We performed a comparison between Prisma Cloud by Palo Alto Networks and SUSE NeuVector based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Prisma Cloud by Palo Alto Networks is preferred over SUSE NeuVector. Users appreciate Prisma Cloud's comprehensive visibility and management capabilities. The solution stands out for its ability to provide security across multi- and hybrid-cloud environments, making it a popular option for cloud security and compliance management.
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"The solution is a good alerting tool."
"The UI is very good."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"My favorite feature is Storyline."
"The solution will streamline and minimize manual efforts."
"I like Prisma's ability to integrate with other tools. We can integrate it with Jira so that when Prisma triggers an alert, it opens a ticket in Jira. That was a big selling point for the product. There's a feature called the guest custom template that allows you to trigger alerts in Jira based on the template. That can also be added as a feature on Jira."
"The two most valuable features are container security and the capability to discover workloads."
"One of the main reasons we like Prisma Cloud so much is that they also provide an API. You can't expect to give someone an account on Prisma Cloud, or on any tool for that matter, and say, "Go find your things and fix them." It doesn't work like that... We pull down the information from the API that Prisma Cloud provides, which is multi-cloud, multi-account—hundreds and hundreds of different types of alerts graded by severity—and then we can clearly identify that these alerts belong to these people, and they're the people who must remediate them."
"The application visibility is amazing. For example, sometimes we don't know what a particular custom port is for and what is running on it. The visibility enables us to identify applications, what the protocol is, and what service is behind it. Within Azure, it is doing a great job of providing visibility. We know exactly what is passing through our network. If there is an issue of any sort we are able to quickly detect it and fix the problem."
"It has improved the overall collaboration between SecOps and DevOps. Now, instead of asking people to do something, it is a default offering in the CI/CD. There is less manual intervention and more seamless integration. It is why we don't have many dependencies across many teams, which is definitely a better state."
"The most valuable feature is its cloud security posture management."
"Integrating with a CI/CD pipeline and incorporating a vulnerability assessment process are highly effective features, especially when combined with runtime protection."
"The tool's deployment is simple. Also, I am impressed with its risk capabilities."
"The UI has a lot of features."
"The initial setup is quite good, it's straightforward."
"When it comes to the price, we got a really good deal from the vendor instantly."
"The most valuable feature of SUSE NeuVector is the performance, deployment, and cost."
"The most valuable feature of SUSE NeuVector is its run-time security."
"The features of image scanning and anti-malware are really valuable."
"When you find a vulnerability and resolve it, the same issue will not occur again. I want PingSafe to block the same vulnerability from appearing again. I want something like a playbook where the steps that we take to resolve an issue are repeated when that issue happens again."
"We had a glitch in PingSafe where it fed us false positives in the past."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"There is a bit of a learning curve for new users."
"The Automation tab is an add-on that doesn’t work properly. They provide a list of scripts that don’t work and I have asked support to assist but they won’t help. When running on various endpoints the script doesn’t work and if it does, it’s only a couple. There are a lot of useful scripts that would be beneficial to run forensics, event logs, and process lists running on the endpoint."
"Customized queries should be made easier to improve PingSafe."
"We'd like to have better notifications. We'd like them to happen faster."
"They need to improve the API gateway."
"The user interface should be improved and made easier."
"They can improve the integrations into the SDLC lifecycle."
"Palo Alto should work on ease-of-use and the user-friendliness to be more competitive with some competing products."
"The challenge that Palo Alto and Prisma have is that, at times, the instructions in an event are a little bit dated and they're not usable. That doesn't apply to all the instructions, but there are times where, for example, the Microsoft or the Amazon side has made some changes and Palo Alto or Prisma was not aware of them. So as we try to remediate an alert in such a case, the instructions absolutely do not work. Then we open up a ticket and they'll reply, "Oh yeah, the API for so-and-so vendor changed and we'll have to work with them on that." That area could be done a little better."
"It can be too expensive for small companies."
"A couple of exporting functionalities should be more user-friendly because if I want to export something, I can get a lot of data visible to that particular CSV."
"The UI is good, however, they could improve the experience."
"We are also working with IaaS VMS, but NeuVector doesn't support virtual machines."
"The image-scanning features need improvement."
"The tool should offer seamless integration of other security tools while in a hybrid environment."
"SUSE NeuVector should provide more security protection rules and better container image scanning."
"SUSE NeuVector could improve by increasing its visibility into other elements of the DevSecOps pipeline. Additionally, scanning around infrastructure would be helpful."
"The documentation needs to improve a bit."
"I would say that this solution should improve monitoring and reporting. I would also like to see more integrations so that we could essentially make it a part of a developing pipeline."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
Prisma Cloud by Palo Alto Networks is ranked 1st in Container Security with 82 reviews while SUSE NeuVector is ranked 19th in Container Security with 7 reviews. Prisma Cloud by Palo Alto Networks is rated 8.4, while SUSE NeuVector is rated 7.8. The top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". On the other hand, the top reviewer of SUSE NeuVector writes "Good value for money; great for policy management". Prisma Cloud by Palo Alto Networks is most compared with Wiz, Microsoft Defender for Cloud, Aqua Cloud Security Platform and AWS Security Hub, whereas SUSE NeuVector is most compared with Sysdig Falco, Aqua Cloud Security Platform, Red Hat Advanced Cluster Security for Kubernetes, Sysdig Secure and Snyk. See our Prisma Cloud by Palo Alto Networks vs. SUSE NeuVector report.
See our list of best Container Security vendors and best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.