Introducing G2.ai, the future of software buying.Try now
Darktrace / NETWORK
Sponsored
Darktrace / NETWORK
Visit Website
Product Avatar Image
5nine Cloud Security

By Acronis

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at 5nine Cloud Security and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with 5nine Cloud Security?

Darktrace / NETWORK
Sponsored
Darktrace / NETWORK
Visit Website
It's been two months since this profile received a new review
Leave a Review

5nine Cloud Security Reviews & Product Details

Product Avatar Image

Have you used 5nine Cloud Security before?

Answer a few questions to help the 5nine Cloud Security community

5nine Cloud Security Reviews (2)

Reviews

5nine Cloud Security Reviews (2)

4.5
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Muhammad Irfan  MS I.
MI
Lead Consultant – Enterprise Technology Risk & Cyber Security (Deputy Director)
Enterprise (> 1000 emp.)
"Wonderful experience of using excellent products"
What do you like best about 5nine Cloud Security?

This OEM one of the best available globally and is also one of my favourites across the industry due to its repute and optimal performance. There are many pros of having thier products in your shelf however, the best thing about it is that its products are very stable, hassle-free, and are user-friendly. These factors are essential for an enterprise-class organization and contribute to sucessful Information Technology and Business Operations.

Secondly, The technical support is available for bug fixes and regular security updates which is very good especially keeping in view the rapidly growing cyber security threats because it provides me comfort of using products are associated services withoud any worry.

Further, the documentations are easily availble in the knowledge base and are very compresenhive which help us significantly in developing understanding as well as doing many things our self without OEM support. I found this to be an excellent things that OEM not only provides you the required support and documentation but also enables you to develop skillset in house.

These features makes OEM one of the best across the globe and enhaces trust of its cutomers for doing future investments to cover business needs. Review collected by and hosted on G2.com.

What do you dislike about 5nine Cloud Security?

There is nothing specific that I may dislike about it as I am very comfortable with it; however, there is always room available for improvement, and OEM may utilize the customer experience and feedback.

As far as my experience is concerned, sometimes support of different regions causes time issues, but that's bearable for me and can be managed alternatively. However, it may not be acceptable for some customers globally, so that OEM may see possible improvements in this area in the future. Review collected by and hosted on G2.com.

Verified User in Computer Software
AC
Small-Business (50 or fewer emp.)
"5Nine: Security for Hybrid Cloud"
What do you like best about 5nine Cloud Security?

1. Agentless antivirus scan

2.Supports RBAC access control

3. Virtual Firewall

4. Audit logs available Review collected by and hosted on G2.com.

What do you dislike about 5nine Cloud Security?

1. Limited platform support available

2. Cost is a bit too high as compared to competitors Review collected by and hosted on G2.com.

There are not enough reviews of 5nine Cloud Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(187)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
2
Palo Alto Networks Next-Generation Firewalls Logo
Palo Alto Networks Next-Generation Firewalls
4.5
(157)
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
3
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(119)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
4
LevelBlue USM Anywhere Logo
LevelBlue USM Anywhere
4.4
(114)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
5
Cloud-Delivered Security Services Logo
Cloud-Delivered Security Services
4.4
(106)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
6
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Logo
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
4.2
(92)
The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security that is both agile and integrated- leading to the strongest security posture available today and tomorrow. From your data center, branch offices, cloud environments, and everywhere in between, you can leverage the power of Cisco to turn your existing network infrastructure into an extension of your firewall solution, resulting in world class security controls everywhere you need them. Investing in a Secure Firewall appliance today gives you robust protections against even the most sophisticated threats without compromising performance when inspecting encrypted traffic. Further, integrations with other Cisco and 3rd party solutions provides you with a broad and deep portfolio of security products, all working together to correlate previously disconnected events, eliminate noise, and stop threats faster.
7
Palo Alto Networks VM-Series Virtual Firewall Logo
Palo Alto Networks VM-Series Virtual Firewall
4.3
(91)
Palo Alto Networks VM-Series Virtual Firewall is a cloud security software that allows businesses to prevent data loss and threats with this virtualized firewall for private and public cloud environments. VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Cisco, Citrix, KVM, OpenStack, Amazon Web Services, Microsoft and Google.
8
CrowdSec Logo
CrowdSec
4.7
(87)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countries across 6 continents, the solution builds a real-time IP reputation database that keeps growing every day and benefits all community members who have each other's backs while forming a global defense shield.
9
Check Point Quantum Intrusion Prevention System (IPS) Logo
Check Point Quantum Intrusion Prevention System (IPS)
4.4
(69)
Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers complete and proactive intrusion prevention, all with the deployment and management advantages of a unified and extensible Next Generation Firewall solution.
10
ExtraHop Logo
ExtraHop
4.6
(68)
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
5nine Cloud Security
View Alternatives