenticates identities and devices, letting you “hide” enterprise apps and resources from attackers.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Security hardening:** 8.3/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Verizon Enterprise](https://www.g2.com/sellers/verizon-enterprise)
- **Year Founded:** 1988
- **HQ Location:** Basking Ridge, NJ
- **Twitter:** @VerizonEnterpr (6 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1094/ (15,946 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 50% Small-Business


### 21. [Fidelis Halo](https://www.g2.com/products/fidelis-halo/reviews)
  CloudPassage is a security and compliance automation platform designed to provide instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 3

**User Satisfaction Scores:**

- **Quality of Support:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Fidelis Cybersecurity](https://www.g2.com/sellers/fidelis-cybersecurity)
- **Year Founded:** 2023
- **HQ Location:** Riverside, US
- **Twitter:** @FidelisCyber (2,223 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/fideliscybersecurity (163 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 67% Enterprise, 33% Small-Business


#### Pros & Cons

**Pros:**

- Detection Efficiency (2 reviews)
- Internet Security (2 reviews)
- Protection (2 reviews)
- Real-time Monitoring (2 reviews)
- Security (2 reviews)


### 22. [FirstWave Cloud](https://www.g2.com/products/firstwave-cloud/reviews)
  FirstWave Cloud is a fully virtualised solution allowing telcos to deliver advanced cloud security solutions.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Security hardening:** 8.3/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.3/10 (Category avg: 8.6/10)
- **Compliance:** 8.3/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [FirstwaveCloudTech](https://www.g2.com/sellers/firstwavecloudtech)
- **Year Founded:** 2001
- **HQ Location:** North Sydney, AU
- **LinkedIn® Page:** https://www.linkedin.com/company/firstwave-cloud-technology/ (50 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 50% Small-Business


### 23. [HyTrust Cloud Control](https://www.g2.com/products/hytrust-cloud-control/reviews)
  CloudControl helps you protect your virtual infrastructure with authentication, authorization and auditing. Better visibility and control simplify compliance and accelerate further virtualization


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **Security hardening:** 10.0/10 (Category avg: 8.7/10)
- **Intrusion Detection:** 8.3/10 (Category avg: 8.6/10)
- **Compliance:** 10.0/10 (Category avg: 8.6/10)
- **Quality of Support:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [HyTrust](https://www.g2.com/sellers/hytrust)
- **HQ Location:** Minneapolis, Minnesota, United States
- **Twitter:** @HyTrust (1,583 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/Entrust (3,812 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Mid-Market


### 24. [ColorTokens Xtended ZeroTrust Security Platform](https://www.g2.com/products/colortokens-xtended-zerotrust-security-platform/reviews)
  Secure your workloads, users and critical assets from zero-day and advanced persistent threats in minutes


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Quality of Support:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [ColorTokens Inc](https://www.g2.com/sellers/colortokens-inc)
- **Year Founded:** 2015
- **HQ Location:** San Jose, California, United States
- **Twitter:** @ColorTokensInc (429 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/colortokens/ (280 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 50% Small-Business


### 25. [DC Pulse](https://www.g2.com/products/dc-pulse/reviews)
  At DC Pulse, we are a passionate team of analysts, writers, and technology experts united by one goal: delivering trusted, data-driven insights into the ever-evolving world of data centers. Our research spans the entire ecosystem hardware, infrastructure, real estate, cooling, power, equipment, suppliers, projects, compliance, and regulations giving our audience a 360-degree view of the industry. We publish in-depth reports, expert articles, and detailed market analytics to empower decision-makers across the value chain with actionable intelligence on demand dynamics, supply shifts, and emerging trends. Grounded in credibility, our insights are sourced from government data, corporate disclosures, expert interviews, and direct industry engagement. Through our membership platform, individuals and organizations gain exclusive access to timely and authoritative research, helping them stay ahead in a rapidly transforming data center landscape. Follow us to stay informed, make smarter decisions, and lead with confidence in the digital infrastructure era.




**Seller Details:**

- **Seller:** [DC Pulse](https://www.g2.com/sellers/dc-pulse)
- **Year Founded:** 2017
- **HQ Location:** Pune, IN
- **LinkedIn® Page:** https://www.linkedin.com/company/dc-pulse (1 employees on LinkedIn®)





## Parent Category

[Data Security Software](https://www.g2.com/categories/data-security)





