Threat Stack Cloud Security Platform and Prisma Cloud by Palo Alto Networks are prominent competitors in cloud security. While both offer valuable solutions, Prisma Cloud gains an advantage with its comprehensive security features across multi-cloud environments, despite its higher costs compared to Threat Stack's cost-effectiveness and support.
Features: Threat Stack offers proactive threat detection, real-time visibility, and strong alerting capabilities, making it suitable for targeted security measures. In contrast, Prisma Cloud delivers extensive features, including compliance checks, identity management, and broad multi-cloud security coverage, providing a wider scope for security management.
Room for Improvement: Threat Stack could enhance its container monitoring and expand rule customization options. It might also benefit from integrating more advanced analytics and reporting features. Prisma Cloud could improve on ease of use by simplifying its interface and streamlining deployment processes. Additionally, offering more tailored support for non-standard cloud setups would be beneficial.
Ease of Deployment and Customer Service: Threat Stack is noted for its easy deployment processes and responsive customer support, making it a reliable choice for quick implementation. Prisma Cloud, however, provides deep integration with existing infrastructure but requires a steeper learning curve, making extensive documentation and support networks crucial for optimal use.
Pricing and ROI: Threat Stack appeals with its cost-effectiveness and rapid ROI, positioning it as a budget-conscious solution for organizations prioritizing initial cost savings. On the other hand, Prisma Cloud requires a higher investment but justifies its price with extensive capabilities, providing significant value to businesses needing comprehensive security across cloud services.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
Before, we had a few staff members who monitored our environment, but now the alerting and other processes happen automatically, so there is a good ROI in terms of resources.
It eliminates the need for additional hardware, making it a financially and technically sound investment.
It helped reduce risks and sped up threat detection.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Whenever I have issues with the solution, I will get an immediate response from the product team and they will try to close the issue as soon as possible.
When you send them a message, you get a response in a minute or two.
They can respond with technical documentation or pass on the case to the next level because it requires the development of a new feature or changing a feature due to a bug.
As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
It's very scalable and very easy to use.
It's the type of tool that is constantly improving, and its scalability suits our environment well.
Nowadays, all cloud solutions are scalable; scalability should be a given feature and does not need to be asked for.
In my experience, there has been 100 percent uptime.
SentinelOne Singularity Cloud is incredibly reliable.
The cloud console is very resilient.
I cannot recall any downtime with the solution.
I would rate it a ten out of ten for stability.
I haven't seen any outages with Prisma Cloud.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
Currently, it requires programming knowledge, so if someone without hardware programming knowledge could customize certain features to their requirements, it would be very helpful.
It is a SaaS solution, but some of my clients have a local regulatory requirement, and they want to install it locally on their premises.
From a developer's perspective, especially for organizations like banks developing their applications, ensuring API security before deploying them to the cloud is crucial.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
A strategy to optimize costs will save you money.
The licensing model for data security should be compared to the native security offered by AWS and Azure.
Prisma Cloud is remarkably expensive.
The real-time detection and response capabilities of SentinelOne Singularity Cloud impressive because it is a platform that uses artificial intelligence to determine what is normal and what is abnormal and can lock down any virus it may encounter.
We were shown how ransomware can be immediately stopped in real-time. That was huge.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
Prisma offers visibility to developers and high-level leadership because the dashboard is excellent and the alerts are comprehensive.
This alerting system allows me to take the necessary steps to secure it before any attack can occur, making it the best preventive measure for our cloud.
Its ease of integration is valuable because we need to get the solution out of the door quickly, so speed and ease matter.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal manual intervention. Securing containerized applications and virtual machines, it excels in threat intelligence and endpoint protection. However, improvements are needed in performance during high workload periods, and more integrations with third-party tools and better documentation would be beneficial. Users often find the installation process complex, support response times slow, and the dashboard's navigation unintuitive.
What are the key features of SentinelOne Singularity Cloud Security?In specific industries, SentinelOne Singularity Cloud Security is implemented to safeguard critical data and infrastructure. Organizations in finance, healthcare, and technology depend on its real-time threat detection and automated response to protect sensitive information. Its ability to secure containerized applications and virtual machines is particularly valuable in dynamic environments where rapid scaling is necessary.
Prisma Cloud by Palo Alto Networks is used for managing cloud security posture, container security, and compliance monitoring in multi-cloud environments.
Prisma Cloud by Palo Alto Networks provides tools for vulnerability management, misconfiguration detection, and compliance with standards like HIPAA and CIS. It offers near real-time inventory and alerting, enhancing cloud configuration audits and security across AWS, Azure, and GCP. Its automated security features offer real-time protection and integration into CI/CD pipelines, optimizing visibility, control, and risk identification without manual steps. Despite its capabilities, improvement areas include documentation, pricing clarity, usability, security automation, dashboard customization, and API functionality. Slow support and integration challenges with AWS and third-party tools are noted.
What are the key features of Prisma Cloud?In industries such as healthcare and finance, Prisma Cloud by Palo Alto Networks enhances security by aligning with strict compliance standards and safeguarding sensitive data. Its tools adapt to rapid cloud service updates and enable secure deployment across diverse cloud infrastructures.
Threat Stack Cloud Security Platform [EOL] offers robust security features including endpoint monitoring, rule customization, and integration capabilities, with easy connectivity to cloud services like Docker and AWS.
Threat Stack Cloud Security Platform [EOL] provides tools for enhancing security visibility across cloud infrastructure. It supports AWS and Docker integration, facilitating efficient threat detection and management. Users appreciate its capability to configure customizable alerts and monitor endpoints, sessions, API interactions, and cloud services. However, there are areas needing improvement, such as better serverless environment support and reduced alert frequency. The platform services smaller organizations by compensating for limited security resources with its comprehensive monitoring and auditing tools.
What are the key features?In specific industries, Threat Stack Cloud Security Platform [EOL] is utilized for its strength in monitoring cloud infrastructure and preventing unauthorized access. Organizations in fields where cloud operations are critical use it for regular audits and monitoring. Its capabilities in threat management are leveraged to maintain secure operations and compliance, especially where there is no dedicated security team.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.