Try our new research platform with insights from 80,000+ expert users

Microsoft Defender for Cloud Apps vs Threat Stack Cloud Security Platform [EOL] comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (7th), Secure Access Service Edge (SASE) (8th)
Microsoft Defender for Clou...
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
42
Ranking in other categories
Cloud Access Security Brokers (CASB) (4th), Advanced Threat Protection (ATP) (14th), Microsoft Security Suite (12th)
Threat Stack Cloud Security...
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
FV
Security and Continuity Manager at Rolinco NV
Deployment has been seamless with insightful data categorization and enhanced control
The features of Microsoft Defender for Cloud Apps that I have found most valuable include the overall portal view, with bubble graphs which give us insight into what goes where in the categorization, nowadays with Generative AI but all kinds of categorization, collaboration, etc. That central view of the portal is very useful for us. The impact of Microsoft Defender for Cloud Apps on our organization's ability to assess and manage app related risks has been significant because we have more visibility. Therefore, we can add more control, and we have already done so. This was not possible in the old solution, in the old CASB solution with Netskope. We now can see on the spot, and we do that almost weekly, what the end users are utilizing, which cloud providers or cloud apps they're using. The visibility into OAuth apps provided by Microsoft Defender for Cloud Apps is very good. The visibility into risk and risk management of our organization's Generative AI apps is very nice, as you can choose the category Generative AI and then see exactly what traffic has been going to and from Generative AI in the cloud. This makes us very insightful on what is used within the company. We have some policies on blocking specific Generative AI, and we use within our company one particular AI part, which is CoPilot of Microsoft. In this way, we can see what the end users are using other than CoPilot, and that makes us more in control. The effectiveness of the integration of Microsoft Defender for Cloud Apps with Defender XDR and defending against SaaS attacks is very intuitive. It works immediately if we create a new policy or in Purview or in Microsoft Defender for Cloud Apps, or when we make an app unsanctioned by blocking it, then it is almost immediately, or at least within a couple of hours, effective on all the endpoints where the EDR is running. This gives us much better control over things than before.
SC
Software Development Manager at Rent Dynamics
SecOps program for us, as a smaller company, is amazing; they know what to look for
They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter. Even as part of the SecOps Program, that could be helpful; a quick analysis. They're analyzing our whole infrastructure and saying, "You have one VPC and that doesn't make a lot of sense, that should be multiple VPCs and here's why." The architecture of the servers in whatever cloud-hosting provider you're on could be helpful. Other than that, they should continue to expand on their notifications and on what's a vulnerability. They do a great job of that and we want them to continue to do that. It would be cool, since the agent is already deployed and they know about the server, they know the IP address, and they know what vulnerability is there, for them to test the vulnerability and see if they can actually exploit it. Or, once we patch it, they could double-check that it can't be. I don't know how hard that would be to build. Thinking on it off the top off my head, it could be a little challenging but it could also be highly interesting. It would also be great if we could test a couple of other features like hammering a server with 100 login attempts and see what happens. Real test scenarios could be really helpful. That is probably more something close to what they do with the SOC 2 audit or the report. But more visualization of that, being able to test things out on our infrastructure to make sure we can or can't hit this box could be interesting.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Content filtering is the most useful feature of iboss."
"The most valuable feature is its policy implementation."
"If your business requirements are relatively simple, it can get the job done."
"Defender helps us control which applications are being used and gain more security insight into remote and hybrid users based on user identity and log in location. You can also integrate Defender for Cloud Apps with Defender for Endpoint to extend its capabilities."
"The ability to prevent users from using certain applications is one of the most valuable features. It doesn't require any configuration for implementation from the client perspective. It just works right away and gives you the information you need."
"The raw logs that come directly from Microsoft Defender for Cloud Apps contain all the data I need, and the ability to track activities happening on cloud applications and the alerts provided is an interesting aspect."
"The general usability of the solution is very straightforward."
"Defender for Cloud Apps has given us good visibility regarding what we've allowed into our environment until now."
"The favorite feature of Microsoft Defender for Cloud Apps is the categorical blocking capability, which appears to be fed from Microsoft Security Intelligence feeds that seem to be better than other solutions and allows for dynamic configuration, cutting down on potential issues from manually managing block lists."
"Technical support is very helpful."
"The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production... We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."
"It has been quite helpful to have the daily alerts coming to my email, as well as the Sev 1 Alerts... We just went through a SOX audit and those were pivotal."
"We're using it on container to see when activity involving executables happens, and that's great."
"Threat Stack has connectivity."
"Every other security tool we've looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."
"With Threat Stack, we quickly identified some AWS accounts which had services that would potentially be exposed and were able to remediate them prior to release of products."
"An important feature of this solution is monitoring. Specifically, container monitoring."
 

Cons

"If they could implement an extra security layer preventing access to iboss from the open internet, it would be great."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company ExxonMobil."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"Microsoft Defender for Cloud Apps' initial setup was quite technical but we were prepared. The time of the implementation depends on the job and how many users are being set up."
"Defender for Cloud Apps could come with more configured policies out of the box. Also, integration could be easier. Integration is moderately difficult because Microsoft hasn't developed a solution that unifies device onboarding and management. You have to use Intune to manage devices and Defender for Endpoint to enforce policies. They need to fix their integration, but I believe they will straighten it out by the end of the year."
"I would like for it to be available on Mac and for it to support all of the features of Microsoft financing products. It is really for Windows."
"The response time could be better. It will be helpful if the alerts are even more proactive and we can see more data. Currently, the data is a little bit weak. It is not complete. I can't just see it and completely know which user or which device it is. It takes some effort and time on my part to investigate and isolate a user. It would be great if it is more user-friendly or easy for people to understand."
"The graph displayed in the Defender portal mostly doesn't capture the full picture as we see in endpoint-related or identity-related alerts; we can see a complete graph of what is happening there, but Microsoft Defender for Cloud Apps still falls short in capturing that whole aspect in the graph."
"I would prefer to have filtering options incorporated within the policies, enabling the solution to perform tasks beyond mere blocking or allowing."
"It takes some time to scan and apply the policies when there is some sensitive information. After it applies the policies, it works, but there is a delay. This is something for which we are working with Microsoft."
"They should continue integration with all other Microsoft security-related products. The integration with all the other products is still ongoing."
"The one thing that we know they're working on, but we don't have through the tool, is the application layer. As we move to a serverless environment, with AWS Fargate or direct Lambda, that's where Threat Stack does not have the capacity to provide feed. Those are areas that it's blind to now..."
"It shoots back a lot of alerts."
"The user interface can be a little bit clunky at times... There's a lot of information that needs to be waded through, and the UI just isn't great."
"I would like further support of Windows endpoint agents or the introduction of support for Windows endpoint agents."
"The compliance and governance need improvement."
"The reports aren't very good. We've automated the report generation via the API and replaced almost all the reports that they generate for us using API calls instead."
"They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter."
"Some features do not work as expected."
 

Pricing and Cost Advice

"It is probably in line with other solutions, but I do not deal with the financial side."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"The overall pricing for iboss is very competitive and transparent."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It has pretty good pricing."
"The pricing is fair."
"The pricing is in the middle. It isn't too cheap or expensive compared to other antivirus or security products. It is priced according to industry standards."
"Its pricing is on the higher side. Its price is definitely very high for a small-scale company. As an enterprise client, we do get benefits from Microsoft. We get a discounted price because of the number of users we have in our company. We have a premier package, and with that, we do get a lot of discounts. There are no additional costs. It only comes in the top-tier packages. Generally, the top-tier license is the best license that you can get for your organization. If you want, you can buy it separately, but that's not a good idea."
"Microsoft offers bundle discounts and a pay-as-you-go option."
"This product is not expensive."
"The E5 license offers everything bundled. People are moving to Microsoft because you buy one license and it gives you everything."
"It is a little bit expensive. When you want to have the complete package with Office 365, Defender, and everything else, it is expensive."
"Pricing seems to be in line with the market structure. It's fine."
"I'm happy with the amount that we spend for the product that we get and the overall service that we get. It's not cheap, but I'm still happy with the spend."
"It is very expensive compared to some other products. The pricing is definitely high."
"It is a cost-effective choice versus other solutions on the market."
"It came in cheaper than Trend Micro when we purchased it a few years ago."
"We find the licensing and pricing very easy to understand and a good value for the services provided."
"What we're paying now is somewhere around $15 to $20 per agent per month, if I recall correctly. The other cost we have is SecOps."
report
Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
881,036 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
10%
Manufacturing Company
9%
Comms Service Provider
6%
Financial Services Firm
11%
Computer Software Company
11%
Manufacturing Company
8%
Government
7%
Performing Arts
16%
Manufacturing Company
8%
Comms Service Provider
7%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise5
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise10
Large Enterprise19
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise5
Large Enterprise2
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
Which is the better security solution - Cisco Umbrella or Microsoft Cloud App Security?
Cisco Umbrella is an integral component of the Cisco SASE architecture. It integrates security in a single, cloud-nat...
What is your experience regarding pricing and costs for Microsoft Cloud App Security?
At the time of implementation, when the size of our organization was small, it was a more affordable product. Since a...
What needs improvement with Microsoft Cloud App Security?
The fidelity of the signal in Microsoft Defender for Cloud Apps has been a challenge in some areas. There have been i...
Ask a question
Earn 20 points
 

Also Known As

iBoss Cloud Platform
MS Cloud App Security, Microsoft Cloud App Security
Threat Stack, CSP,
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Customers for Microsoft Defender for Cloud Apps include Accenture, St. Luke’s University Health Network, Ansell, and Nakilat.
StatusPage.io, Walkbase, Spanning, DNAnexus, Jobcase, Nextcapital, Smartling, Veracode, 6sense
Find out what your peers are saying about Palo Alto Networks, Cisco, Netskope and others in Cloud Access Security Brokers (CASB). Updated: January 2026.
881,036 professionals have used our research since 2012.