Try our new research platform with insights from 80,000+ expert users

CloudLock vs Microsoft Defender for Cloud Apps comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 7, 2024
 

Categories and Ranking

iboss
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
8th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
Secure Web Gateways (SWG) (13th), Internet Security (4th), Web Content Filtering (4th), ZTNA as a Service (12th), Secure Access Service Edge (SASE) (10th)
CloudLock
Ranking in Cloud Access Security Brokers (CASB)
19th
Average Rating
7.8
Reviews Sentiment
7.3
Number of Reviews
5
Ranking in other categories
No ranking in other categories
Microsoft Defender for Clou...
Ranking in Cloud Access Security Brokers (CASB)
4th
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
33
Ranking in other categories
Advanced Threat Protection (ATP) (13th), Microsoft Security Suite (11th)
 

Featured Reviews

Jack Hamm - PeerSpot reviewer
We experienced benefits immediately but the report generation is lagging
iboss excels on the networking side but lags slightly behind competitors like Zscaler and Netskope in terms of security feature parity. I'd like to see them accelerate development on the security side, particularly around data loss prevention. Using iboss for DLP instead of traditional endpoint solutions is preferable, but its current feature set requires some clunky workarounds. I'd also like to see better integration of DLP into the platform. Additionally, while it's improving, reporting can be slow at times. This is problematic when generating reports for executives who expect them immediately. I'd like to see further improvements in reporting speed and efficiency.
reviewer779877 - PeerSpot reviewer
Screens sensitive data but it should be a bigger part of an end-user device
The only improvement is that it has to be a bigger part of an end-user device. It should look at how endpoints appear on the EDR rather than creating an API to integrate into the agent app which need additional development effort. We have to integrate the source code into the system endpoint and make it as part of the connected app.
Anthony Alvarico - PeerSpot reviewer
Provides discovery, data exfiltration, and sensitive data exposure at low cost
The deployment process is quick, taking two to three days. The implementation and customization require more time. We need to adjust the setup to fit the client's needs, which involves fine-tuning notifications and alerts to avoid overwhelming them. First, you need the appropriate licensing. Once you have that, go to security.microsoft.com and integrate with Defender for Endpoints to receive information. While you can ingest logs from different firewalls, such as Palo Alto or Cisco, we usually implement them with Defender for Endpoints. Once a laptop or desktop is set up in Defender for Endpoints, integrating Cloud Apps with the endpoints allows us to collect the data easily. I rate the initial setup a nine out of ten, where one is difficult and ten is easy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Its initial setup was straightforward."
"Technical support is pretty sharp and very responsive."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"Our primary use case for this product is DLP,"
"It was a very easy product to install. It can be deployed very fast."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"I like CloudLock because when data gets sent out, I do not want it to get out of the environment. In today's world, a lot of users will remotely use the application. It screens all of the sensitive data. That data will really be as part of the environment that you do not want it to be part of. CloudLock is protection for sensitive data."
"The solution is very stable and reliable."
"The product’s most valuable feature is SQL database."
"All of the features are valuable because all of the features are related."
"Everything from Microsoft is integrated. You receive regular reports on them all. You can push your reports, logs, and security alerts, which are all integrated. It is crucial that these solutions work natively together to deliver coordinated detection and response across our environment."
"In Microsoft Defender for Cloud Apps, there is an option to enable files. Once you enable that, it will give you all the files in your organization and where they are located in the cloud... That feature is very useful for investigation purposes."
"Defender for Cloud Apps has given us good visibility regarding what we've allowed in our environment until now. It helps us to know our inventory, understand what our customers are using, and steer them toward safer practices."
"Defender's integration with our identity solutions is critical in our current setup."
"Better logging allows us to find problems and take appropriate steps to lock them out."
"The most valuable feature is the ease of management. It's important."
 

Cons

"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"Its pricing could be better."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"The only improvement is that it has to be a bigger part of an end-user device. It should look at how endpoints appear on the EDR rather than creating a separate agent. We have to integrate the source code into the system endpoint and make it an agent."
"The solution needs to have better integration capabilities. I have a lot of customers asking about how they can integrate it better."
"We sometimes get errors when we create policies, which is somewhat annoying because some policies stop working due to misconfigurations. We find this challenging because it limits our options for troubleshooting an issue."
"I would prefer to have filtering options incorporated within the policies, enabling the solution to perform tasks beyond mere blocking or allowing."
"Generally, the pricing can always be improved along with the management system."
"We are having trouble with our continuous reporting configuration and struggling with configuring the collector properly with our log parsing. We've also faced difficulties getting support for this issue. It's taken us months to figure this out after going through a couple of different support channels."
"They should continue integration with all other Microsoft security-related products. The integration with all the other products is still ongoing."
"The interface needs to be more user-friendly."
"The response time could be better. It will be helpful if the alerts are even more proactive and we can see more data. Currently, the data is a little bit weak. It is not complete. I can't just see it and completely know which user or which device it is. It takes some effort and time on my part to investigate and isolate a user. It would be great if it is more user-friendly or easy for people to understand."
"We would like to get more information from the endpoint. I don't get enough detailed information right now on why something failed. There is not enough visibility."
 

Pricing and Cost Advice

"It is probably in line with other solutions, but I do not deal with the financial side."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The overall pricing for iboss is very competitive and transparent."
"It is expensive compared to one of its competitors."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
Information not available
"The price could be better and should be reconsidered."
"Where we are right now, this is an acceptable pricing. I would like to see more transparency given to the end user. The end user given to us is via the cloud service provider. There are different programs and license models. Some include this, and some include that. It is all over the place. There can be a little more consistency or simplification in the pricing so that your parts list is not ten pages long, and you are not trying to determine, "If I have an E3, does this cover that?", or "Do I need to pay separately for the license?" Simplification would probably be better."
"The E5 license offers everything bundled. People are moving to Microsoft because you buy one license and it gives you everything."
"The pricing is a little bit high but right now, we are okay with it because of the compatibility with Office 365, Teams, and Azure AD."
"It has fair pricing. You pay for what you get. As far as I know, there are no costs in addition to the standard licensing fee."
"This product is not expensive."
"Microsoft offers bundle discounts and a pay-as-you-go option."
"The pricing is fair."
report
Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
9%
Government
6%
Computer Software Company
38%
Financial Services Firm
8%
Legal Firm
6%
Healthcare Company
5%
Computer Software Company
16%
Financial Services Firm
12%
Manufacturing Company
9%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have the same complaint about them that I have about other software companies. Sometimes when you call in support, ...
What is your primary use case for iboss?
We are a PreK-12 public school district, and we use iboss to filter internet content for our students at home and sta...
Ask a question
Earn 20 points
Which is the better security solution - Cisco Umbrella or Microsoft Cloud App Security?
Cisco Umbrella is an integral component of the Cisco SASE architecture. It integrates security in a single, cloud-nat...
What do you like most about Microsoft Cloud App Security?
It does a great job of monitoring and maintaining a security baseline. For us, that is a key element. The notificatio...
What is your experience regarding pricing and costs for Microsoft Cloud App Security?
Honestly, it is expensive. I would rate the price as eight out of ten.
 

Also Known As

iBoss Cloud Platform
No data available
MS Cloud App Security, Microsoft Cloud App Security
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Dominion Enterprises, Quality Distribution, Clark Construction Group LLC, Ahold, Middlesex Hospital, Austin Community College (ACC), Dominion Enterprises, The United States Holocaust Memorial Museum, Oakland Unified School District, Sunnova, Damballa, Financial Times, Boise State University
Customers for Microsoft Defender for Cloud Apps include Accenture, St. Luke’s University Health Network, Ansell, and Nakilat.
Find out what your peers are saying about CloudLock vs. Microsoft Defender for Cloud Apps and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.