Best Software for 2025 is now live!
|| products.size

Best Data Center Security Solutions

Lauren Worth
LW
Researched and written by Lauren Worth

Data center security tools are used to secure on-premise computing infrastructure located in data centers. These tools provide prevention, detection, and/or remediation tools for securing data center networks and server endpoints. They typically provide some level of firewall and security monitoring capabilities to stop threats and detect unauthorized access. Many data center security solutions come with various additional features for security-related tasks and compliance maintenance.

Companies use data center security solutions to ensure their networks and physical computing infrastructure remain secure and functional. Third-party infrastructure providers and companies with their own dedicated data centers will use these tools to ensure their offerings and services are delivered securely. Companies rely on this infrastructure to deploy applications, maintain websites, and host databases, and for hundreds of various additional computing purposes.

To qualify for inclusion in the Data Center Security category, a product must:

Facilitate the security of on-premise computing infrastructure
Provide a server firewall and malware prevention tools
Provide intrusion prevention and detection capabilities
Assist in security risk analysis and the enforcement of security standards

Best Data Center Security Solutions At A Glance

Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
29 Listings in Data Center Security Solutions Available
(175)4.7 out of 5
2nd Easiest To Use in Data Center Security Solutions software
View top Consulting Services for FortiGate NGFW
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

    Users
    • Network Engineer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate NGFW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Security
    12
    Features
    11
    Network Connectivity
    7
    Network Security
    7
    Cons
    Update Issues
    5
    Slow Performance
    4
    Complexity
    3
    Expertise Required
    3
    Pricing Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate NGFW features and usability ratings that predict user satisfaction
    9.3
    Security hardening
    Average: 8.7
    9.4
    Intrusion Detection
    Average: 8.6
    9.4
    Compliance
    Average: 8.6
    8.7
    Quality of Support
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for FortiGate NGFW, left between June 2021 and September 2022.
    • Reviewers like FortiGate NGFW’s security features including IPS, IDS, antivirus, and advanced cybersecurity protection.
    • Reviewers value FortiGate’s secure access to remote deployments.
    • Reviewers appreciate FortiGate’s management console for the network administrators, but it is hard to use for reporting and investigating the network.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,064 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Users
  • Network Engineer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Mid-Market
  • 20% Enterprise
FortiGate NGFW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Security
12
Features
11
Network Connectivity
7
Network Security
7
Cons
Update Issues
5
Slow Performance
4
Complexity
3
Expertise Required
3
Pricing Issues
3
FortiGate NGFW features and usability ratings that predict user satisfaction
9.3
Security hardening
Average: 8.7
9.4
Intrusion Detection
Average: 8.6
9.4
Compliance
Average: 8.6
8.7
Quality of Support
Average: 8.6
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for FortiGate NGFW, left between June 2021 and September 2022.
  • Reviewers like FortiGate NGFW’s security features including IPS, IDS, antivirus, and advanced cybersecurity protection.
  • Reviewers value FortiGate’s secure access to remote deployments.
  • Reviewers appreciate FortiGate’s management console for the network administrators, but it is hard to use for reporting and investigating the network.
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,064 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Our intelligent data discovery and transformation platform provides data analytics and storage performance monitoring to improve workforce productivity and reveal actionable business insights.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Mid-Market
    • 42% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hitachi Content Intelligence features and usability ratings that predict user satisfaction
    8.2
    Security hardening
    Average: 8.7
    7.9
    Intrusion Detection
    Average: 8.6
    8.1
    Compliance
    Average: 8.6
    8.5
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Santa Clara, CA
    Twitter
    @HitachiVantara
    29,085 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,523 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Our intelligent data discovery and transformation platform provides data analytics and storage performance monitoring to improve workforce productivity and reveal actionable business insights.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Mid-Market
  • 42% Small-Business
Hitachi Content Intelligence features and usability ratings that predict user satisfaction
8.2
Security hardening
Average: 8.7
7.9
Intrusion Detection
Average: 8.6
8.1
Compliance
Average: 8.6
8.5
Quality of Support
Average: 8.6
Seller Details
HQ Location
Santa Clara, CA
Twitter
@HitachiVantara
29,085 Twitter followers
LinkedIn® Page
www.linkedin.com
11,523 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FireEye cyber security products and solutions enable organizations to prevent, detect and respond to advanced malware and other cyber attacks targeting the data center that routinely bypass convention

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 28% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FireEye Data Center Security features and usability ratings that predict user satisfaction
    8.3
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    8.6
    Compliance
    Average: 8.6
    7.7
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    253,754 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    836 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FireEye cyber security products and solutions enable organizations to prevent, detect and respond to advanced malware and other cyber attacks targeting the data center that routinely bypass convention

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 28% Small-Business
FireEye Data Center Security features and usability ratings that predict user satisfaction
8.3
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
8.6
Compliance
Average: 8.6
7.7
Quality of Support
Average: 8.6
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
253,754 Twitter followers
LinkedIn® Page
www.linkedin.com
836 employees on LinkedIn®
(15)4.5 out of 5
3rd Easiest To Use in Data Center Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitdefender GravityZone Datacenter Security features and usability ratings that predict user satisfaction
    8.5
    Security hardening
    Average: 8.7
    8.8
    Intrusion Detection
    Average: 8.6
    7.9
    Compliance
    Average: 8.6
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Bucuresti, Romania
    Twitter
    @Bitdefender
    113,859 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,227 employees on LinkedIn®
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Small-Business
  • 27% Mid-Market
Bitdefender GravityZone Datacenter Security features and usability ratings that predict user satisfaction
8.5
Security hardening
Average: 8.7
8.8
Intrusion Detection
Average: 8.6
7.9
Compliance
Average: 8.6
8.3
Quality of Support
Average: 8.6
Seller Details
Year Founded
2001
HQ Location
Bucuresti, Romania
Twitter
@Bitdefender
113,859 Twitter followers
LinkedIn® Page
www.linkedin.com
2,227 employees on LinkedIn®
(26)4.3 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppViewX ADC+ provides role-based management, automation, and orchestration of multi-vendor ADC environments that serve applications across data centers.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Small-Business
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ADC+ features and usability ratings that predict user satisfaction
    8.5
    Security hardening
    Average: 8.7
    8.5
    Intrusion Detection
    Average: 8.6
    8.6
    Compliance
    Average: 8.6
    8.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AppViewX
    Year Founded
    2008
    HQ Location
    Plano, TX
    Twitter
    @AppViewX
    835 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    528 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppViewX ADC+ provides role-based management, automation, and orchestration of multi-vendor ADC environments that serve applications across data centers.

Users
No information available
Industries
No information available
Market Segment
  • 54% Small-Business
  • 23% Enterprise
ADC+ features and usability ratings that predict user satisfaction
8.5
Security hardening
Average: 8.7
8.5
Intrusion Detection
Average: 8.6
8.6
Compliance
Average: 8.6
8.8
Quality of Support
Average: 8.6
Seller Details
Seller
AppViewX
Year Founded
2008
HQ Location
Plano, TX
Twitter
@AppViewX
835 Twitter followers
LinkedIn® Page
www.linkedin.com
528 employees on LinkedIn®
(26)4.8 out of 5
1st Easiest To Use in Data Center Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 62% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appgate SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Security
    7
    Performance Efficiency
    6
    Speed
    6
    User Interface
    5
    Cons
    Performance Issues
    7
    Connection Issues
    6
    Connectivity Issues
    6
    Poor Interface Design
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate SDP features and usability ratings that predict user satisfaction
    8.8
    Security hardening
    Average: 8.7
    7.8
    Intrusion Detection
    Average: 8.6
    8.5
    Compliance
    Average: 8.6
    9.1
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    386 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 62% Enterprise
  • 27% Mid-Market
Appgate SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Security
7
Performance Efficiency
6
Speed
6
User Interface
5
Cons
Performance Issues
7
Connection Issues
6
Connectivity Issues
6
Poor Interface Design
2
Access Issues
1
Appgate SDP features and usability ratings that predict user satisfaction
8.8
Security hardening
Average: 8.7
7.8
Intrusion Detection
Average: 8.6
8.5
Compliance
Average: 8.6
9.1
Quality of Support
Average: 8.6
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
880 Twitter followers
LinkedIn® Page
www.linkedin.com
386 employees on LinkedIn®
Ownership
OTC: APGT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Data Center Security is a software that secures, hardens, and monitors the compliance posture of server systems for on-premise, public, and private cloud data centers.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Data Center Security features and usability ratings that predict user satisfaction
    8.8
    Security hardening
    Average: 8.7
    8.0
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    8.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,257 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Data Center Security is a software that secures, hardens, and monitors the compliance posture of server systems for on-premise, public, and private cloud data centers.

Users
No information available
Industries
No information available
Market Segment
  • 53% Small-Business
  • 29% Mid-Market
Symantec Data Center Security features and usability ratings that predict user satisfaction
8.8
Security hardening
Average: 8.7
8.0
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
8.8
Quality of Support
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,257 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maximum data security, minimal impact on hardware resources

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 36% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • McAfee Data Center Security Suite for Databases Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Data Security
    4
    Affordable
    2
    Ease of Use
    2
    Features
    2
    Cons
    Expensive
    2
    Limitations
    2
    Performance Issues
    2
    Access Management
    1
    Data Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • McAfee Data Center Security Suite for Databases features and usability ratings that predict user satisfaction
    8.1
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    8.0
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    McAfee
    Year Founded
    1987
    HQ Location
    San Jose, US
    Twitter
    @McAfee_Home
    43,188 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,536 employees on LinkedIn®
    Ownership
    NASDAQ: MCFE
Product Description
How are these determined?Information
This description is provided by the seller.

Maximum data security, minimal impact on hardware resources

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 36% Small-Business
  • 33% Enterprise
McAfee Data Center Security Suite for Databases Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Data Security
4
Affordable
2
Ease of Use
2
Features
2
Cons
Expensive
2
Limitations
2
Performance Issues
2
Access Management
1
Data Management
1
McAfee Data Center Security Suite for Databases features and usability ratings that predict user satisfaction
8.1
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
8.0
Quality of Support
Average: 8.6
Seller Details
Seller
McAfee
Year Founded
1987
HQ Location
San Jose, US
Twitter
@McAfee_Home
43,188 Twitter followers
LinkedIn® Page
www.linkedin.com
5,536 employees on LinkedIn®
Ownership
NASDAQ: MCFE
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Integrated Cyber Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Ease of Use
    4
    Alert Notifications
    3
    Cybersecurity Protection
    3
    Features
    3
    Cons
    Slow Performance
    4
    Complexity
    3
    Performance Issues
    3
    Delays
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
    8.9
    Security hardening
    Average: 8.7
    9.6
    Intrusion Detection
    Average: 8.6
    8.9
    Compliance
    Average: 8.6
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,257 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Symantec Integrated Cyber Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Ease of Use
4
Alert Notifications
3
Cybersecurity Protection
3
Features
3
Cons
Slow Performance
4
Complexity
3
Performance Issues
3
Delays
2
Difficult Learning
2
Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
8.9
Security hardening
Average: 8.7
9.6
Intrusion Detection
Average: 8.6
8.9
Compliance
Average: 8.6
8.3
Quality of Support
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,257 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Small-Business
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Customer Support
    4
    Ease of Use
    4
    Easy Integrations
    3
    Features
    2
    Cons
    Expensive
    4
    Lacking Features
    2
    Required Expertise
    2
    Access Issues
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
    8.3
    Security hardening
    Average: 8.7
    8.3
    Intrusion Detection
    Average: 8.6
    9.4
    Compliance
    Average: 8.6
    8.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Small-Business
  • 28% Mid-Market
Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Customer Support
4
Ease of Use
4
Easy Integrations
3
Features
2
Cons
Expensive
4
Lacking Features
2
Required Expertise
2
Access Issues
1
Complex Setup
1
Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
8.3
Security hardening
Average: 8.7
8.3
Intrusion Detection
Average: 8.6
9.4
Compliance
Average: 8.6
8.3
Quality of Support
Average: 8.6
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,144 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro TippingPoint features and usability ratings that predict user satisfaction
    8.8
    Security hardening
    Average: 8.7
    7.4
    Intrusion Detection
    Average: 8.6
    8.3
    Compliance
    Average: 8.6
    9.0
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Mid-Market
Trend Micro TippingPoint features and usability ratings that predict user satisfaction
8.8
Security hardening
Average: 8.7
7.4
Intrusion Detection
Average: 8.6
8.3
Compliance
Average: 8.6
9.0
Quality of Support
Average: 8.6
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,698 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 45% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Juniper Security Director features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Compliance
    Average: 8.6
    8.9
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    106,288 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 45% Small-Business
Juniper Security Director features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Compliance
Average: 8.6
8.9
Quality of Support
Average: 8.6
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
106,288 Twitter followers
LinkedIn® Page
www.linkedin.com
12,217 employees on LinkedIn®
(45)4.3 out of 5
4th Easiest To Use in Data Center Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HashiCorp Vault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Easy Integrations
    4
    Integrations
    4
    Security
    4
    Useful
    2
    Cons
    Learning Curve
    3
    Process Complexity
    2
    Steep Learning Curve
    2
    Complexity Issues
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    9.4
    Security hardening
    Average: 8.7
    9.4
    Intrusion Detection
    Average: 8.6
    7.9
    Compliance
    Average: 8.6
    7.8
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    97,547 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,465 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 33% Enterprise
HashiCorp Vault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Easy Integrations
4
Integrations
4
Security
4
Useful
2
Cons
Learning Curve
3
Process Complexity
2
Steep Learning Curve
2
Complexity Issues
1
Complex Setup
1
HashiCorp Vault features and usability ratings that predict user satisfaction
9.4
Security hardening
Average: 8.7
9.4
Intrusion Detection
Average: 8.6
7.9
Compliance
Average: 8.6
7.8
Quality of Support
Average: 8.6
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
97,547 Twitter followers
LinkedIn® Page
www.linkedin.com
2,465 employees on LinkedIn®
Ownership
NASDAQ: HCP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Application Centric Infrastructure (ACI) simplifies, optimizes, and accelerates the application deployment lifecycle in next-generation data centers and clouds.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Application Centric Infrastructure (ACI) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Efficiency
    3
    Automation
    2
    Automation Efficiency
    2
    Centralized Management
    2
    Configuration Ease
    2
    Cons
    Complexity
    2
    Complex Setup
    2
    Configuration Difficulty
    2
    Expensive
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Application Centric Infrastructure (ACI) features and usability ratings that predict user satisfaction
    8.1
    Security hardening
    Average: 8.7
    8.6
    Intrusion Detection
    Average: 8.6
    8.6
    Compliance
    Average: 8.6
    8.1
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Application Centric Infrastructure (ACI) simplifies, optimizes, and accelerates the application deployment lifecycle in next-generation data centers and clouds.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 29% Enterprise
Cisco Application Centric Infrastructure (ACI) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Efficiency
3
Automation
2
Automation Efficiency
2
Centralized Management
2
Configuration Ease
2
Cons
Complexity
2
Complex Setup
2
Configuration Difficulty
2
Expensive
2
Learning Curve
2
Cisco Application Centric Infrastructure (ACI) features and usability ratings that predict user satisfaction
8.1
Security hardening
Average: 8.7
8.6
Intrusion Detection
Average: 8.6
8.6
Compliance
Average: 8.6
8.1
Quality of Support
Average: 8.6
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,873 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 14% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • vSRX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Ease of Management
    1
    Features
    1
    Firewall Efficiency
    1
    Protection
    1
    Cons
    Difficult Learning Curve
    1
    Time Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • vSRX features and usability ratings that predict user satisfaction
    9.2
    Security hardening
    Average: 8.7
    8.9
    Intrusion Detection
    Average: 8.6
    9.2
    Compliance
    Average: 8.6
    7.3
    Quality of Support
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    106,288 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 14% Enterprise
vSRX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Ease of Management
1
Features
1
Firewall Efficiency
1
Protection
1
Cons
Difficult Learning Curve
1
Time Consumption
1
vSRX features and usability ratings that predict user satisfaction
9.2
Security hardening
Average: 8.7
8.9
Intrusion Detection
Average: 8.6
9.2
Compliance
Average: 8.6
7.3
Quality of Support
Average: 8.6
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
106,288 Twitter followers
LinkedIn® Page
www.linkedin.com
12,217 employees on LinkedIn®