We performed a comparison between Prevasio and Prisma Cloud by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Cloud Security Posture Management (CSPM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
"PingSafe's most valuable feature is its unified console."
"PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"As a frequently audited company, we value PingSafe's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security."
"The management console is highly intuitive to comprehend and operate."
"The UI is very good."
"The firewall policy summarization is the most valuable feature. It helps us to cross-check the firewall ruleset. That's the main purpose of it. And of course, it monitors changes of the firewall policy. It provides full visibility into the risk involved in firewall change requests. It helps us to check for any integrity issues and conflicts with other rulesets, and of course the compliance."
"The optimizations are the most useful aspect because most customers have a very unmanaged network with a lot of rules. We use a lot of the optimizations in our reports for improving firewall rules."
"The most valuable feature is the automation that can be accomplished by using scripts. If we didn't have AlgoSec, I would have to do everything manually."
"The workflow and the fact that I can follow up on a request that I've created and clearly see the status it is in are the most valuable features of this solution. When I need things to move on, for example, if the security guys didn't look at the request or the implementation is not going as it should, then I can contact people. There is a mechanism in there that clearly indicates the service level agreement we have for implementation. We can see if it is being attained."
"We have Check Point, Palo Alto, and FortiGate firewalls, and it integrates pretty seamlessly with these firewalls. We have had no issues so far."
"We have used the solution to implement and manage microsegmentation initiatives. That is the whole point of modeling towards, "Hey, how will this work for a specific situation in the end?" I think it's a great solution because a lot of companies are not just going to the cloud, but microsegmentation and service-delivered products. So, I feel like it is very capable and comparatively better than its peers, if not equal."
"The most unique feature is the ability to help fix any gaps or mismatches in the configuration of the firewall."
"Because we get about 60 to 70 rules to deploy a week during the firewall maintenance window, we might create some duplicate rules or open duplicate ports. AlgoSec has become very helpful whenever we need to find out the nodes or subnets that have already been created, then we don't need to create the duplicate subnet of that particular IP address."
"In addition to that, I can get a snapshot of what I deemed were the priority vulnerabilities, whether it was identity access management, key rotation, or secrets management. Whatever you deem to be a priority for mitigating threats for your environment, you can get that as a snapshot."
"The two most valuable features are container security and the capability to discover workloads."
"The product is quite good for providing multi-clouds or cross-cloud security from a single-pane -of-glass."
"The ability to monitor the artifact repository is one of the most valuable features because we have a disparate set of development processes, but everything tends to land in a common set of artifact repositories. The solution gives us a single point where we can apply security control for monitoring. That's really helpful."
"As a pure-play CSPM, it is pretty good. From the data exposure perspective, Prisma Cloud does a fairly good job. Purely from the perspective of reading the conflicts, it is able to highlight any data exposures that I might be having."
"The application visibility is amazing. For example, sometimes we don't know what a particular custom port is for and what is running on it. The visibility enables us to identify applications, what the protocol is, and what service is behind it. Within Azure, it is doing a great job of providing visibility. We know exactly what is passing through our network. If there is an issue of any sort we are able to quickly detect it and fix the problem."
"Prisma Cloud's most important feature is its auto-remediation."
"Prisma Cloud has enabled us to take a very strong preventive approach to cloud security. One of the hardest things with cloud is getting visibility into workloads. With Prisma Cloud, you can go in and get that visibility, then set up policies to alert on risky behavior, e.g., if there are security groups or firewall ports open up. So, it is very helpful in preventing configuration errors in the cloud by having visibility. If there are issues, then you can find them and fix them."
"The cost has the potential for improvement."
"When we get a new finding from PingSafe, I wish we could get an alert in the console, so we can work on it before we see it in the report. It would be very useful for the team that is actively working on the PingSafe platform, so we can close the issue the same day before it appears in the daily report."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"Customized queries should be made easier to improve PingSafe."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"PingSafe's current documentation could be improved to better assist customers during the cluster onboarding process."
"We work with multiple security vendors. It's rather difficult to integrate the vendors. AlgoSec is a platform that hasn't really been developed as much as we would like to just because of its complexity to set up. If it was easy to set up and easy to get integrations with other companies, then we would be doing it. But the thought is that we are relatively stretched thin in our team as it is and the complexity of configuring AlgoSec doesn't make it any easier."
"Now that we've moved to the VM it is more stable and independent of hardware."
"Integration with Oracle on the cloud is not supported. I would also like to see integrations with network devices in Layer 2."
"AlgoSec cannot be integrated with solutions that require two-step or multi-factor authentication. Embedding multi-factor authentication capability into the solution would be a valuable feature."
"In the new version H32, there are many, many bugs."
"When we send multiple requests across at once, sometimes it causes errors and FireFlow gets stuck. In cases like this, we have to go back in and fix it."
"The analysis part can be improved when I make a flow request. There should be a clear analysis of which metric part needs to be opened and which firewalls will be opened. It should give you a bit more graphical visibility about these."
"The technical support response time is low. This might be due to the coronavirus pandemic situation, but I am not getting full support when working with them."
"The deployment and onboarding are plug-and-play, but somewhat hard to handle in terms of integration with external operations tools. The product design isn't up to the current standard. I would recommend having higher standards in terms of integration with other tools, especially operationalized tools."
"I have some challenges customizing and personalizing some of the capabilities in the CSPM in terms of new policies and services. We have to reconfigure and rebuild the CSPM."
"There needs to be a mechanism that allows me to manually configure compliance more easily."
"While the code security feature has undergone recent enhancements, there is room for improvement in terms of its cost module."
"I think Prisma Cloud could improve its preventive governance policy and CWP run time modules."
"The dashboard can be created at the user level instead of the cloud account level, which will help save time."
"The visibility on the SIEM needs to be streamlined so we can get the data without any issues."
"Palo Alto should work on ease-of-use and the user-friendliness to be more competitive with some competing products."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
Prevasio is ranked 19th in Cloud Security Posture Management (CSPM) with 10 reviews while Prisma Cloud by Palo Alto Networks is ranked 1st in Cloud Security Posture Management (CSPM) with 82 reviews. Prevasio is rated 8.8, while Prisma Cloud by Palo Alto Networks is rated 8.4. The top reviewer of Prevasio writes "Identifies vulnerable rules, brings standardization, and provides overall visibility into our environment". On the other hand, the top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". Prevasio is most compared with , whereas Prisma Cloud by Palo Alto Networks is most compared with Wiz, Microsoft Defender for Cloud, Aqua Cloud Security Platform, AWS Security Hub and CrowdStrike Falcon Cloud Security. See our Prevasio vs. Prisma Cloud by Palo Alto Networks report.
See our list of best Cloud Security Posture Management (CSPM) vendors and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.