Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

Competitive Advantages

1 // Guardicore Confidential
Who Are Our Competitors?
Micro-segmentation Vendors

Firewall Vendors

Cloud Native Vendors


And Many More...

Do Nothing
2 // Guardicore Confidential
Illumio
Guardicore Advantages Why it is Important
Agent is a host-based firewall ▪ Guardicore can control applications regardless of OS
while Illumio leverages OS ▪ More granular security policy & provides consistency across OSs
Firewall (Windows and IP Tables only) ▪ Allows for broader coverage of OSs, including legacy

Visibility ▪ Easier to understand what is going on in the environment


▪ Stored historically
▪ Rules can be modeled against historical data to make informed
decisions

Labeling ▪ Guardicore has no limit on the type of label, Illumio offers 4 types
▪ Broader use case support

Blacklist Rules ▪ More efficient


▪ Reduce number of rules required to accomplish some use cases

Integrated Breach Detection ▪ Better ROI, simplified compliance

3 // Guardicore Confidential
Cisco Tetration
Guardicore Advantages Why it is Important
Agent is a host-based firewall ▪ Guardicore can control applications regardless of OS
while Cisco leverages OS ▪ More granular security policy & provides consistency across OSs
Firewall ▪ Allows for broader coverage of OSs, including legacy

Visibility ▪ Guardicore provides more granular details


▪ Easier to understand what is going on in the environment
▪ Rules can be modeled against historical data to make informed
decisions

Blacklist Rules ▪ More efficient


▪ Reduce number of rules required to accomplish some use cases

Scalability ▪ Beyond 25,000 workloads, Cisco requires a complex hardware


configuration

Integrated Breach Detection ▪ Cisco offers breach detection but separate consoles and licensing

4 // Guardicore Confidential
NSX (NSX-V, NSX-T, NSX-Cloud, VRNI, AppDefense)

Guardicore Advantages Why it is Important

Better coverage within same tool ▪ Additional risk reduction, one tool to all environment
▪ Cloud, containers, bare metal even with NSX-T case.
▪ Much better coverage than NSX-T for OSes

L7 policies ▪ Easier to create, tighter policies, better security posture & more
risk reduction
▪ No need to buy NGFW on top

Better visibility ▪ Faster segmentation, more use-cases – ROI


▪ More flexible filtering, historical data with high resolution and L7
context.

Integrated breach detection ▪ Better ROI, simplified compliance

5 // Guardicore Confidential
Edgewise
Guardicore Advantages Why it is Important

Visibility ▪ Guardicore offers visibility in a way that helps understand the whole
environment, Edgewise only shows small segments
▪ Guardicore stores data historically (Used for modeling rules &
making informed decisions

Agent Support ▪ Guardicore offers support for legacy OSs and UNIX

Policy Granularity ▪ Guardicore policy can include device, process, user identity, port,
protocol, DNS, etc., Edgewise offers just device and process

User Experience ▪ Guardicore UI is much more user friendly


▪ Guardicore includes RBAC for creating different user experiences,
Edgewise is just Admin/Guest

Proven process for ▪ Guardicore Process = Model > Alert > Block
successfully implementing ▪ Guardicore offers the customer the ability to model the impact of
segmentation projects new rules against historical data.

6 // Guardicore Confidential
Cloud Native Security Groups (AWS, Azure, GCP)
Guardicore Advantages Why it is Important

Infrastructure agnostic, ▪ Security Groups are per cloud provider


single-pane-of-glass ▪ In multi-cloud, requires management of rules in separate cloud
provider consoles
▪ In hybrid environment, requires managing a different solution for on-
prem workloads

Visibility ▪ Guardicore provides visibility across the environment


▪ Most clouds offer limited visibility, but only for their cloud

Scalable ▪ Security groups have many limitations around scale

Consistent Security Policy ▪ Guardicore allows for managing security policy across the whole
environment.

More granular rules ▪ Guardicore can control by application, user identity, DNS, etc

7 // Guardicore Confidential
Firewalls & NGFW
Micro Segmentation NGFW

▪ Granular Policies ▪ Course Policies

▪ Virtual or Overlay Network ▪ Physical network

▪ East-west traffic ▪ North-south traffic

▪ Identity based/workload level ▪ Address bases/network level

▪ Software ▪ Hardware

▪ Metadata ▪ DPI

8 // Guardicore Confidential

You might also like