The best (and worst) features of 7 top cloud security solutions

How, Cisco CloudLock, Dome9, Netskope, Skyhigh, CloudPassage and Bitglass stack up, according to enterprise users.

cloud security
Perspecsys Photos (Creative Commons BY or BY-SA)

With the continuous shift to cloud service and deployment models in the enterprise technology space, tech professionals are placing more of a focus on cloud security. Deep visibility, a comprehensive suite of security features, and ensuring real-time compliance are cited as important criteria to consider when evaluating cloud security solutions.

According to enterprise users on the reviews site IT Central Station, top cloud security solutions in the market include, Cisco CloudLock, Dome9, Netskope, Skyhigh, CloudPassage and Bitglass.

Here, IT Central Station users share their experiences with using these solutions, describing which features they find valuable and where they see room for improvement.

High points
"It allows me to see what's happening in our AWS account. I have several, so this is a nice, single pane, point of view for me whenever I have to make sure that configurations are as secure as possible."
SrManage0c6e, a senior manager of information security at a software R&D company

“This enables us to clean up our existing AWS accounts and to update our processes for new accounts. This improves our overall security process to an acceptable level. We are building out new AWS accounts that are secured from the beginning instead of fixing problems as they are detected. This ensures that everything is consistent and secure from the beginning.”
— Supervisa81a, an architecture & infrastructure platform delivery supervisor at a recruiting/HR firm

Room for improvement
“I would like to see integration of PCI audits into the dashboard. That would help greatly in passing our PCI audits for AWS in an easy-to-view method.

I would also like the ability to integrate Evident with AWS in such a way that we could make basic changes to the AWS environments based on security alerts. For example, the ability to lock down unsecured security groups, apply PW policies, and rotate IAM keys.”
ITSecuribe99, an IT Security Professional at a comms service provider

Read more user reviews.

Cisco CloudLock

To continue reading this article register now

Microsoft's very bad year for security: A timeline