Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Data Security Posture Management (DSPM).
After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud.
It was easy to deploy and covered all our accounts through APIs, requiring no agents.
Leveraging this technology saves us not only precious engineering time but also money developing and investing in other overlapping solutions.
We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately.
Wiz is the first vendor I've worked with that has turnaround feature requests in less than a month.
We are trying to figure out how to increase the frequency of the scans, as some universities do not wait a day before they know if something is exposed.
We have not encountered any issues with Wiz since I have been here, and it remained stable with no downtime or changes required.
We've only had downtime from maintenance and updates, and they notify us in advance, so we aren't impacted.
Stability-wise, I rate the solution an eight to nine out of ten.
This solution is very scalable; if I add resources to new accounts, they are automatically monitored.
We have deployed Wiz in three organizations on AWS, each with approximately 70 to 80 accounts, totaling more than 120 accounts.
Scalability-wise, I rate the solution a ten out of ten.
We can always reach our account representative when we have a problem or need to speak with technical staff to clarify things.
It is some of the best post-sales support ever received.
They recently changed to Zendesk, which has been so much better.
Early adopters got an excellent deal, but it became pricey when they became the market leader.
There is room for improvement on our pricing models, so it would be nice if Wiz could share the price beforehand rather than onboarding and then having pricing based on utilization.
We got results with Wiz immediately; we installed it and met our goal during the four-week trial.
Dig Security is a cloud data security platform that provides data discovery, classification, and governance for all of your cloud data. It is the only vendor to combine critical capabilities for data security posture management (DSPM), cloud DLP, and data detection and response (DDR) in a single platform. Dig Security is used by a wide range of organizations, including financial services, healthcare, and technology. It has been praised for its ease of use, scalability, and comprehensiveness.
Some of the key features of Dig Security include:
Overall, Dig Security is a well-respected and highly-rated cloud data security platform.
Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.
Wiz's Security Graph delivers automated alerts whenever risks emerge, allowing teams to prioritize and address the most critical issues before they escalate into breaches. Furthermore, Wiz ensures rapid and agentless visibility into critical data across various repositories, enabling organizations to easily determine the location of their data assets.
Wiz provides various features in the following categories:
Agentless Scanning: The solution can scan every layer of a cloud environment without requiring agents, managing the entire process and providing comprehensive visibility.
Workflow Integration: Users can create customized workflows within Wiz to identify and assign actions based on urgency, integrating them with ticketing systems for quick and efficient remediation.
Vulnerability Management: Wiz's vulnerability management modules provide detailed analytics and visibility across cloud systems, streamlining the manual process of vulnerability discovery. The automated attack path analysis helps identify risks and trace potential points of exposure, allowing users to understand and mitigate them effectively and proactively.
CSPM (Cloud Security Posture Management): Wiz's CSPM module offers instant visibility into high-level risks to an enterprise’s cloud environment, covering all accounts without the need for agents.
Out-of-the-Box Reporting and Custom Queries: The service supports comprehensive reporting with asset context, allowing users to perform complex custom queries on the solution’s user-friendly interface.
Automation Roles and Dashboards: The solution facilitates automation by providing essential roles and dedicated dashboards that enable teams to understand security information quickly, even those with limited expertise.
Contextual Risk Evaluation: The service contextualizes the various components contributing to an issue, providing a risk evaluation framework that helps prioritize remediation efforts.
Security Graph and Visibility: Wiz's security graph offers visibility across the entire organization, even with multiple accounts, enabling users to understand their environment and assets effectively.
Wiz offers the following benefits:
Comprehensive agentless scanning
Effective identification and mitigation of vulnerabilities
Streamlined vulnerability management
Robust reporting capabilities and customizable queries
Enhanced automation and role-based access control
Prioritized risk evaluation for efficient remediation
Security posture across multiple accounts
Kamran Siddique, VP Information Security at boxed.com, remarks his company has seen a ROI while using Wiz, as it simplifies the process by integrating multiple useful tools into one solution.
According to a Senior Security Architect at Deliveroo, Wiz has given their company a fresh approach to vulnerability management, as Wiz's native integrations are extremely useful and paramount to the operational success of their platform.
We monitor all Data Security Posture Management (DSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.