We just raised a $30M Series A: Read our story

Top 8 Cloud and Data Center Security Tools

Trend Micro Deep SecurityCheck Point CloudGuard Network SecurityVMware NSXGuardicore CentraCisco Secure WorkloadIllumio Adaptive Security PlatformSymantec Data Center SecurityShieldX
  1. leader badge
    Deep Security's most valuable features are antivirus and host intrusion detection. Deep Security is a good product for managing a few servers.
  2. leader badge
    Check Point is one of the few solutions that pay attention to cloud security. Many others mostly focus on providing on-premises solutions.It's possible to sync the Check Point Management with the cloud portal, therefore allowing automated rules to be set in place whenever creating a new VM.
  3. Find out what your peers are saying about Trend Micro, Check Point, VMware and others in Cloud and Data Center Security. Updated: November 2021.
    552,305 professionals have used our research since 2012.
  4. leader badge
    It's a beneficial tool.NSX's stand-out function is the distributed firewall. The firewall system is just top-notch, and I haven't seen another solution like it.
  5. The most valuable feature is the visibility of processes and connections.From day one, you get threat intelligence. It will immediately block active threats, which has been useful.
  6. The most valuable feature is micro-segmentation, which is the most important with respect to visibility.The most valuable feature of this solution is security.
  7. The flexibility of the solution is its most valuable feature.It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation.
  8. report
    Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
    552,305 professionals have used our research since 2012.
  9. The console and tools are very user-friendly.Good file integrity monitoring features.
  10. The UI was also one of the huge selling points. My web development manager was blown away with the detail and the granularity that you can get out of the UI. It is a very strong and informative UI, with the amount of data it provides.

Cloud and Data Center Security Articles

Tjeerd Saijoen
CEO at Rufusforyou
Jun 23 2021
Security and protecting your environment are the biggest challenges now. Is this because we don't have software to protect our environment or is it anything else? In the past, I started with mainframes and no worries about hackers.  Today, we are dealing with a silo approach. Servers are at… (more)

Security and protecting your environment are the biggest challenges now. Is this because we don't have software to protect our environment or is it anything else?

How I stop hackers and protect my IT environment - Part 1

In the past, I started with mainframes and no worries about hackers. 

Today, we are dealing with a silo approach. Servers are at various locations, ICT staff is working in a silo environment and we are dealing with applications in separate locations: cloud environments, multiple clouds, and a hybrid one.

For ICT staff it's difficult to keep an eye on this complex environment and did we close everything. Next, we have vendors changing browsers at a rapid speed as well OS vendors. A lot of times we must apply fix packs as an emergency solution to close a security gap.

If you have a lot of servers and desktops in various locations and do not have the right tools it will be difficult to detect if you have a security breach somewhere in the environment.

How do we start?

Most of the time, security is closing security holes in our environment. But how do we know?

First, the architecture of your environment. You need to look holistically through the complete environment. For example, the IT architecture. Do you know how a transaction flows over your network, from an end-user over routers, switches, firewalls, load balancers, servers, databases, webservers, etc.?

Now you know why a CMDB ( Configuration Management Database) and IT landscape discovery tools are important. All our IT assets will be placed in a CMDB: the last access date, the change date, and who has changed or created the asset. This way we can monitor unauthorized access.

Next, we need to learn how applications communicate, about open ports, public IPs, etc. 

This is part 1 and I will continue next week.

(less)
Find out what your peers are saying about Trend Micro, Check Point, VMware and others in Cloud and Data Center Security. Updated: November 2021.
552,305 professionals have used our research since 2012.