We performed a comparison between Axis Security and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Secure Access Service Edge (SASE) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The solution is stable."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The way the access connectors work is valuable."
"I would give it an A-plus for securing access to our applications, devices, and network. It does an extremely good job. Our security folks have analyzed it and tried to find loopholes, but they found none."
"The most valuable part so far has been Axis Security's ability to create identity connections to various servers, allowing users to access them. By doing so, we've managed to replace any old or existing VPN access with Axis Security. We are slowly but surely getting rid of our traditional VPN."
"The entire suite and the entire ZTNA process are very valuable."
"The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can connect to the network. T"
"The solution improved the consistency of our security controls and the BCP. There has been a 20 percent reduction in TCO. Prisma Access also enabled us to deliver better applications by centralizing security management."
"The Autonomous Digital Experience Management (ADEM) offered by Palo Alto is a good reporting tool. It gives insights into how things are going within the network. It takes all the data from the users' endpoints and does an analysis, and it suggests changes as well."
"The solution has all its capabilities in a single cloud delivery platform which is great and it provides overall good protection."
"The visibility perspective is pretty cool. If I want to know how much data is being used for a specific project, I can look at how much data has been used, from which region, and which users have been connected. That visibility is very good so that I can see how many licenses we have and how many are used."
"It's much faster and more secure than legacy solutions. It is also quite stable and scalable as well. We are able to see all the traffic in one place."
"The tool's consolidation is pretty quick."
"Prisma's most valuable feature would be its ability to identify bad or risky configurations."
"I like it because it's very easy to use. You install the client and you have to know your gateway, but that's something we give to our users. Beyond that, it takes about three seconds to train them on how to use it. And it just works well. That's great for us because it means less administrative time."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"I would appreciate more automated learning capabilities or increased integration with other security tools, allowing us to establish automation."
"They need to improve the networking and security tools a little in the troubleshooting and 'bad-actor' areas to help us analyze security threats a little better. They have some things built-in, but I would like to see more advanced tools."
"I would like more detailed logging in the Axis Security interface."
"The support team should be more skilled in offering assistance."
"I would like more statistics about what's going on in terms of usage. There is little-to-no usage reporting. That's one thing we've requested, and I think they're working on it."
"The product's current price is an area of shortcoming where improvements are required."
"It's not very easy to use. Sometimes it's buggy and there are problems when doing updates. The user interface is okay, but some configuration items are difficult. I would like it to be less buggy and easier to configure, to better streamline the user experience."
"We would like to see improvements in the licensing; currently, Palo Alto provides 500 to 1000 licenses for users, and we want to see 1500 to 2000 licenses for one version."
"When we deploy firewall rules via Panorama, we find it's a little bit slow. We have a global environment and might have 100 gateways or VPNs in the cloud. When we deploy something, it tries to deploy it one-by-one, and that can be slow."
"Their next release should provide solutions for the mobile environment."
"I haven't seen any SD-WAN configuration capability. If Prisma Access would support SD-WAN, that would help... SD-WAN devices should be able to reach Prisma Access, and Palo Alto should support different, vendor-specific devices, not just Palo Alto devices, for SD-WAN configuration."
"My clients would like to see a more feature-rich product."
"Its security is good. Everything is good, but the way the dashboard responds can be improved. It takes time to implement a policy. If you change only two or three lines and push the policy to make the change work, it takes 20 to 30 minutes even for a small change. That is something very irritating from the implementation perspective."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Axis Security is ranked 15th in Secure Access Service Edge (SASE) with 5 reviews while Prisma Access by Palo Alto Networks is ranked 1st in Secure Access Service Edge (SASE) with 58 reviews. Axis Security is rated 9.6, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Axis Security writes "Easy to deploy, improved reliability and performance of our connectivity, and greatly reduced costs". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Axis Security is most compared with Zscaler Zero Trust Exchange, Netskope , Fortinet FortiGate SWG, Cato SASE Cloud Platform and Zscaler B2B, whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our Axis Security vs. Prisma Access by Palo Alto Networks report.
See our list of best Secure Access Service Edge (SASE) vendors, best Secure Web Gateways (SWG) vendors, and best Cloud Access Security Brokers (CASB) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.