We performed a comparison between Akamai Guardicore Segmentation and AttackIQ based on real PeerSpot user reviews.
Find out what your peers are saying about Pentera, Cymulate, Picus Security and others in Breach and Attack Simulation (BAS)."The real bonus is the fact that we can secure applications, all the way down to the individual services, on each host. It's actually more granular security than we can get out of a traditional firewall."
"Guardicore Centra offers the best coverage specifically in backward compatibility with legacy operating systems."
"The solution is very scalable, especially when connected to the cloud resources."
"Initially, I liked the telemetry part. But later, we used the microsegmentation features that we were able to deploy and found that they really stood out from other vendors. It allows us to see microsegmentation as distributed services."
"The tool is a complete package that offers many features like visibility. You can get a graph with real-time workflows and visibility into server-to-server communication. We get visibility into many things happening within our environment."
"That is primarily because I've seen increased rules. It's kind of caught us a little off guard. With GuardiCore, I have had to deal with their technical support and engineering team in Israel. They are amazing. They are very quick to adapt."
"Its deception features are great, providing a rich telemetry of lured origins, and are a great resource for any active defense strategy."
"Application Ring-Fencing and Deception Server, which is basically like a honeypot, are pretty useful features."
"Overall, I've had a good experience with the product. It's worked well for me."
"In our version, when using the terminal server, we cannot exclude user tasks for each session."
"It would be very helpful for beginners if the solution had more windows to help with the terms inside instead of going to the documentation."
"Incident tagging could be improved. Other vendors offer semi-automatic tagging, which Guardicore doesn't yet have."
"The long-term management of the security policies could be improved with some kind of automation platform, something like Chef or Puppet or Ansible, to help you manage the policies after day-one... to then manage the policies and changes to those policies, going forward, through some type of automation process is not turning out to be really easy."
"Guardicore Centra should incorporate automation so that we don't require to write custom scripts and APIs. The tool also has limitations on rules where it allows only sixty thousand rules. Our clients have also commented that there are too many manual clicks and effort to do changes. I think that the incorporation of automation can help our clients make changes with confidence and without the possibility of human error."
"The maps could go a bit faster. They are useful but slightly slow."
"Sometimes, the speed needs improvement, especially when it comes to the generation of maps, where it can be a bit slow."
"The product needs a few features like enhanced user policies and payload-level inspection to improve the offering."
"The initial setup was quite difficult and took a long time."
More Akamai Guardicore Segmentation Pricing and Cost Advice →
Earn 20 points
Akamai Guardicore Segmentation is ranked 4th in Breach and Attack Simulation (BAS) with 17 reviews while AttackIQ is ranked 7th in Breach and Attack Simulation (BAS). Akamai Guardicore Segmentation is rated 8.2, while AttackIQ is rated 7.0. The top reviewer of Akamai Guardicore Segmentation writes "Allowed us to build out a data center topology without worrying about placement of physical or virtual firewalls that can create bottlenecks". On the other hand, the top reviewer of AttackIQ writes "Overall, a good user experience and works well but is hard to set up". Akamai Guardicore Segmentation is most compared with Illumio, VMware NSX, Cisco Secure Workload, CrowdStrike Falcon Cloud Security and Prisma Cloud by Palo Alto Networks, whereas AttackIQ is most compared with Pentera, Picus Security, Cymulate, SafeBreach and XM Cyber.
See our list of best Breach and Attack Simulation (BAS) vendors.
We monitor all Breach and Attack Simulation (BAS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.