We changed our name from IT Central Station: Here's why

Prisma Cloud by Palo Alto Networks OverviewUNIXBusinessApplication

Prisma Cloud by Palo Alto Networks is #1 ranked solution in Container Security Solutions, Cloud Workload Security Solutions, top Microsegmentation Software tools, and top Cloud Security Posture Management (CSPM) tools. PeerSpot users give Prisma Cloud by Palo Alto Networks an average rating of 8 out of 10. Prisma Cloud by Palo Alto Networks is most commonly compared to Microsoft Defender for Cloud: Prisma Cloud by Palo Alto Networks vs Microsoft Defender for Cloud. Prisma Cloud by Palo Alto Networks is popular among the large enterprise segment, accounting for 75% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 32% of all views.
What is Prisma Cloud by Palo Alto Networks?

The move to the cloud has changed all aspects of the application development lifecycle – security being foremost among them. Security and DevOps teams face a growing number of entities to secure as organizations adopt cloud native approaches. Ever-changing environments challenge developers to build and deploy at a frantic pace, while security teams remain responsible for the protection and compliance of the entire lifecycle. Prisma™ Cloud by Palo Alto Networks delivers complete security across the development lifecycle on any cloud, enabling you to develop cloud native applications with confidence.

Prisma Cloud by Palo Alto Networks was previously known as Palo Alto Networks Prisma Cloud, Prisma Public Cloud, RedLock Cloud 360, RedLock, Twistlock, Aporeto.

Prisma Cloud by Palo Alto Networks Buyer's Guide

Download the Prisma Cloud by Palo Alto Networks Buyer's Guide including reviews and more. Updated: January 2022

Prisma Cloud by Palo Alto Networks Customers

Amgen, Genpact, Western Asset, Zipongo, Proofpoint, NerdWallet, Axfood, 21st Century Fox, Veeva Systems, Reinsurance Group of America

Prisma Cloud by Palo Alto Networks Video

Archived Prisma Cloud by Palo Alto Networks Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Sr. Manager IT Operations at a tech vendor with 5,001-10,000 employees
Real User
Provides cross-cloud security but it isn't so user-friendly
Pros and Cons
  • "The product is quite good for providing multi-clouds or cross-cloud security from a single-pane -of-glass."
  • "Palo Alto should work on ease-of-use and the user-friendliness to be more competitive with some competing products."

What is our primary use case?

We use cloud solutions generally for client demos of products.  

How has it helped my organization?

It has not been implemented, but Prisma or Dome9 will provide us with better cloud security and less administration time for our cloud instances. 

What is most valuable?

RedLock is quite good for providing multi-clouds or cross-cloud security.  

What needs improvement?

In our testing, we have found the Check Point product CloudGuard Dome9 to be more user-friendly at this point. Palo Alto Prisma's interface was not as user-friendly. Palo Alto should work on this part of its solution to be more competitive with ease-of-use. I do not feel Palo Alto is short of any features, but if we compare the two side-by-side, I think the user interface for Palo Alto needs to be improved to make it at least as good as Dome9.  

For how long have I used the solution?

We just started evaluating it, so we have just been using it for a little more than a month doing some evaluations and proof of concept.  

What do I think about the stability of the solution?

The product is stable.  

What do I think about the scalability of the solution?

We have not tested scalability extensively to this point because our cloud accounts are not being used so much that it warrants scaling it up. We only dedicated a small amount of resources for the product at this point while exploring it.  

There are up to 10 users on RedLock in our company and there are never more than 10 at this point.  

How are customer service and technical support?

We worked with both the Palo Alto and Check Point technical support teams during our evaluations. So we were connected to the technical team at Palo Alto. Their technical support was excellent. The presales team was very proactive and helped us in every aspect we needed to resolve our queries during implementation and they provided knowledge to our team internally. The technical support from both vendors was very good. This was not a problem.  

Which solution did I use previously and why did I switch?

We have been using the native security solutions from each of the clouds or cloud service partners we deal with, but they have limited functionality. That is why we began to look into other options. 

How was the initial setup?

The initial setup was not too easy and yet not too complex. It was pretty good. The deployment took a couple of days. For deployment, it required only one person. For maintenance, it requires a team of engineers. We have a team with different roles and responsibilities. We have someone from the network team, we have someone from the infosec [information security] team, we have someone from the cloud team, and we have someone from our Unix team. So there is one person from each team who has been assigned roles and responsibilities with explorations of Prisma. The team monitors the system on a day-to-day basis and checks for threats and then, according to what they find, then they decide on any necessary course of action.  

What about the implementation team?

Our company did the deployment ourselves with an internal team. We did not use an integrator or consultant.  

Which other solutions did I evaluate?

We did not use any specific or dedicated cloud security product before evaluating the options we chose to review. Currently, we do not have any specific product that we purchased specifically for cloud security. Recently we came across Palo Alto Prisma Cloud Security and Check Point Cloud Guard Dome9 products and we chose to evaluate both and engage in POCs.  

We wanted to find some solution where we could see all our cloud accounts and manage them in one single pane of glass. When we used the native solutions that were in place through our cloud providers, we had to manage several different clouds by going to each individually. These dedicated products have everything for cloud security management in one place and we can monitor all our cloud activity from there. There is also the benefit that the functionality of dedicated products is more robust.  

Currently, we have stopped using RedLock. We are focusing on exploring Dome9 by Check Point. We have found it very easy to use and the interface is quite user-friendly.  

What other advice do I have?

The advice I would give to someone seriously considering these cloud solution products is to be careful with procedures you use while testing them. During the setup phase, there were not many challenges. But while integrating the cloud accounts, I would recommend the users initially provide only read-only access not read-write access, just as a precaution. The users should also be cautious not to expose cloud data to vendors like Dome9 or Palo Alto or whomever the vendor will be.  

On a scale from one to ten where one is the worst and ten is the best, I would rate the Palo Alto product overall as a seven-out-of-ten. Dome9 I would currently rate eight-out-of-ten. Palo Alto's rating could improve with enhancements to ease-of-use.  

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
DevOps Solutions Lead at a tech services company with 501-1,000 employees
MSP
Good runtime mechanism, and very good network mapping
Pros and Cons
  • "The runtime mechanism on the solution is very useful. It's got very good network mapping between containers. If you have more than one container, you can create a content data link between them."
  • "The innovation side of the solution could be more efficient and more detailed."

What is our primary use case?

We primarily use the solution to create a cluster or scenario, for runtime management on containers.

How has it helped my organization?

We have three containers in our organization. Two were legacy containers and we added a third. The solution helped with our DevOps pipeline and allowed us to inspect and analyze the product.

What is most valuable?

The runtime mechanism on the solution is very useful. It's got very good network mapping between containers. If you have more than one container, you can create a content data link between them.

What needs improvement?

I'm not sure about areas for improvement on the solution, however, I do think the compliance and dashboarding could be better.

The innovation side of the solution could be more efficient and more detailed.

For how long have I used the solution?

I've been using the solution for two months.

How was the initial setup?

The initial setup was reasonably complex. The container security makes it a complex implementation. If I were to rate the complexity out of ten I'd give it a seven.

What other advice do I have?

We use the cloud deployment model.

I'd rate the solution nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Learn what your peers think about Prisma Cloud by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
563,780 professionals have used our research since 2012.
CTO at Aymira Healthcare Technologies, LLC
Real User
Ensures compliance and keeps us free of bad actors
Pros and Cons
  • "The most valuable feature is that the rule set is managed and that it can be run on a regularly scheduled basis."
  • "The pricing for the solution needs improvement."

What is our primary use case?

The primary use case for this solution was to run the rule set for the CIS 20 framework and HIPAA compliance.

How has it helped my organization?

This solution will ensure that we've got a more secure environment, mitigating any sort of bad actors coming in and either destroying or disrupting the environment.

What is most valuable?

The most valuable feature is that the rule set is managed and that it can be run on a regularly scheduled basis.

What needs improvement?

The pricing for the solution needs improvement.

What do I think about the stability of the solution?

The stability of this solution is very good. Very favorable.

What do I think about the scalability of the solution?

We have four people involved with this solution. They are administrators and DevOps resources.

The solution is currently used across our entire environment. I bought licenses for one hundred hosts and I only have twenty-eight. So, there will be no incremental cost for me until I exceed one hundred hosts, which is a long way away.

How are customer service and technical support?

Technical support is very good. They have been very responsive to various requests in the past.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

How was the initial setup?

The initial setup was very straightforward. RedLock was very helpful in setting up the environment. The deployment took approximately two hours.

Two people are required for deployment and maintenance.

What about the implementation team?

We worked with a reseller. They are Rocus Networks out of Charlotte, North Carolina. We had a very good experience with them.

What's my experience with pricing, setup cost, and licensing?

Our licensing fees are $18,000 USD per year. There are no costs in addition to the standard licensing fees.

Which other solutions did I evaluate?

We evaluated the Dome9 solution in addition to this one. RedLock was selected based on Rocus' recommendation.

What other advice do I have?

This is a product for which I had a very specific need, and my security partner recommended it. This product is one of the leaders. I would, however, suggest that you do a POC before implementing this solution.

It has very good support in all of the cloud environments. I think that they offer a lot of functionality in supporting that space. I don't think that this product is perfect, but it fits my needs perfectly.

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Real User
Has provided us with insight into the dynamic topology of our containers

What is our primary use case?

Our primary use case for this solution is for container security and monitoring.

How has it helped my organization?

It has helped us understand the dynamic topology of our containers and manage security through the application of policies that our pipelines apply straight from Git.

What is most valuable?

The most valuable feature is the automated forensics.

What needs improvement?

I would like to see the inclusion of automated counter-attack, although this is probably illegal.

For how long have I used the solution?

More than one year.

What is our primary use case?

Our primary use case for this solution is for container security and monitoring.

How has it helped my organization?

It has helped us understand the dynamic topology of our containers and manage security through the application of policies that our pipelines apply straight from Git.

What is most valuable?

The most valuable feature is the automated forensics.

What needs improvement?

I would like to see the inclusion of automated counter-attack, although this is probably illegal.

For how long have I used the solution?

More than one year.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
ITCS user
Cloud Architect, Oracle ACE, Oracle DBA at Pythian
MSP
Helps secure our client's Linux workloads on any infrastructure, with end-to-end encryption
Pros and Cons
  • "The dynamic workload identity creation, attestation, and assignment is the best feature. In addition, the application dependency map across heterogeneous environments for compliance is a striking feature."
  • "More documentation with real-world use cases would be helpful."

What is our primary use case?

Our client needed a solution which would be a true implementation of the concept "Trust, but verify," and Aporeto fulfills that notion as it decouples security from network and infrastructure. It services microservices in a nifty and seamless way.

How has it helped my organization?

Aporeto has accelerated our client's expansion to the cloud. With Aporeto, they have secured their Linux workloads on any infrastructure with end-to-end encryption and have a path for modernizing with a security layer that is future-proofed.

What is most valuable?

The dynamic workload identity creation, attestation, and assignment is the best feature. In addition, the application dependency map across heterogeneous environments for compliance is a striking feature.

It integrates quite well with the AWS products as it uniquely fingerprints each workload. Aporeto is designed to combine metadata from the orchestration layer, the container, the operating system, and the AWS instance identity document. By combining these information sources, along with dynamic attributes such as image scanner inputs, Aporeto is designed to create a strong cryptographic identity for each workload. It authenticates and authorizes all network communications within a virtual private cloud (VPC), across VPCs independent of their region or availability zone, and across cloud environments.

What needs improvement?

More documentation with real-world use cases would be helpful. Another useful feature would be greater transparency and visibility into the security checks being implemented.

What do I think about the stability of the solution?

In AWS, it scales with the cloud and we have found no issues at all with the stability.

What do I think about the scalability of the solution?

Aporeto is now available in AWS where it efficiently deploys, manages, and secures applications at scale on various platforms including Kubernetes, Docker, Linux, and Mesos, among others.

What's my experience with pricing, setup cost, and licensing?

The purchasing process was easy and quick. It is a very economical solution.

We chose to procure this solution via AWS Marketplace because that's where we get all other solutions and to make sure it's supported by AWS.

What other advice do I have?

I would rate it as a nine out of ten, due to its cloud-facing features which fit in nicely with the whole cloud ecosystem.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Prisma Cloud by Palo Alto Networks Report and get advice and tips from experienced pros sharing their opinions.