Top 8 Cloud Workload Security Tools
Prisma Cloud by Palo Alto NetworksCheck Point CloudGuard Posture ManagementMorphisec Breach Prevention PlatformAzure Security CenterGuardicore CentraCheck Point Harmony Email & OfficeCisco Secure WorkloadIllumio Adaptive Security Platform
As a pure-play CSPM, it is pretty good. From the data exposure perspective, Prisma Cloud does a fairly good job. Purely from the perspective of reading the conflicts, it is able to highlight any data exposures that I might be having.
The dashboard is intuitive. You know if you're compliant or not, and then it gives you a remediation plan.
Auto remediation is a very effective feature that helps ensure less manual intervention.
Morphisec Guard enables us to see at a glance whether our users have device control and disk encryption enabled properly. This is important because we are a global company operating with multiple entities. Previously, we didn't have that visibility. Now, we have visibility so we can pinpoint some locations where there are machines that are not really protected, offline, etc. It gives us visibility, which is good.
We saw improvement from a regulatory compliance perspective due to having a single dashboard.
One important security feature is the incident alerts. Now, with all these cyberattacks, there are a lot of incident alerts that get triggered. It is very difficult to keep monitoring everything automatically, instead our organization is utilizing the automated use case that we get from Microsoft. That has helped bring down the manual work for a lot of things.
The most valuable feature is the visibility of processes and connections.
From day one, you get threat intelligence. It will immediately block active threats, which has been useful.
We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).
The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user.
The most valuable feature is micro-segmentation, which is the most important with respect to visibility.
The most valuable feature of this solution is security.
The flexibility of the solution is its most valuable feature.
It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation.