We performed a comparison between SUSE NeuVector and Wiz based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: SUSE NeuVector features an informative user interface and support for ISO certification checks. Wiz users like the user-friendly dashboards and risk prioritization. Users say SUSE NeuVector could be improved by expanding its scanning capabilities to include IaaS and virtual machines and easier integration. On the other hand, Wiz should focus on improving log integrations and reporting capabilities. Reviewers also want more visibility into EKS and Kubernetes containers.
Service and Support: SUSE NeuVector users value assistance from their support team, who are described as helpful and knowledgeable. However, some users said the overall process is complicated. Wiz customers commend the excellent support and accessible representatives. They also appreciate the strong post-sales support offered by Wiz.
Ease of Deployment: Users have reported mixed experiences with the initial setup of SUSE NeuVector, with some finding it to be complex and challenging. The initial setup of Wiz is considered to be straightforward and quick.
Pricing: SUSE NeuVector charges annual licensing fees, and it's considered cheaper than other solutions. Wiz provides a straightforward pricing structure. However, some were concerned about possible price fluctuations, and other users find Wiz to be pricier than alternatives.
ROI: SUSE NeuVector is beneficial for high-risk industries like financial services, while Wiz offers immediate advantages like improved asset management and vulnerability identification. Additionally, Wiz provides continuous value with new features and centralized investigations.
Comparison Results: SUSE NeuVector is preferred over Wiz because of its extensive features, informative user interface, and support for multiple clusters. It excels in performance, deployment, and cost.
"Cloud Native Security is user-friendly. Everything in the Cloud Native Security tool is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features."
"We use the infrastructure as code scanning, which is good."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"The management console is the most valuable feature."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"The solution is a good alerting tool."
"The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software."
"The agentless vulnerability scanning is great."
"When it comes to the price, we got a really good deal from the vendor instantly."
"The most valuable feature of SUSE NeuVector is its run-time security."
"The features of image scanning and anti-malware are really valuable."
"The tool's deployment is simple. Also, I am impressed with its risk capabilities."
"The most valuable feature of SUSE NeuVector is the performance, deployment, and cost."
"The initial setup is quite good, it's straightforward."
"The UI has a lot of features."
"I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we have and the applications installed on each. I like Wiz's security graph because you can use it to see the whole organization even if you have multiple accounts."
"The solution is very user-friendly."
"The CSPM module has been the most effective. It was easy to deploy and covered all our accounts through APIs, requiring no agents. Wiz provides instant visibility into high-level risks that we need to address."
"Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed."
"The Automation tab is an add-on that doesn’t work properly. They provide a list of scripts that don’t work and I have asked support to assist but they won’t help. When running on various endpoints the script doesn’t work and if it does, it’s only a couple. There are a lot of useful scripts that would be beneficial to run forensics, event logs, and process lists running on the endpoint."
"They could generally give us better comprehensive rules."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"PingSafe can improve by eliminating 100 percent of the false positives."
"Scanning capabilities should be added for the dark web."
"I would say that this solution should improve monitoring and reporting. I would also like to see more integrations so that we could essentially make it a part of a developing pipeline."
"The image-scanning features need improvement."
"SUSE NeuVector could improve by increasing its visibility into other elements of the DevSecOps pipeline. Additionally, scanning around infrastructure would be helpful."
"The documentation needs to improve a bit."
"The tool should offer seamless integration of other security tools while in a hybrid environment."
"We are also working with IaaS VMS, but NeuVector doesn't support virtual machines."
"SUSE NeuVector should provide more security protection rules and better container image scanning."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"Wiz's reporting capabilities could be refined a bit. They are making headway on that, but more executive-style dashboards would be nice. They just implemented a community aspect where you can share documents and feedback. This was something users had been requesting for a while. They are listening to customer feedback and making changes."
"The solution's container security could be improved."
"Given the level of visibility into all the cloud environments Wiz provides, it would be nice if they could integrate some kind of mechanism to better manage tenants on multiple platforms. For example, let's say that some servers don't have an application they need, such as an antivirus. Wiz could include an API or something to push those applications out to the servers. It would be great if you could remedy these issues directly from the Wiz platform."
"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform."
"The reporting isn't that great. They have executive summaries, but it's only a compliance report that maps all current issues to specific controls. Whether you look at one subscription or project, regardless of the size, you will get a multipage report on how the issues in that account map to that control. Our CSO isn't going to read through that. He won't filter that out or show that to his leadership and say, "Here's what we're doing." It isn't a helpful report. They're working on it, but it's a poor executive summary."
"The only thing that needs to be improved is the number of scans per day."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
SUSE NeuVector is ranked 19th in Container Security with 7 reviews while Wiz is ranked 2nd in Container Security with 12 reviews. SUSE NeuVector is rated 7.8, while Wiz is rated 9.2. The top reviewer of SUSE NeuVector writes "Good value for money; great for policy management". On the other hand, the top reviewer of Wiz writes "Multiple features help us prioritize remediation, and agentless implementation reduces overhead". SUSE NeuVector is most compared with Prisma Cloud by Palo Alto Networks, Sysdig Falco, Red Hat Advanced Cluster Security for Kubernetes, Aqua Cloud Security Platform and Trivy, whereas Wiz is most compared with Prisma Cloud by Palo Alto Networks, Orca Security, Microsoft Defender for Cloud, AWS Security Hub and Lacework. See our SUSE NeuVector vs. Wiz report.
See our list of best Container Security vendors and best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.