We use the Bridgecrew, IaC, and CSPM domains.
Info Sec Engineer at a tech vendor with 10,001+ employees
Provides good policies and violation alerts and is easy to use
Pros and Cons
- "CSPM is very useful because it gives us good policies and violation alerts."
- "They need to improve the API gateway."
What is our primary use case?
How has it helped my organization?
Prisma Cloud has given us a good approach to view our security loopholes. Container security has also helped us.
What is most valuable?
CSPM is very useful because it gives us good policies and violation alerts. The solution is very good for IaC too.
What needs improvement?
The reporting should be much more refined.
They need to improve the API gateway.
Buyer's Guide
Prisma Cloud by Palo Alto Networks
November 2024
Learn what your peers think about Prisma Cloud by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,019 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Prisma Cloud for three years.
What do I think about the stability of the solution?
The stability is improving.
What do I think about the scalability of the solution?
The scalability is good. We can extend it to many cloud vendors.
How are customer service and support?
Palo Alto's support is good.
How would you rate customer service and support?
Positive
What other advice do I have?
The solution is good. It is easy to use, but Prisma keeps on releasing new features. So the console becomes a little bit typical. Auto-remediation is time-efficient.
The RSA conference is valuable to my organization. The conference has an impact on our organization's cybersecurity purchases sometimes. Overall, I would rate Prisma Cloud an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Consultant at a tech services company with 501-1,000 employees
Easy to set up and very user friendly with great reporting capabilities
Pros and Cons
- "Technical support is quite helpful."
- "The licensing is a bit confusing."
What is our primary use case?
When we did a POC, we realized that this product was able to give us insights into how consumers or services are activated. We could tell if, in certain cases, there was any kind of manual issues such as a misconfiguration. The solution is used to help us to reconfigure items and figure out what reconfiguration needs to be done, et cetera. Our target was to enhance the security portion of our AWS cloud.
What is most valuable?
The security features are quite good.
The monitoring part is excellent. It is able to completely monitor our users in order to see what the users are doing at what time and if the users are currently logged in from India, and after five minutes of seeing a user if they are then trying to log in from Singapore, for example. Of course, this would not be possible, and so we would know something was wrong. It can pick up questionable behavior that may have been missed.
The reporting is great.
It's very user-friendly. You can easily make customized dashboards as well.
We can easily restrict the users if we need to. We can even restrict them from accessing certain applications or services.
If anything tries to come in from a malicious IP, it will block it.
The initial setup is easy.
We've found the solution to be stable and reliable.
The solution does offer pretty good integration options.
Technical support is quite helpful.
What needs improvement?
The remediation part could be better. It should be able to automatically remediate on the basis of its artificial intelligence. If there are alerts, it should directly act and surround the malicious threat with a container or something. Instead of waiting on approval, it should immediately act. There should be no need for manual input when there is a threat on hand.
The ability to scale is limited as it is a SAS product.
The licensing is a bit confusing.
For how long have I used the solution?
We've used the solution for a while. Previously, it was RedLock Solutions and we were using it since it was known as RedLock. That's around let's say two years now. Then, Palo Alto bought it, and we now use it under the new name.
What do I think about the stability of the solution?
The stability and reliability are excellent. There are no bugs or glitches. It does not crash or freeze. it's great.
What do I think about the scalability of the solution?
The scalability isn't infinite. It's limited.
That said, we haven't really tested it as we haven't added any users or anything into the solution yet.
How are customer service and technical support?
We have found the technical support to be helpful and responsive. Originally, when we needed assistance with integrating it into our AWS cloud, we contact them and they helped us immediately. It was a very positive experience. We were very satisfied.
How was the initial setup?
The initial setup is very easy. It's not overly complex. A company should be able to handle it without any issues.
What's my experience with pricing, setup cost, and licensing?
We pay a licensing fee on a yearly basis.
It is not costly. However, the way it is priced is based on the number of incentives. The problem is, what is the number of incentives? We don't know. They seem to do it by the number of workloads, however, we're unclear as to what defines a workload. They need to improve on the licensing front. They need to be more clear about the whole thing.
Which other solutions did I evaluate?
I've never evaluated any other services.
What other advice do I have?
We are Palo Alto partners.
I'd advise that companies that get big and have a lot of servers or critical applications in their cloud invest in this solution.
I would rate the solution at a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Prisma Cloud by Palo Alto Networks
November 2024
Learn what your peers think about Prisma Cloud by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,019 professionals have used our research since 2012.
Works
Has provided us with insight into the dynamic topology of our containers
Pros and Cons
- "It has helped us understand the dynamic topology of our containers, and manage security through the application of policies that our pipelines apply straight from Git."
- "I would like to see the inclusion of automated counter-attack, although this is probably illegal."
What is our primary use case?
Our primary use case for this solution is for container security and monitoring.
How has it helped my organization?
It has helped us understand the dynamic topology of our containers and manage security through the application of policies that our pipelines apply straight from Git.
What is most valuable?
The most valuable feature is the automated forensics.
What needs improvement?
I would like to see the inclusion of automated counter-attack, although this is probably illegal.
For how long have I used the solution?
More than one year.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
DevOps Solutions Lead at a tech services company with 501-1,000 employees
Good runtime mechanism, and very good network mapping
Pros and Cons
- "The runtime mechanism on the solution is very useful. It's got very good network mapping between containers. If you have more than one container, you can create a content data link between them."
- "The innovation side of the solution could be more efficient and more detailed."
What is our primary use case?
We primarily use the solution to create a cluster or scenario, for runtime management on containers.
How has it helped my organization?
We have three containers in our organization. Two were legacy containers and we added a third. The solution helped with our DevOps pipeline and allowed us to inspect and analyze the product.
What is most valuable?
The runtime mechanism on the solution is very useful. It's got very good network mapping between containers. If you have more than one container, you can create a content data link between them.
What needs improvement?
I'm not sure about areas for improvement on the solution, however, I do think the compliance and dashboarding could be better.
The innovation side of the solution could be more efficient and more detailed.
For how long have I used the solution?
I've been using the solution for two months.
How was the initial setup?
The initial setup was reasonably complex. The container security makes it a complex implementation. If I were to rate the complexity out of ten I'd give it a seven.
What other advice do I have?
We use the cloud deployment model.
I'd rate the solution nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Prisma Cloud by Palo Alto Networks Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Cloud Security Posture Management (CSPM) Web Application Firewall (WAF) Container Security Cloud Workload Protection Platforms (CWPP) Cloud-Native Application Protection Platforms (CNAPP) Data Security Posture Management (DSPM)Popular Comparisons
Microsoft Defender for Cloud
Zscaler Zero Trust Exchange Platform
SentinelOne Singularity Cloud Security
Tenable Security Center
AWS Security Hub
VMware Aria Automation
Orca Security
CrowdStrike Falcon Cloud Security
Skyhigh Security
Lacework FortiCNAPP
Check Point CloudGuard CNAPP
Trend Vision One - Cloud Security
Buyer's Guide
Download our free Prisma Cloud by Palo Alto Networks Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between Aqua Security and Twistlock?
- What do you think of Aqua Security vs Prisma Cloud?
- How is Prisma Cloud vs Azure Security Center for security?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What is the minimum security features set required for Cloud Backup and Storage Software?
- What are your best practices to achieve DevOps security in the cloud?
- Is there a single tool to unify cloud compliance reporting?
- What is Unified Cloud Security? Can you define the scope and use cases of the term?
- What is an Application Security Posture Management (ASPM)?
- Which solutions offer a preventive, proactive approach to cloud security posture management?