Skyhigh Security and Cortex Cloud by Palo Alto Networks both provide robust cloud security solutions. Skyhigh is more cost-efficient while Cortex offers a premium service with comprehensive features. Skyhigh has an edge in pricing, providing good value for money, whereas Cortex excel in providing comprehensive capabilities across multiple cloud environments.
Features: Skyhigh Security offers shadow IT identification, risk assessment, and protection for sanctioned cloud services with its cloud risk registry, integrating with DLP and user activity monitoring for enhanced security. Cortex Cloud by Palo Alto Networks emphasizes security posture management across multiple clouds, incorporating compliance checks, workload protection, and identity management, all accessible through a unified dashboard.
Room for Improvement: Skyhigh Security faces challenges with slow console performance and limited report customization. Enhanced integration with custom applications and a more streamlined UI are desired. Cortex Cloud by Palo Alto Networks could improve integration capabilities, real-time data updates, and extend its coverage to better support GCP, along with improving automation and documentation for cloud environment setup.
Ease of Deployment and Customer Service: Skyhigh Security provides flexibility in deployment across hybrid, on-premises, and public cloud environments. However, user experiences with technical support vary, particularly in response time and expertise. Cortex Cloud by Palo Alto Networks also deploys well in diverse cloud settings but needs better support response times and detailed onboarding assistance. Both platforms generally offer strong customer service, with Skyhigh slightly ahead in user satisfaction.
Pricing and ROI: Skyhigh Security uses a user subscription-based pricing model with Discovery and Secure licenses, offering affordability and good value for money. In contrast, Cortex Cloud by Palo Alto Networks is perceived as more expensive, with a complex pricing structure based on workloads and resource usage. While both solutions are valued for their capabilities, Skyhigh is viewed as cost-efficient, and Cortex is seen as a premium service with extensive capabilities.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
It eliminates the need for additional hardware, making it a financially and technically sound investment.
It helped reduce risks and sped up threat detection.
From a security standpoint, we have significantly enhanced our client's security posture by implementing Prisma Cloud.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Whenever I have issues with the solution, I will get an immediate response from the product team and they will try to close the issue as soon as possible.
When you send them a message, you get a response in a minute or two.
They can respond with technical documentation or pass on the case to the next level because it requires the development of a new feature or changing a feature due to a bug.
As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
It's very scalable and very easy to use.
It's the type of tool that is constantly improving, and its scalability suits our environment well.
If we want to scale, we only need to purchase another license.
In my experience, there has been 100 percent uptime.
SentinelOne Singularity Cloud is incredibly reliable.
The cloud console is very resilient.
I cannot recall any downtime with the solution.
I would rate it a ten out of ten for stability.
I haven't seen any outages with Prisma Cloud.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
It is a SaaS solution, but some of my clients have a local regulatory requirement, and they want to install it locally on their premises.
From a developer's perspective, especially for organizations like banks developing their applications, ensuring API security before deploying them to the cloud is crucial.
Prisma Cloud is an excellent tool.
The solution has room for improvement in its DDoS protection.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
A strategy to optimize costs will save you money.
The licensing model for data security should be compared to the native security offered by AWS and Azure.
Prisma Cloud is remarkably expensive.
The real-time detection and response capabilities of SentinelOne Singularity Cloud impressive because it is a platform that uses artificial intelligence to determine what is normal and what is abnormal and can lock down any virus it may encounter.
We were shown how ransomware can be immediately stopped in real-time. That was huge.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
Prisma offers visibility to developers and high-level leadership because the dashboard is excellent and the alerts are comprehensive.
Its ease of integration is valuable because we need to get the solution out of the door quickly, so speed and ease matter.
Security posture management is the most valuable feature.
The cloud security features are the most valuable.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal manual intervention. Securing containerized applications and virtual machines, it excels in threat intelligence and endpoint protection. However, improvements are needed in performance during high workload periods, and more integrations with third-party tools and better documentation would be beneficial. Users often find the installation process complex, support response times slow, and the dashboard's navigation unintuitive.
What are the key features of SentinelOne Singularity Cloud Security?In specific industries, SentinelOne Singularity Cloud Security is implemented to safeguard critical data and infrastructure. Organizations in finance, healthcare, and technology depend on its real-time threat detection and automated response to protect sensitive information. Its ability to secure containerized applications and virtual machines is particularly valuable in dynamic environments where rapid scaling is necessary.
Cortex Cloud by Palo Alto Networks offers dynamic workload identity creation, application dependency mapping, and automated forensics. Its capabilities in multi-cloud environments, tight AWS integration, and compliance features enhance threat visibility and control.
Cortex Cloud integrates RedLock and Prisma Cloud to deliver inventory management, vulnerability scanning, and cloud configuration monitoring. These features enable strong security posture management while optimizing alert response times and operational costs. Users leverage it for container security and multi-cloud compliance, maximizing insights into security configurations and threat detection across AWS, Azure, and GCP.
What are the key features of Cortex Cloud?Cortex Cloud is widely used in industries prioritizing container security and compliance across multi-cloud frameworks. Companies implement it for real-time management, vulnerability detection, and threat remediation. The focus is on aligning security posture with industry benchmarks and achieving automated compliance, facilitating robust protection across platforms like AWS, Azure, and Google Cloud.
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform. All solutions form a fully converged, consolidated platform, and are managed from the same single console.
Skyhigh Security Benefits
Skyhigh Security Features
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.