
Overview

Product video
The Akamai Guardicore Security Platform provides the five critical capabilities needed to secure workloads in modern data centers and clouds: flow visualization, micro-segmentation, breach detection, automated analysis and response.
Highlights
- Flow Visibility and Micro-Segmentation: Visualize all applications and workloads and quickly define, monitor and enforce process-level, application-aware micro-segmentation policies
- Cloud Migrations (quickly migrate workloads with full visibility and security)
- Detect lateral movement
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months | Cost savings % |
|---|---|---|---|
200 Instance Bundle | Price per bundle of 200 protected workloads | $99,000.00 | 0% |
200 workloads visibility | Price per Bundle 200 workloads visibility | $44,000.00 | 0% |
200 workloads enforcement | price per bundle of 200 workloads of enforcement | $88,000.00 | 90% |
100 legacy workload enforcement | price per bundle of 100 workloads of enforcement for legacy systems | $88,000.00 | 0% |
1000 Endpoint Enforcement | price per bundle of 1000 endpoints enforcement | $44,000.00 | 0% |
50 kubernetes protection | price per bundle 50 Kubernetes protection | $85,000.00 | 0% |
200 workloads hunt | price per bundle of 200 hunt workloads | $30,000.00 | 0% |
1000 Enpoints Hunt | price per bundle of 1000 hunt endpoints | $24,000.00 | 0% |
Vendor refund policy
Please refer to the seller's website for any refund policy.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Micro-segmentation has strengthened zero trust security and improved process-level visibility
What is our primary use case?
We were using Akamai Guardicore Segmentation for micro-segmentation with Zero Trust. It's a process-level segmentation that functions just like a firewall.
How has it helped my organization?
It has significantly lowered our overall security risk and made our security much better. We don't need to buy additional solutions for it.
What is most valuable?
Akamai Guardicore Segmentation is very intuitive. If you're used to firewalls, you're also used to this product because it has the same look and feel.
Automation is a nice feature that not many customers are using. Companies can set up automation so that if they see something that's not good, it can be automatically remediated. That's a feature that many customers would like.
The visibility feature is actually where this technology is much better than firewalls. With firewalls you make policy, but you don't know why you're making the policy because you need to ask somebody about what kind of policy they need. With Akamai Guardicore Segmentation, you can actually see what's going on and you can make your policy without asking any application owner what to make. You're actually accepting a policy instead of building a policy.
What needs improvement?
What we hear most from customers is that it requires a kernel module. Many customers do not like kernel modules because the PCs will blue screen if there's a bug in the software. That's the biggest disadvantage. Some competitors are not using kernel modules.
For how long have I used the solution?
We have been using it for four years.
What do I think about the stability of the solution?
Akamai Guardicore Segmentation is stable. There could be some minor bugs, but there haven't been any major issues for the last four or five years.
What do I think about the scalability of the solution?
It's scalable. There are customers that have 250,000 endpoints and PCs.
How are customer service and support?
The support cases I've had were good.
Which solution did I use previously and why did I switch?
I'm no longer working with previous solutions.
How was the initial setup?
It's pretty easy to install.
What about the implementation team?
We are not a partner, so we're more of a customer.
What was our ROI?
Akamai Guardicore Segmentation is very flexible. You don't need to change anything in the network because it's not a network thing. That's the nicest thing.
What's my experience with pricing, setup cost, and licensing?
The setup cost is reasonable.
Which other solutions did I evaluate?
What other advice do I have?
I work with the segmentation aspect of Akamai Guardicore Segmentation. Akamai Guardicore Segmentation has much better visibility and has a more firewall style look and feel in how you use the product. I would rate this review an 8 overall.
Micro-segmentation has strengthened Kubernetes visibility and protected dynamic pod communications
What is our primary use case?
By doing instrumentation in Kubernetes, which I have done already, even in OpenShift for on-premise environments and also on Azure , we are able to see all the pods that go up and down and all the communication that they establish inside the pod and outside the Kubernetes environment.
What is most valuable?
In general, I would say that the best features that Akamai Guardicore Segmentation offers include visibility and the ability to have Layer 7 visibility, which means that we are not only looking for source IPs and ports and target source target IPs and ports, but we are also looking for services. We are able to see even the service that we can create rules for, allowing from server A one specific service to communicate with server B, but if some other service tries to do that communication, it will be blocked, making that a great feature of Guardicore segmentation. There is also the deception model they have, which is the Honeypot model. Once we have one rule that is blocked for some specific ports, we can intercept an insider threat that tries to do RDP to one server that should not happen. With the deception model, that communication is blocked, and the insider is sent to a Honeypot server where they think they have established that communication and may try to add some script there. Guardicore adds logs and creates an incident, so we can see what that communication has done and how someone tried to compromise the environment.
After implementing Akamai Guardicore Segmentation, I can say that for most customers with whom we implement Guardicore, we see once we do micro-segmentation for an application that the connection—possible connections that can be established on that application—usually drops by 80%. If we map out the proper communications that one application should have and create rules to apply the proper blocking, we see one application that could have a hundred thousand different types of communications, and after micro-segmentation, it can have only twenty thousand, thereby significantly increasing the security posture.
In day-to-day operations, we usually don't have any impact, which is the idea of Guardicore. Once we have the rules in place, we only allow the communication that is supposed to happen. This is why we increase the security posture, but we don't impact applications usability and anything else. For day-to-day operation and risk management, as I have mentioned, we typically reduce the communications that we can have with a specific application, so if a customer's environment is compromised, usually we can guarantee that with Guardicore segmentation, if we have the proper rules in place, other applications will not be compromised, and the communication will stay only inside that specific application.
What needs improvement?
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
Which solution did I use previously and why did I switch?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
My advice for others looking into using Akamai Guardicore Segmentation is to think about labeling. You should have labels for your entire environment regarding applications, which means having a good CMDB . You don't need to have a full CMDB , but you should at least build one with information about servers and which applications those servers are members of and what roles they play in the applications, so with that, you will be able to extract the best from the solution. I would rate this product an 8 out of 10.
Micro-segmentation has strengthened enterprise security planning and supports complex networks
What is our primary use case?
I usually recommend Akamai Guardicore Segmentation for larger companies, as we started to work with Guardicore before the acquisition and then moved to distribute Akamai . Akamai Guardicore Segmentation is not a simple solution for the Italian market because we are suffering from nanism; the majority of our companies have under 1,000 employees. Akamai Guardicore Segmentation is enterprise software, but they are pretty good in that area.
It is more suitable for bigger companies. The reasons are not solely about pricing; it is also about the knowledge of the security manager in companies across Italy. For example, a small company with 500 employees might have a limited budget for cybersecurity and typically does not consider micro-segmentation as a primary solution. They may manage cybersecurity issues effectively with their existing LAN setup until they grow larger and face more complexity, which is why micro-segmentation becomes necessary. However, in Italy, it is not as well-known as in other markets due to the customer base.
What is most valuable?
I usually recommend Akamai Guardicore Segmentation for larger companies, as we started to work with Guardicore before the acquisition and then moved to distribute Akamai . Akamai Guardicore Segmentation is not a simple solution for the Italian market because we are suffering from nanism; the majority of our companies have under 1,000 employees. Akamai Guardicore Segmentation is enterprise software, but they are pretty good in that area.
Regarding their interface, I cannot answer on technical issues or aspects because I am the sales manager, and here we show the characteristics of the software, but we do not make any demonstration of the product because we are a distributor.
What needs improvement?
To become more competitive, I believe they have to work on technology knowledge and address the brand awareness issues for my market. In more consolidated markets such as the US or UK, where companies have several factories and thousands of employees, they could focus more on marketing the brand and the technologies.
For how long have I used the solution?
I have been dealing with Akamai for three years overall.
How are customer service and support?
No one has asked for more, so I find the technical support in my region is pretty good.
How was the initial setup?
At the moment, I have no issues with documentation, integration with third-party solutions, or the initial setup; everything is pretty good, although you can always do more.
What's my experience with pricing, setup cost, and licensing?
Concerning their pricing, it is not cheap, but it is reasonable with respect to the kind of market you have to face.
Which other solutions did I evaluate?
I think it is hard to say if it is the best option on the market at the moment because I do not know a lot of alternatives in that area. They appear to be the kind of solution that stands out; even though Guardicore is not as famous as CyberArk, they are pretty known for what they do.
Micro-segmentation has improved network visibility and actively reduces lateral attack movement
What is our primary use case?
My main use case for Akamai Guardicore Segmentation is for big micro-segmentation at my company. A specific example of how I use micro-segmentation with Akamai Guardicore Segmentation in my company is the segmentation of big broadcast domains, where with this I could segregate the front end, the back end, backup networks, and out-of-band networks for administration. I have many cases with jumper services also, so many cases that we could mention working with Akamai Guardicore Segmentation.
What is most valuable?
More than twenty ring-fences implemented with Akamai Guardicore Segmentation have produced significant results with a three-hundred-sixty-degree vision of all the network traffic including the biggest system that we hold today.
The best feature Akamai Guardicore Segmentation offers is great threat intelligence. Threat intelligence stands out to me as a best feature of Akamai Guardicore Segmentation because you are ready, for example, for ransomware attacks and lateral movements. I am very happy with the solution.
In addition to threat intelligence, I have other ring-fences also. The way that Akamai Guardicore Segmentation holds the segmentation in the simplest way, giving the best visibility, is really the best thing for me.
Akamai Guardicore Segmentation has positively impacted my organization by improving security because it increased the perimeters and the breaks in small perimeters and also giving me visibility over three hundred sixty degrees over the network.
Since implementing Akamai Guardicore Segmentation, I have seen specific outcomes such as reducing incidents because only the tight traffic is really allowed, so you reduce the possibilities of issues and also increase the security.
What needs improvement?
Akamai Guardicore Segmentation can be improved through the follow-up with the customer experience of the Guardicore team, and they gave me a lot of insights to improve the configuration. I say that we have everyday fine-tunings to increase the power of the tool. I am very happy with this.
For how long have I used the solution?
I have been using Akamai Guardicore Segmentation for three years and a half.
What do I think about the stability of the solution?
Akamai Guardicore Segmentation is very stable.
What do I think about the scalability of the solution?
Akamai Guardicore Segmentation is very scalable because I could deploy anywhere without any hardware needs, for example.
How are customer service and support?
The customer support for Akamai Guardicore Segmentation is amazing. They are very close and help me all the time.
Which solution did I use previously and why did I switch?
Akamai Guardicore Segmentation is my first solution.
What was our ROI?
I have seen a return on investment as it requires fewer employees needed.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Akamai Guardicore Segmentation is great. It has a fair cost for our business.
Which other solutions did I evaluate?
I did not evaluate other options.
What other advice do I have?
My advice for others looking into using Akamai Guardicore Segmentation is that it gives visibility, security, and really does the right segmentation of your broadcast domains, improving not only security but visibility that you really need for your business. Akamai Guardicore Segmentation is the tool that makes me sleeping well every day, and I would rate it a ten on a scale of one to ten.
Zero-trust micro-segmentation has strengthened security and improves east-west traffic visibility
What is our primary use case?
Our main use case for Akamai Guardicore Segmentation is to implement micro-segmentation and Zero Trust security across hybrid environments, including both on-premises and cloud workloads. We primarily use it to gain visibility into east-west traffic to control the communication between application and servers, which helps in reducing the risk of lateral movement in case of security breach. Additionally, we use it for application dependency mapping to understand how workloads interact, creating granular segmentation policies based on application, environment, and role, improving compliance posture, especially for banking and financial customers. Overall, it helps us to move from traditional perimeter-based security to more workload-level security approach.
How has it helped my organization?
Akamai Guardicore Segmentation has had a very significant positive impact on our organization, especially in terms of security posture, operational efficiency, and compliance. From a security perspective, it has helped us to greatly reduce lateral movement risk by enforcing strict micro-segmentation policies. Even if a system is compromised, the attack surface is limited, which strengthens our overall zero-trust approach.
In terms of efficiency, the visibility and visualization feature have reduced the time required for troubleshooting and policy validation. Our team can quickly identify communication issues and resolve them faster compared to traditional methods.
From a compliance standpoint, especially for banking customers, it has helped us to meet regulatory requirements more effectively by ensuring the proper segmentation between critical workloads and sensitive data environments. Overall, it has improved our control, visibility, and response time, making our security operations more proactive rather than reactive.
What is most valuable?
One of the best features of Akamai Guardicore Segmentation is its real-time visibility and visualization capabilities. It provides a detailed map of all east-west traffic, which is very helpful for both security and troubleshooting. Another key feature is application dependency mapping, which visually shows the communication flows between servers. This helps in understanding the complex environments and designing accurate segmentation policies.
The granular micro-segmentation capability is also very powerful. We can create a policy based on labels such as application, environment, or role, allowing only required communication and blocking everything else, which significantly reduces the lateral movement risk.
Additionally, the agent-based deployment is lightweight and works well across hybrid environments, including on-premises and cloud, making it flexible and easy to scale. Overall, the combination of visibility, visualization, and fine-grained control makes it a very effective micro-segmentation solution.
What needs improvement?
While Akamai Guardicore Segmentation is a very powerful solution, there are a few areas where it could be improved. One of the main challenges is the initial deployment and policy design complexity. In large environments, understanding all application dependencies and creating the right policies can take time and requires close coordination with application teams.
The user interface and policy management can also be improved. As the number of policies grows, managing and organizing them becomes slightly complex. A more simplified or intuitive policy structure would help operational teams.
Another area is integration with other security tools such as SIEM or SOAR platforms. While integration is possible, making it more seamless and easier to configure would add value. Additionally, the reporting and dashboard could be enhanced to provide more customizable and business-level insights, especially for management and reporting.
One small improvement I would suggest for Akamai Guardicore Segmentation is having more automation capabilities for policy creation and recommendation. For example, AI-driven suggestions based on observed traffic patterns would help reduce manual effort during the initial policy design. It would also help to have more predefined templates for common use cases, especially for industries such as banking, to speed up deployment. Another area is enhanced reporting customization where we can easily generate business-level dashboards for management and compliance teams without any additional effort.
For how long have I used the solution?
I have been working with Akamai Guardicore Segmentation for around one to two years as part of my role managing security.
How are customer service and support?
The customer service rating I would give is a four out of ten.
What other advice do I have?
In one of our banking customer environments, we used Akamai Guardicore Segmentation to segment the critical application tiers such as web, application, and database servers. Initially, we enabled visibility mode to understand the east-west traffic and identify all communication flows between workloads. During this phase, we discovered several unnecessary open communications, especially between application and database layers. Based on this, we created granular segmentation policies to allow only required ports and protocols and blocked all other unnecessary traffic. For example, only specific application servers were allowed to communicate with the database servers on required ports while all other lateral movement paths were restricted.
One additional point I would highlight is that with Akamai Guardicore Segmentation, we do not just use it for static segmentation, but also for continuous monitoring and policy optimization. Even after the initial deployment, we regularly review the traffic patterns and update the policies based on application changes. This is very important in dynamic environments such as banking, where new service integrations are frequently introduced. Another key aspect is that we use it as a part of a broader zero-trust strategy, integrating it with other security solutions such as WAF and secure web gateways to create a layered defense approach. Also, from an operational perspective, it has helped us to reduce the dependency on traditional network-based segmentation, making security more application-aware and flexible, especially in hybrid and cloud environments.
The visualization feature in Akamai Guardicore Segmentation has been extremely helpful for our daily operations, especially in troubleshooting and policy design. From a troubleshooting perspective, it gives us a clear, real-time view of communication flows between workloads. Instead of checking logs manually, we can quickly identify where traffic is being allowed or blocked. This significantly reduces the time required to identify issues. For policy design, the visualization helps us to understand the application dependencies before enforcing any rules. This ensures we do not accidentally block legitimate traffic, which is very critical in banking environments. It also helps in identifying unnecessary or suspicious communication paths, validating policies after implementation, and collaborating with application teams, since the visual maps are easy to understand even for non-security teams. Overall, it makes both troubleshooting faster and policy creation more accurate, reducing the operational effort and minimizing the business impact.
Based on our experience with Akamai Guardicore Segmentation, we have seen a noticeable improvement in both troubleshooting and policy validation timelines. Earlier, troubleshooting east-west communication issues used to take around two to four hours since we had to rely on manual log analysis and multiple tools. With Guardicore visualization, we can now identify the issue within twenty to thirty-five minutes, which is roughly around sixty-five percent to eighty-five percent reduction in troubleshooting time. For policy validation, it previously took several hours to a full day, especially when coordinating with application teams. Now with the clear dependency mapping and real-time visibility, we are able to validate policies within thirty-five to sixty-five minutes, improving efficiency by around fifty-five percent to seventy-five percent. Additionally, incident response time improved by fifty-five percent, policy deployment errors reduced significantly due to better visibility, and faster onboarding of newer applications since dependencies are clearly mapped. Overall, these improvements have helped our team become more efficient, proactive, and accurate in operations.
My main advice for anyone considering Akamai Guardicore Segmentation is to start with the visibility mode before enforcing any policies. Understanding application dependencies and traffic flow is very important to avoid unintended disruptions. Also, involve application and infrastructure teams early in the process since accurate segmentation depends on knowing how applications communicate. I recommend taking a phased approach by starting with monitoring and mapping, identifying the required versus unnecessary traffic, and gradually enforcing the policies. Additionally, keep policies simple and structured initially and refine them over time as you gain more visibility. Overall, if implemented properly, it is a very effective solution for achieving zero-trust and reducing lateral movement risks.
Akamai Guardicore Segmentation is a very effective solution for organizations looking to strengthen their zero-trust security model, especially in complex hybrid environments. What stands out the most is its ability to provide deep visibility and control over east-west traffic, which is something traditional security solutions often lack. While there are areas for improvement such as policy management simplicity and automation, the core capabilities are very strong and deliver real value in terms of security, operational efficiency, and compliance. From my experience, when implemented with the right approach, it can significantly enhance an organization’s overall security posture and reduce lateral movement risk. I would rate this product an eight out of ten.