My main use case for Akamai Guardicore Segmentation is for big micro-segmentation at my company. A specific example of how I use micro-segmentation with Akamai Guardicore Segmentation in my company is the segmentation of big broadcast domains, where with this I could segregate the front end, the back end, backup networks, and out-of-band networks for administration. I have many cases with jumper services also, so many cases that we could mention working with Akamai Guardicore Segmentation.
Akamai [Private Offer Only]
Carahsoft Technology Corp.External reviews
External reviews are not included in the AWS star rating for the product.
Micro-segmentation has improved network visibility and actively reduces lateral attack movement
What is our primary use case?
What is most valuable?
More than twenty ring-fences implemented with Akamai Guardicore Segmentation have produced significant results with a three-hundred-sixty-degree vision of all the network traffic including the biggest system that we hold today.
The best feature Akamai Guardicore Segmentation offers is great threat intelligence. Threat intelligence stands out to me as a best feature of Akamai Guardicore Segmentation because you are ready, for example, for ransomware attacks and lateral movements. I am very happy with the solution.
In addition to threat intelligence, I have other ring-fences also. The way that Akamai Guardicore Segmentation holds the segmentation in the simplest way, giving the best visibility, is really the best thing for me.
Akamai Guardicore Segmentation has positively impacted my organization by improving security because it increased the perimeters and the breaks in small perimeters and also giving me visibility over three hundred sixty degrees over the network.
Since implementing Akamai Guardicore Segmentation, I have seen specific outcomes such as reducing incidents because only the tight traffic is really allowed, so you reduce the possibilities of issues and also increase the security.
What needs improvement?
Akamai Guardicore Segmentation can be improved through the follow-up with the customer experience of the Guardicore team, and they gave me a lot of insights to improve the configuration. I say that we have everyday fine-tunings to increase the power of the tool. I am very happy with this.
For how long have I used the solution?
I have been using Akamai Guardicore Segmentation for three years and a half.
What do I think about the stability of the solution?
Akamai Guardicore Segmentation is very stable.
What do I think about the scalability of the solution?
Akamai Guardicore Segmentation is very scalable because I could deploy anywhere without any hardware needs, for example.
How are customer service and support?
The customer support for Akamai Guardicore Segmentation is amazing. They are very close and help me all the time.
Which solution did I use previously and why did I switch?
Akamai Guardicore Segmentation is my first solution.
What was our ROI?
I have seen a return on investment as it requires fewer employees needed.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Akamai Guardicore Segmentation is great. It has a fair cost for our business.
Which other solutions did I evaluate?
I did not evaluate other options.
What other advice do I have?
My advice for others looking into using Akamai Guardicore Segmentation is that it gives visibility, security, and really does the right segmentation of your broadcast domains, improving not only security but visibility that you really need for your business. Akamai Guardicore Segmentation is the tool that makes me sleeping well every day, and I would rate it a ten on a scale of one to ten.
Zero-trust micro-segmentation has strengthened security and improves east-west traffic visibility
What is our primary use case?
Our main use case for Akamai Guardicore Segmentation is to implement micro-segmentation and Zero Trust security across hybrid environments, including both on-premises and cloud workloads. We primarily use it to gain visibility into east-west traffic to control the communication between application and servers, which helps in reducing the risk of lateral movement in case of security breach. Additionally, we use it for application dependency mapping to understand how workloads interact, creating granular segmentation policies based on application, environment, and role, improving compliance posture, especially for banking and financial customers. Overall, it helps us to move from traditional perimeter-based security to more workload-level security approach.
How has it helped my organization?
Akamai Guardicore Segmentation has had a very significant positive impact on our organization, especially in terms of security posture, operational efficiency, and compliance. From a security perspective, it has helped us to greatly reduce lateral movement risk by enforcing strict micro-segmentation policies. Even if a system is compromised, the attack surface is limited, which strengthens our overall zero-trust approach.
In terms of efficiency, the visibility and visualization feature have reduced the time required for troubleshooting and policy validation. Our team can quickly identify communication issues and resolve them faster compared to traditional methods.
From a compliance standpoint, especially for banking customers, it has helped us to meet regulatory requirements more effectively by ensuring the proper segmentation between critical workloads and sensitive data environments. Overall, it has improved our control, visibility, and response time, making our security operations more proactive rather than reactive.
What is most valuable?
One of the best features of Akamai Guardicore Segmentation is its real-time visibility and visualization capabilities. It provides a detailed map of all east-west traffic, which is very helpful for both security and troubleshooting. Another key feature is application dependency mapping, which visually shows the communication flows between servers. This helps in understanding the complex environments and designing accurate segmentation policies.
The granular micro-segmentation capability is also very powerful. We can create a policy based on labels such as application, environment, or role, allowing only required communication and blocking everything else, which significantly reduces the lateral movement risk.
Additionally, the agent-based deployment is lightweight and works well across hybrid environments, including on-premises and cloud, making it flexible and easy to scale. Overall, the combination of visibility, visualization, and fine-grained control makes it a very effective micro-segmentation solution.
What needs improvement?
While Akamai Guardicore Segmentation is a very powerful solution, there are a few areas where it could be improved. One of the main challenges is the initial deployment and policy design complexity. In large environments, understanding all application dependencies and creating the right policies can take time and requires close coordination with application teams.
The user interface and policy management can also be improved. As the number of policies grows, managing and organizing them becomes slightly complex. A more simplified or intuitive policy structure would help operational teams.
Another area is integration with other security tools such as SIEM or SOAR platforms. While integration is possible, making it more seamless and easier to configure would add value. Additionally, the reporting and dashboard could be enhanced to provide more customizable and business-level insights, especially for management and reporting.
One small improvement I would suggest for Akamai Guardicore Segmentation is having more automation capabilities for policy creation and recommendation. For example, AI-driven suggestions based on observed traffic patterns would help reduce manual effort during the initial policy design. It would also help to have more predefined templates for common use cases, especially for industries such as banking, to speed up deployment. Another area is enhanced reporting customization where we can easily generate business-level dashboards for management and compliance teams without any additional effort.
For how long have I used the solution?
I have been working with Akamai Guardicore Segmentation for around one to two years as part of my role managing security.
How are customer service and support?
The customer service rating I would give is a four out of ten.
What other advice do I have?
In one of our banking customer environments, we used Akamai Guardicore Segmentation to segment the critical application tiers such as web, application, and database servers. Initially, we enabled visibility mode to understand the east-west traffic and identify all communication flows between workloads. During this phase, we discovered several unnecessary open communications, especially between application and database layers. Based on this, we created granular segmentation policies to allow only required ports and protocols and blocked all other unnecessary traffic. For example, only specific application servers were allowed to communicate with the database servers on required ports while all other lateral movement paths were restricted.
One additional point I would highlight is that with Akamai Guardicore Segmentation, we do not just use it for static segmentation, but also for continuous monitoring and policy optimization. Even after the initial deployment, we regularly review the traffic patterns and update the policies based on application changes. This is very important in dynamic environments such as banking, where new service integrations are frequently introduced. Another key aspect is that we use it as a part of a broader zero-trust strategy, integrating it with other security solutions such as WAF and secure web gateways to create a layered defense approach. Also, from an operational perspective, it has helped us to reduce the dependency on traditional network-based segmentation, making security more application-aware and flexible, especially in hybrid and cloud environments.
The visualization feature in Akamai Guardicore Segmentation has been extremely helpful for our daily operations, especially in troubleshooting and policy design. From a troubleshooting perspective, it gives us a clear, real-time view of communication flows between workloads. Instead of checking logs manually, we can quickly identify where traffic is being allowed or blocked. This significantly reduces the time required to identify issues. For policy design, the visualization helps us to understand the application dependencies before enforcing any rules. This ensures we do not accidentally block legitimate traffic, which is very critical in banking environments. It also helps in identifying unnecessary or suspicious communication paths, validating policies after implementation, and collaborating with application teams, since the visual maps are easy to understand even for non-security teams. Overall, it makes both troubleshooting faster and policy creation more accurate, reducing the operational effort and minimizing the business impact.
Based on our experience with Akamai Guardicore Segmentation, we have seen a noticeable improvement in both troubleshooting and policy validation timelines. Earlier, troubleshooting east-west communication issues used to take around two to four hours since we had to rely on manual log analysis and multiple tools. With Guardicore visualization, we can now identify the issue within twenty to thirty-five minutes, which is roughly around sixty-five percent to eighty-five percent reduction in troubleshooting time. For policy validation, it previously took several hours to a full day, especially when coordinating with application teams. Now with the clear dependency mapping and real-time visibility, we are able to validate policies within thirty-five to sixty-five minutes, improving efficiency by around fifty-five percent to seventy-five percent. Additionally, incident response time improved by fifty-five percent, policy deployment errors reduced significantly due to better visibility, and faster onboarding of newer applications since dependencies are clearly mapped. Overall, these improvements have helped our team become more efficient, proactive, and accurate in operations.
My main advice for anyone considering Akamai Guardicore Segmentation is to start with the visibility mode before enforcing any policies. Understanding application dependencies and traffic flow is very important to avoid unintended disruptions. Also, involve application and infrastructure teams early in the process since accurate segmentation depends on knowing how applications communicate. I recommend taking a phased approach by starting with monitoring and mapping, identifying the required versus unnecessary traffic, and gradually enforcing the policies. Additionally, keep policies simple and structured initially and refine them over time as you gain more visibility. Overall, if implemented properly, it is a very effective solution for achieving zero-trust and reducing lateral movement risks.
Akamai Guardicore Segmentation is a very effective solution for organizations looking to strengthen their zero-trust security model, especially in complex hybrid environments. What stands out the most is its ability to provide deep visibility and control over east-west traffic, which is something traditional security solutions often lack. While there are areas for improvement such as policy management simplicity and automation, the core capabilities are very strong and deliver real value in terms of security, operational efficiency, and compliance. From my experience, when implemented with the right approach, it can significantly enhance an organization’s overall security posture and reduce lateral movement risk. I would rate this product an eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsegmentation has protected critical environments and now blocks lateral ransomware movement
What is our primary use case?
I use Akamai Guardicore Segmentation to block lateral movement of malicious software like ransomware. This is very important to protect my business and my corporation.
I create labels for any assets to create rule sets in Guardicore Center with the configuration.
The logs and network logs provide visibility that is very important for my business and my corporate entity. We use microsegmentation by environment. I do segmentation for production, homologation, and development. It is very important.
Today, I have segmentation for Kubernetes in Guardicore, but I have problems with Guardicore with segmentation for Kubernetes because it is connected to SaaS. This is very important because we have projects starting in Kubernetes in my enterprise.
Akamai Guardicore Segmentation is deployed in my organization on a hybrid cloud because 99% is on a private cloud computer.
What is most valuable?
The best features of Akamai Guardicore Segmentation are maps and network logs. I think the analysis of logs and hits in Akamai Guardicore Segmentation is fantastic.
The impact of Akamai Guardicore Segmentation is very important because it reduced risk for my corporation and organization. It is very important.
Akamai Guardicore Segmentation reduced risk because it blocked malicious ransomware and uninspected traffic. I appreciate this. It is very good.
Akamai Guardicore Segmentation reduces risk, and the configuration is very easy, among other things.
What needs improvement?
I think the pricing is very high. It is a big cost. The price of Akamai Guardicore Segmentation is very expensive, but it is important to the enterprise. I think it is more or less.
For how long have I used the solution?
I have been using Akamai Guardicore Segmentation for approximately five years.
What do I think about the stability of the solution?
Akamai Guardicore Segmentation is very stable.
What do I think about the scalability of the solution?
It is very scalable.
How are customer service and support?
I like the Akamai support very much. The response is very fast. The attention is very good.
Which solution did I use previously and why did I switch?
I did not evaluate other options. I am happy with Akamai Guardicore Segmentation.
What about the implementation team?
We have a relationship with this vendor. We are a partner and an experienced user.
What was our ROI?
The investment is necessary for enterprises to reduce risk, protect the enterprise, and have visibility of the network.
Which other solutions did I evaluate?
What other advice do I have?
I gave this product a review rating of 10.
Network visibility has transformed segmentation in our kubernetes environments and improves security
What is our primary use case?
Our main use case for Akamai Guardicore Segmentation is the implementation in Kubernetes AWS.
How has it helped my organization?
Akamai Guardicore Segmentation has positively impacted our organization. We implemented Akamai Guardicore Segmentation and shared all our directory with the team, who are very happy about the security environment we implemented.
What is most valuable?
Akamai Guardicore Segmentation offers us large visibility in all our environments and helps us to understand network segmentation and traffic.
The visibility from Akamai Guardicore Segmentation has helped our team by addressing the challenge of a shadow network in traffic across all environments, providing us with more insight into this network traffic.
In my experience with Akamai Guardicore Segmentation, the best feature is visibility. The segmentation is excellent, but the visibility of all network traffic is extremely helpful.
The segmentation feature of Akamai Guardicore Segmentation is very easy to set up across all environments. The Akamai team supports all our questions, and the tool is very easy to use, making it extremely helpful.
Regarding the features of Akamai Guardicore Segmentation, the integration with Active Directory is excellent and very positive.
One specific outcome from using Akamai Guardicore Segmentation is that we noticed addressing network threats, which are a very significant problem in any company. This feature, along with visibility, has brought us more peace of mind.
What needs improvement?
I believe Akamai Guardicore Segmentation could be improved with a feature to filter, and I believe implementing MFA would be very useful and helpful to us.
For how long have I used the solution?
I have been using Akamai Guardicore Segmentation for more than three years, and I had the opportunity to get certified. I liked the tool so much that I had the opportunity to earn the GCSA and GCSE certifications.
What other advice do I have?
My advice for others looking into using Akamai Guardicore Segmentation is that visibility is crucial. If you are not seeing your network clearly, your job is challenging. Visibility is the main word in Akamai Guardicore Segmentation. Our company has a business relationship with Akamai as we are a partner or reseller. I rate this product a ten out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Segmentation of legacy systems has protected outdated endpoints and reduces network risk
What is our primary use case?
My main use case for Akamai Guardicore Segmentation is segmenting legacy operating systems.
I use Akamai Guardicore Segmentation to segment legacy operating systems because they do not support our EDR tools due to their age, and I chose Akamai Guardicore because its agents support very old systems that need to be segmented from the rest of the network.
We are mainly using it for legacy systems.
What is most valuable?
The best features Akamai Guardicore Segmentation offers make it simple to see all of the connections that are being made to each of the endpoints, and they can be controlled by process and port.
The ability to control by process and port helps my team day-to-day because, since there are hundreds of thousands of connections to some of these endpoints, looking at the Reveal Map makes it simple to audit and create rules for what we want to allow.
Akamai Guardicore Segmentation has impacted my organization positively because we find it difficult to remove the legacy systems, so it was very important to segment them from the rest of the network to protect them and protect the rest of our network.
What needs improvement?
Akamai Guardicore Segmentation can be improved because keeping it up to date is difficult since it is SaaS-based and updates are not on a regular schedule; I have to reach out to my contact to ask them to update to a newer version, and it would be helpful if updates were on a regular cadence so that I would not have to remember to ask them.
I think it is really valuable to take a course on Akamai Guardicore Segmentation because many things are not obvious in terms of how to do them correctly.
For how long have I used the solution?
I have been using Akamai Guardicore Segmentation for one year.
What do I think about the stability of the solution?
Akamai Guardicore Segmentation is stable and very reliable.
What do I think about the scalability of the solution?
The scalability of Akamai Guardicore Segmentation is very good. It scales very well, and I can keep adding agents and scale as much as needed.
How are customer service and support?
I have not had to reach out to customer support for Akamai Guardicore Segmentation.
What was our ROI?
I have not seen a return on investment in terms of specific metrics like time saved or reduced risk, but I can say that reduced risk is significant.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is that overall everything worked out really well. The pricing was flexible, and it has worked out well with our budget.
Which other solutions did I evaluate?
Before choosing Akamai Guardicore Segmentation, I evaluated other options, but I cannot recall them off the top of my head.
What other advice do I have?
Since I started using Akamai Guardicore Segmentation, we have not had any situations that demonstrate specific results or metrics such as fewer incidents or improved compliance.
My advice to others looking into using Akamai Guardicore Segmentation is to work with professional services during setup because it is not intuitive at the beginning and to take the administrator course to understand the Reveal Maps, as the Reveal Maps are the most useful way to control the segmentation.
I give this product a rating of 8.
Provides clear visibility of communications between assets without needing additional sensors or firewalls but the support could be better
What is our primary use case?
We want segmentation for a data center, and we have the problem that we cannot change IP addresses within the data center. So we need a solution. With the Guardicore solution, we can keep the IP addresses.
Additionally, we get agent-based segmentation, and we don’t have to change anything on the network. These are the main reasons why we chose Guardicore for micro-segmentation.
How has it helped my organization?
The enforcement points under the agent, the firewalling has been most beneficial for your customers’ cybersecurity needs specifically. We do not need any further security features like IDS, IPS, or whatever. For us, it’s only the firewall feature, and that’s part of the enforcement point of the Guardicore agent. So that was completely enough for us.
What is most valuable?
I like the visibility of the communication, so that we really see which communications the assets have to the other assets. We don’t need a further sensor or firewall to see the traffic to these devices. That’s the main reason.
And Guardicore makes its own rule set automatically, so we can work fast when creating a rule set. We don’t have a long phase of monitoring or whatever, so we can go straight to rules where we drop unwanted data traffic.
We don’t do micro-segmentation for each asset. We work with the ring-fencing function, and we have really good visibility on the dashboard with the rings. We can see which asset is in which segment, zone, or ring. That’s the main thing, that we can see this really easily.
We can also give this view not only to the administrator of the Guardicore components but also to the application owner, so they can see where their application is placed in the ring-fencing and what communication is there. This makes incident management easier because we get incidents in a more authenticated way from the application owner. That’s also a big benefit from the visibility of the Guardicore solution.
In the firewall, only the administrator has a deep look into the architecture, the logs, and the segmentation. In the Guardicore solution, we can give more visibility to the application owner on their own application. This makes it easier to manage incidents and the overall management of the application and network. The application owner has a view of the actions happening on the network with their assets or applications.
What needs improvement?
When we have more than one interface, we can only have one policy for both interfaces. Normally, you have assets with a production interface and a server interface that are only for management.
But in the Guardicore architecture, you cannot give the production interface its own rule set and the management interface another rule set. You have to combine these rule sets into one. It’s a lack because security standards suggest a different way to secure management interfaces.
So, I would like to have two separate rule sets for the basis of the device.
For how long have I used the solution?
We started planning last year, and we are now in the implementation phase. So, since April this year, we have been working directly with Guardicore and the Guardicore management systems.
We [my company] work with the latest version.
What do I think about the stability of the solution?
I would rate the stability a six out of ten, where one is low and ten is high stability.
The difficulty is when you start with such a project, it’s not only with Guardicore, it’s with all other micro-segmentation windows. You have to change your mindset from a network-centric to a label-centric approach, which is not based on the network. That’s the difficulty for the people, the customer, and the administrator.
There should be more support to change the mindset of the customer. They are all used to the old way to do segmentation. With other micro-segmentation tools, it’s a new technology, and it’s not about thinking in IP segments and IP networks anymore. You have to think in labels and ring fencing. That’s what makes it difficult to start with such a technology. It’s not the vendor, it’s the technology.
What do I think about the scalability of the solution?
I would rate the scalability an eight out of ten. It is good for our use case. So, scalability is at a satisfactory level.
I make projects with my customers. I do not have any view about my other colleagues and what they have in their projects with Vendor. Myself, it was the third customer where we have placed the Guardicore product.
My customers are enterprise businesses.
How are customer service and support?
The response time should be better. Sometimes it’s good, but sometimes it could be better. You have a problem, you need an answer, and then you have to wait. Sometimes they do not talk with an administrator who knows anything about Guardicore. When my colleagues call support, I think my colleagues are experts. And then the support starts with really easy questions. That’s not funny.
So, I want them to be more skilled, like, more educated on the matter.
How was the initial setup?
I would rate my experience with the initial setup a seven out of ten, where one is difficult and ten is easy to set up.
The technical setup was easy. It becomes more challenging when you start labeling the assets and doing the ring-fencing. You have to go deep into the architecture of the network, the application, and whatever. That’s more difficult, but in the end, it’s easier than doing classic segmentation with a firewall.
The data architecture took one week, but the segmentation logic took months. We are not finished. We started in April, and we are not finished. So, like almost half a year.
We start to define the ring for the ring fences, and then we start with a part of the network with the test environment. We test and then go. The last will be the production. We label the assets, then start a monitoring period to see the data traffic between the assets. Then we go into an alerting phase and finally to a block period.
What's my experience with pricing, setup cost, and licensing?
I would rate the pricing a six out of ten, where one is cheap and ten is expensive. I know other micro-segmentation tools like Cisco or Illumio, and so I think they are in the middle.
What other advice do I have?
Overall, I would rate the product a seven out of ten. We use Akamai because they have their own enforcement point. This was important for us.
Other micro-segmentation tools use the desktop firewall of Windows or the Linux iptables firewall, but Guardicore has its own enforcement point and its own agent. This was a key factor. When you start with the implementation, you have to have a clear picture about your labeling. I think it’s really important. You have to know what you want to separate from each other. You could go into very deep detail, but the more detail you have, the more complex it becomes. You have to find a balance between detail and complexity. You need the middle way.
Offers granular control and ease of policy creation with features like telemetry and micro-segmentation but incident tagging is missing
What is our primary use case?
In India, one use case is in the banking industry. In general, one customer used it for microsegmentation deployed across four locations.
Another used it for telemetry and microsegmentation. These were deployments for customers in India and the Philippines.
The workloads have been seamlessly integrated for segmentation. The network has been transited smoothly. So, the integration was straightforward and without major issues.
How has it helped my organization?
Our customers use the solution for micro-segmentation within the data center or cloud environments.
One customer uses it for their on-premises infrastructure, deployed at the code level across their massive network.
Another customer uses it in a data center to monitor microsegmentation for their 500-node workload.
Moreover, Akamai Guardicore Segmentation has helped our customers manage and secure traffic between different applications or workloads.
Earlier, they were using VMware NSX-v, which offered good logging for distributed services on an analytical level.
However, Akamai Guardicore Segmentation provides them with better overall visibility and granular control over-segmentation, even for inter-application and inter-routing traffic.
What is most valuable?
Initially, I liked the telemetry part. But later, we used the micro-segmentation features that we were able to deploy and found that they really stood out from other vendors.
It allows us to see microsegmentation as a distributed service.
The ease of policy creation and management in Akamai Guardicore Segmentation has impacted security operations. No other product offers more customization. It has some complexity at the initial configuration level, but later on, it becomes easy. If I were to rate it on a scale of ten, I'd give it at least a nine. It is highly mature.
What needs improvement?
Incident tagging could be improved. Other vendors offer semi-automatic tagging, which Guardicore doesn't yet have.
The rest of the features are already industry standard.
For how long have I used the solution?
I have been using it for two and a half years. The latest version I worked with was v6.7.92.
I recently enrolled for it for one of my customers, so that requirement was fulfilled, and we purchased the product.
What do I think about the stability of the solution?
There are sometimes issues when new versions are updated. I would rate the stability a seven out of ten.
Whenever there's an update, there always seem to be things needing adjustment.
I would like to see the stability level improved.
What do I think about the scalability of the solution?
In terms of scalability, the more features offered, the more devices it can handle. So, I'd rate it around eight out of ten.
We only have two customers who are using it because it's not widely marketed in the Indian region. One is a BFSI enterprise, a customer in the banking industry.
How are customer service and support?
I didn't use technical support as that's maintained by the customer anyway.
How was the initial setup?
I would rate my experience with the initial setup an eight out of ten, with ten being easy.
It was pretty straightforward. It didn't take too long to deploy. And it was roughly done within an hour. So implementation isn't overly complex.
What about the implementation team?
We're a system integrator and partner with Akamai.
The initial deployment was completely handled by the team. I was involved, but the SOP wasn't managed by me.
What's my experience with pricing, setup cost, and licensing?
The pricing is too high. Based on market standards, I'd recommend lowering the price.
I would rate the pricing a five out of ten, with ten being affordable.
The DQE feature increases the license cost based on usage. Also, prices vary depending on the customer and region, and taxes can add up. This makes it a bit unclear from a hypervisor perspective.
What other advice do I have?
Micro-segmentation should be a specific requirement because, nowadays, many built-in solutions offer similar functionality. Akamai provides Guardicore as an external SaaS service for those needing it in a SaaS environment.
However, for on-premises installations, integration with network vendors like Cisco is crucial. This could be done by customers themselves or through partnerships with other network vendors.
Overall, I would rate the solution a seven out of ten.
A stable and scalable solution that can be used for micro segmentation
What is our primary use case?
We use the solution for micro segmentation.
What is most valuable?
The most valuable features of the solution are the maps and ring fencing that help monitor events.
What needs improvement?
It's not easy to learn to use this program. It would be very helpful for beginners if the solution had more windows to help with the terms inside instead of going to the documentation.
For how long have I used the solution?
I have been using Akamai Guardicore Segmentation for six months.
What do I think about the stability of the solution?
I rate Akamai Guardicore Segmentation a nine out of ten for stability.
What do I think about the scalability of the solution?
Around four people are working with the solution daily in our organization.
I rate Akamai Guardicore Segmentation a nine out of ten for scalability.
How was the initial setup?
The solution's initial setup is not hard. However, you have to learn it because it's not plug-and-play.
What about the implementation team?
I, an integrator, and the Akamai staff implemented the solution.
What other advice do I have?
Overall, I rate Akamai Guardicore Segmentation a nine out of ten.
The tool's most valuable feature is visibility but needs improvement in Kubernetes
What is our primary use case?
We use the product in the production environment of server infrastructure.
What is most valuable?
The tool's most valuable feature is its visibility.
What needs improvement?
Kubernetes is not installed in the way we need it.
For how long have I used the solution?
I have been using the product since October.
What do I think about the stability of the solution?
We faced some minor issues, but overall, the product is stable. I rate it an eight to nine out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability an eight out of ten. My company has four to six users.
How was the initial setup?
Akamai Guardicore Segmentation's deployment is smooth. The deployment team promised us that the implementation would be completed in three weeks, but the product was available within two weeks.
What's my experience with pricing, setup cost, and licensing?
Akamai Guardicore Segmentation is expensive.
What other advice do I have?
I rate Akamai Guardicore Segmentation an eight out of ten. Adopting the product often involves a greenfield approach, requiring adjustments and careful planning.
Offers micro segmentation capabilities and easy to setup
What is our primary use case?
It's micro-segmentation.
What is most valuable?
The label-based segmentation is the most valuable feature.
What needs improvement?
There are always areas for improvement. It doesn't support a PAAC solution (Platforma as a service) in the cloud. So that could be improved.
In future releases, I would like to see more integration with other products.
For how long have I used the solution?
I have been offering this solution for more than three years.
What do I think about the stability of the solution?
It's very stable.
What do I think about the scalability of the solution?
It's very scalable. It's primarily the larger customers with thousands of servers.
How are customer service and support?
The customer service and support are very good.
Which solution did I use previously and why did I switch?
Akamai is much better than other solutions, such as ColorTokens and Illumio. It is more user-friendly and has more features. In fact, Illumio is actually implementing a lot of the features that Guardicore has had for years.
How was the initial setup?
The initial setup is very easy. It's a safe solution, so you can actually install it in five minutes. So it's very easy to install.
What about the implementation team?
So installation is fast. But then you have to roll it out to all these servers that the customer has, and that would take a couple of days or a week or a month perhaps and require, let's say, four people to do it.
We don't maintain it because it's safe. So it's very easy.
What's my experience with pricing, setup cost, and licensing?
The price is the same as other products in the market. There's no price argument to choose one or the other product, it will cost the customer approximately the same.
You pay for a year, two years, or three years, how many years you want, but you don't actually buy the product; you lease it for a year. And then you can buy it for another year and so on.
The support is included in the license.
What other advice do I have?
I would say that you should use it for micro-segmentation instead of trying to use firewalls. Because some customers try to use other solutions like firewalls, and it's not the best solution.
Overall, I would rate the solution a nine out of ten. It is an amazing solution.