Listing Thumbnail

    Akamai Guardicore Segmentation

     Info
    Sold by: BYNET 
    Deployed on AWS
    Akamai Guardicore Segmentation provides the simplest, fastest, and most intuitive way to enforce Zero Trust principles within your network. It is designed to stop lateral movement by visualizing activity within your IT environments, implementing precise microsegmentation policies, and detecting possible breaches quickly.
    4.2

    Overview

    Licensing is based on a subscription model and is paid annually upfront. Pricing of the protected assets per agent will decrease with the increase in agent quantity. Licensing is based on the # of protected assets (VMs, Bare Metal Servers, VDI, Desktop, containers Nodes, etc.) Licensing for management - Required for on-prem/non-SaaS installations only.

    Licensing for SaaS management - FOC (recommended offering) There is a different license for Serves vs. desktop/laptop/vdi, as well as K8 nodes and Legacy OS. There are services that are based on the number of agents/assets as well.
    Contact Seller for Assets Types options:

    • Disaster Recovery Management - 12,500$
    • Workload Visibility & Enforcement (Qty 200) - 78,000$
    • Workload Visibility (Qty 200) - 39,000$
    • Legacy Workload Visibility & Enforcement (Qty 100) - 78,000$
    • Endpoint/VDI Visibility & Enforcement (Qty 1000) - 39,000$
    • Container Kubernetes Host (Qty 50) - 75,000$

    Highlights

    • -Granular, AI-powered segmentation Implement policies in a few clicks using AI recommendations, templates for remediating ransomware and other common use cases, and precise workload attributes like processes, users, and domain names -Real-time and historical visibility Map application dependencies and flows down to the user and process levels on a real-time or historical basis
    • -Broad platform support Cover modern and legacy operating systems across bare-metal servers, virtual machines, containers, IoT, and cloud instances -Flexible asset labeling Add rich context with a customizable labeling hierarchy for visibility and enforcement, and integration with orchestration tools and configuration management databases for automated labeling -Multiple protection methods Integrate CSI, defense, and threat-hunting capabilities to reduce incident response time
    • Contact Seller for Offer

    Details

    Sold by

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu ubuntu-jammy-22.04

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Akamai Guardicore Segmentation

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (2)

     Info
    Dimension
    Cost/hour
    m5.2xlarge
    Recommended
    $10.00
    t3.large
    $1.00

    Vendor refund policy

    no refund

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Support

    Vendor support

    Support is provided during working hours Sun to Thu between 08:00-17:30. We recommend you open a call in our support portal at: https://serviceportal.www.bynet.co.il/login , or call 1-700-50-8001

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.2
    10 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    50%
    40%
    10%
    0%
    0%
    2 AWS reviews
    |
    8 external reviews
    External reviews are from PeerSpot .
    SachinShelar

    Micro-segmentation has strengthened zero trust security and reduces lateral movement risks

    Reviewed on Mar 26, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My main use case for Akamai Guardicore Segmentation  is for micro-segmentation and east-west traffic control across data center and cloud workloads, which helps ensure zero trust policies, isolate critical applications, and prevent lateral movement, improving security posture in multi-customer environments.

    For example, using Akamai Guardicore Segmentation , we segmented a three-tier application by allowing only required ports between tiers and blocking all other east-west traffic, which prevented lateral movement from compromised web servers to databases, significantly reducing attack surface and improving security compliance.

    How has it helped my organization?

    Akamai Guardicore Segmentation has significantly improved our security posture by preventing lateral movement through effective micro-segmentation, and it also enhanced operational efficiency with better visibility and faster policy deployment, reducing risk and improving compliance across customer environments.

    With Akamai Guardicore Segmentation, we have observed a 60 to 70 percent reduction in lateral movement risk due to strict micro-segmentation policies, along with 40 to 50 percent faster incident containment and troubleshooting, improved compliance visibility, and fewer security exceptions.

    What is most valuable?

    Some of the best features of Akamai Guardicore Segmentation are its granular micro-segmentation and deep visibility, allowing control to process, service level, and full east-west traffic mapping, while it also stands out for AI-assisted policy creation, real-time threat detection, and software-based enforcement.

    The feature I rely on most in Akamai Guardicore Segmentation is application dependency mapping and visibility, which gives real-time insight into east-west traffic flows, helping us design accurate policies quickly and troubleshoot issues without impacting production environments.

    Additionally, Akamai Guardicore Segmentation offers a policy simulation test mode, which is very useful to validate rules before enforcement and avoid outages.

    What needs improvement?

    Akamai Guardicore Segmentation could improve in policy management at scale, as large environments can become complex to manage and tune, and enhanced cloud-native integrations and more intuitive reporting would help improve visibility and simplify operations for service delivery teams.

    It can be improved with integration with SIEM  or SOAR  tools, and more granular role-based access control would enhance operational efficiency and governance.

    For how long have I used the solution?

    I have been using Akamai Guardicore Segmentation for three and a half years.

    What do I think about the stability of the solution?

    Akamai Guardicore Segmentation is stable.

    What do I think about the scalability of the solution?

    Akamai Guardicore Segmentation is highly scalable, designed to support large distributed environments across data, cloud, and hybrid setups.

    How are customer service and support?

    The customer support is good, but the documentation is not up to the mark.

    I would rate the customer support a nine on a scale of 1 to 10.

    Which solution did I use previously and why did I switch?

    I previously used traditional network firewalls and VLAN-based segmentations before switching.

    We switched to Akamai Guardicore Segmentation for granular micro-segmentations, better east-west visibility, and zero-trust enforcement, which were not achievable with legacy network-based approaches.

    How was the initial setup?

    Overall, it is expensive but high value, especially for large-scale, security-critical environments, with pricing on the premium side, a moderate setup cost, and a subscription-based licensing per agent.

    What was our ROI?

    We have seen a strong ROI both in cost savings and operational efficiency, having reduced 70 percent in incident handling effort and a 30 to 40 percent reduction in security resources, which delivers measurable value through reduced risk, lower operational cost, and faster breach containment.

    Which other solutions did I evaluate?

    Before choosing Akamai Guardicore Segmentation, I evaluated other options.

    We evaluated VMware NSX  and Cisco Secure Workload ; while those offered segmentation capabilities, Akamai Guardicore Segmentation stood out for its deep visibility, process-level control, and easier deployment without changing the network.

    What other advice do I have?

    For Akamai Guardicore Segmentation, I would suggest fellow buyers to start with application dependency mapping first to clearly understand traffic flows before enforcing policies, and to implement it in a phase-wise manner, such as monitor, simulate, and enforce. I would rate this product a nine on a scale of 1 to 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Irton Medina

    Microsegmentation has protected critical environments and now blocks lateral ransomware movement

    Reviewed on Mar 03, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I use Akamai Guardicore Segmentation  to block lateral movement of malicious software like ransomware. This is very important to protect my business and my corporation.

    I create labels for any assets to create rule sets in Guardicore Center with the configuration.

    The logs and network logs provide visibility that is very important for my business and my corporate entity. We use microsegmentation by environment. I do segmentation for production, homologation, and development. It is very important.

    Today, I have segmentation for Kubernetes  in Guardicore, but I have problems with Guardicore with segmentation for Kubernetes  because it is connected to SaaS. This is very important because we have projects starting in Kubernetes in my enterprise.

    Akamai Guardicore Segmentation  is deployed in my organization on a hybrid cloud because 99% is on a private cloud computer.

    What is most valuable?

    The best features of Akamai Guardicore Segmentation are maps and network logs. I think the analysis of logs and hits in Akamai Guardicore Segmentation is fantastic.

    The impact of Akamai Guardicore Segmentation is very important because it reduced risk for my corporation and organization. It is very important.

    Akamai Guardicore Segmentation reduced risk because it blocked malicious ransomware and uninspected traffic. I appreciate this. It is very good.

    Akamai Guardicore Segmentation reduces risk, and the configuration is very easy, among other things.

    What needs improvement?

    I think the pricing is very high. It is a big cost. The price of Akamai Guardicore Segmentation is very expensive, but it is important to the enterprise. I think it is more or less.

    For how long have I used the solution?

    I have been using Akamai Guardicore Segmentation for approximately five years.

    What do I think about the stability of the solution?

    Akamai Guardicore Segmentation is very stable.

    What do I think about the scalability of the solution?

    It is very scalable.

    How are customer service and support?

    I like the Akamai  support very much. The response is very fast. The attention is very good.

    Which solution did I use previously and why did I switch?

    I did not evaluate other options. I am happy with Akamai Guardicore Segmentation.

    What about the implementation team?

    We have a relationship with this vendor. We are a partner and an experienced user.

    What was our ROI?

    The investment is necessary for enterprises to reduce risk, protect the enterprise, and have visibility of the network.

    Which other solutions did I evaluate?

    I have used other solutions, but with Akamai , I have WAF , I have proxy, and I have IP security.

    What other advice do I have?

    I gave this product a review rating of 10.

    reviewer2790663

    Network visibility has transformed segmentation in our kubernetes environments and improves security

    Reviewed on Dec 23, 2025
    Review from a verified AWS customer

    What is our primary use case?

    Our main use case for Akamai Guardicore Segmentation  is the implementation in Kubernetes  AWS .

    How has it helped my organization?

    Akamai Guardicore Segmentation  has positively impacted our organization. We implemented Akamai Guardicore Segmentation and shared all our directory with the team, who are very happy about the security environment we implemented.

    What is most valuable?

    Akamai Guardicore Segmentation offers us large visibility in all our environments and helps us to understand network segmentation and traffic.

    The visibility from Akamai Guardicore Segmentation has helped our team by addressing the challenge of a shadow network in traffic across all environments, providing us with more insight into this network traffic.

    In my experience with Akamai Guardicore Segmentation, the best feature is visibility. The segmentation is excellent, but the visibility of all network traffic is extremely helpful.

    The segmentation feature of Akamai Guardicore Segmentation is very easy to set up across all environments. The Akamai  team supports all our questions, and the tool is very easy to use, making it extremely helpful.

    Regarding the features of Akamai Guardicore Segmentation, the integration with Active Directory is excellent and very positive.

    One specific outcome from using Akamai Guardicore Segmentation is that we noticed addressing network threats, which are a very significant problem in any company. This feature, along with visibility, has brought us more peace of mind.

    What needs improvement?

    I believe Akamai Guardicore Segmentation could be improved with a feature to filter, and I believe implementing MFA would be very useful and helpful to us.

    For how long have I used the solution?

    I have been using Akamai Guardicore Segmentation for more than three years, and I had the opportunity to get certified. I liked the tool so much that I had the opportunity to earn the GCSA and GCSE certifications.

    What other advice do I have?

    My advice for others looking into using Akamai Guardicore Segmentation is that visibility is crucial. If you are not seeing your network clearly, your job is challenging. Visibility is the main word in Akamai Guardicore Segmentation. Our company has a business relationship with Akamai  as we are a partner or reseller. I rate this product a ten out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Ken Bauer

    Segmentation of legacy systems has protected outdated endpoints and reduces network risk

    Reviewed on Dec 11, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Akamai Guardicore Segmentation  is segmenting legacy operating systems.

    I use Akamai Guardicore Segmentation  to segment legacy operating systems because they do not support our EDR tools due to their age, and I chose Akamai  Guardicore because its agents support very old systems that need to be segmented from the rest of the network.

    We are mainly using it for legacy systems.

    What is most valuable?

    The best features Akamai Guardicore Segmentation offers make it simple to see all of the connections that are being made to each of the endpoints, and they can be controlled by process and port.

    The ability to control by process and port helps my team day-to-day because, since there are hundreds of thousands of connections to some of these endpoints, looking at the Reveal  Map makes it simple to audit and create rules for what we want to allow.

    Akamai Guardicore Segmentation has impacted my organization positively because we find it difficult to remove the legacy systems, so it was very important to segment them from the rest of the network to protect them and protect the rest of our network.

    What needs improvement?

    Akamai Guardicore Segmentation can be improved because keeping it up to date is difficult since it is SaaS-based and updates are not on a regular schedule; I have to reach out to my contact to ask them to update to a newer version, and it would be helpful if updates were on a regular cadence so that I would not have to remember to ask them.

    I think it is really valuable to take a course on Akamai Guardicore Segmentation because many things are not obvious in terms of how to do them correctly.

    For how long have I used the solution?

    I have been using Akamai Guardicore Segmentation for one year.

    What do I think about the stability of the solution?

    Akamai Guardicore Segmentation is stable and very reliable.

    What do I think about the scalability of the solution?

    The scalability of Akamai Guardicore Segmentation is very good. It scales very well, and I can keep adding agents and scale as much as needed.

    How are customer service and support?

    I have not had to reach out to customer support for Akamai Guardicore Segmentation.

    What was our ROI?

    I have not seen a return on investment in terms of specific metrics like time saved or reduced risk, but I can say that reduced risk is significant.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing is that overall everything worked out really well. The pricing was flexible, and it has worked out well with our budget.

    Which other solutions did I evaluate?

    Before choosing Akamai Guardicore Segmentation, I evaluated other options, but I cannot recall them off the top of my head.

    What other advice do I have?

    Since I started using Akamai Guardicore Segmentation, we have not had any situations that demonstrate specific results or metrics such as fewer incidents or improved compliance.

    My advice to others looking into using Akamai Guardicore Segmentation is to work with professional services during setup because it is not intuitive at the beginning and to take the administrator course to understand the Reveal  Maps, as the Reveal Maps are the most useful way to control the segmentation.

    I give this product a rating of 8.

    reviewer1536771

    Provides clear visibility of communications between assets without needing additional sensors or firewalls but the support could be better

    Reviewed on Aug 27, 2024
    Review provided by PeerSpot

    What is our primary use case?

    We want segmentation for a data center, and we have the problem that we cannot change IP addresses within the data center. So we need a solution. With the Guardicore solution, we can keep the IP addresses.

    Additionally, we get agent-based segmentation, and we don’t have to change anything on the network. These are the main reasons why we chose Guardicore for micro-segmentation.

    How has it helped my organization?

    The enforcement points under the agent, the firewalling has been most beneficial for your customers’ cybersecurity needs specifically. We do not need any further security features like IDS, IPS, or whatever. For us, it’s only the firewall feature, and that’s part of the enforcement point of the Guardicore agent. So that was completely enough for us.

    What is most valuable?

    I like the visibility of the communication, so that we really see which communications the assets have to the other assets. We don’t need a further sensor or firewall to see the traffic to these devices. That’s the main reason.

    And Guardicore makes its own rule set automatically, so we can work fast when creating a rule set. We don’t have a long phase of monitoring or whatever, so we can go straight to rules where we drop unwanted data traffic.

    We don’t do micro-segmentation for each asset. We work with the ring-fencing function, and we have really good visibility on the dashboard with the rings. We can see which asset is in which segment, zone, or ring. That’s the main thing, that we can see this really easily.

    We can also give this view not only to the administrator of the Guardicore components but also to the application owner, so they can see where their application is placed in the ring-fencing and what communication is there. This makes incident management easier because we get incidents in a more authenticated way from the application owner. That’s also a big benefit from the visibility of the Guardicore solution.

    In the firewall, only the administrator has a deep look into the architecture, the logs, and the segmentation. In the Guardicore solution, we can give more visibility to the application owner on their own application. This makes it easier to manage incidents and the overall management of the application and network. The application owner has a view of the actions happening on the network with their assets or applications.

    What needs improvement?

    When we have more than one interface, we can only have one policy for both interfaces. Normally, you have assets with a production interface and a server interface that are only for management.

    But in the Guardicore architecture, you cannot give the production interface its own rule set and the management interface another rule set. You have to combine these rule sets into one. It’s a lack because security standards suggest a different way to secure management interfaces.

    So, I would like to have two separate rule sets for the basis of the device.

    For how long have I used the solution?

    We started planning last year, and we are now in the implementation phase. So, since April this year, we have been working directly with Guardicore and the Guardicore management systems.

    We [my company] work with the latest version.

    What do I think about the stability of the solution?

    I would rate the stability a six out of ten, where one is low and ten is high stability.

    The difficulty is when you start with such a project, it’s not only with Guardicore, it’s with all other micro-segmentation windows. You have to change your mindset from a network-centric to a label-centric approach, which is not based on the network. That’s the difficulty for the people, the customer, and the administrator.

    There should be more support to change the mindset of the customer. They are all used to the old way to do segmentation. With other micro-segmentation tools, it’s a new technology, and it’s not about thinking in IP segments and IP networks anymore. You have to think in labels and ring fencing. That’s what makes it difficult to start with such a technology. It’s not the vendor, it’s the technology.

    What do I think about the scalability of the solution?

    I would rate the scalability an eight out of ten. It is good for our use case. So, scalability is at a satisfactory level.

    I make projects with my customers. I do not have any view about my other colleagues and what they have in their projects with Vendor. Myself, it was the third customer where we have placed the Guardicore product.

    My customers are enterprise businesses.

    How are customer service and support?

    The response time should be better. Sometimes it’s good, but sometimes it could be better. You have a problem, you need an answer, and then you have to wait. Sometimes they do not talk with an administrator who knows anything about Guardicore. When my colleagues call support, I think my colleagues are experts. And then the support starts with really easy questions. That’s not funny.

    So, I want them to be more skilled, like, more educated on the matter.

    How was the initial setup?

    I would rate my experience with the initial setup a seven out of ten, where one is difficult and ten is easy to set up.

    The technical setup was easy. It becomes more challenging when you start labeling the assets and doing the ring-fencing. You have to go deep into the architecture of the network, the application, and whatever. That’s more difficult, but in the end, it’s easier than doing classic segmentation with a firewall.

    The data architecture took one week, but the segmentation logic took months. We are not finished. We started in April, and we are not finished. So, like almost half a year.

    We start to define the ring for the ring fences, and then we start with a part of the network with the test environment. We test and then go. The last will be the production. We label the assets, then start a monitoring period to see the data traffic between the assets. Then we go into an alerting phase and finally to a block period.

    What's my experience with pricing, setup cost, and licensing?

    I would rate the pricing a six out of ten, where one is cheap and ten is expensive. I know other micro-segmentation tools like Cisco or Illumio, and so I think they are in the middle.

    What other advice do I have?

    Overall, I would rate the product a seven out of ten. We use Akamai because they have their own enforcement point. This was important for us.

    Other micro-segmentation tools use the desktop firewall of Windows or the Linux iptables firewall, but Guardicore has its own enforcement point and its own agent. This was a key factor. When you start with the implementation, you have to have a clear picture about your labeling. I think it’s really important. You have to know what you want to separate from each other. You could go into very deep detail, but the more detail you have, the more complex it becomes. You have to find a balance between detail and complexity. You need the middle way.

    View all reviews