We changed our name from IT Central Station: Here's why
2019-05-15T05:16:00Z

What needs improvement with Prisma SaaS by Palo Alto Networks?


Please share with the community what you think needs improvement with Prisma SaaS by Palo Alto Networks.

What are its weaknesses? What would you like to see changed in a future version?

ITCS user
Guest
88 Answers

author avatar
Top 20Real User

Prisma would be a stronger solution if it could aggregate resources by project or by application. So say we have an application we've developed in AWS and five applications we've developed in Azure. The platform will group it according to those applications, but it's based on the tags we use in Azure, which means I have to rely on development teams to tag resources properly. If they don't do that, it doesn't group them properly in the platform. It would be nice if we could group the application according to the platform itself instead of relying on the development team to tag correctly in the cloud environment. My development team for one project might be different from the development team in another project. If I see a resource that needs to be fixed or changed, I need to know what project that resource is associated with. Ideally, I don't want to have to go into Azure and try to figure that out. So if I could tag it using the platform itself rather than relying on the tags that the development team uses in Azure, that would be extremely helpful. I wouldn't say Prisma is particularly useful for protecting data. It's hard to say. We're not looking at the data of the resources, so to speak, using Prisma. It's more like the resources that hold the data.

2021-10-31T20:47:00Z
author avatar
Top 5LeaderboardReseller

I would like to see a hybrid model which has API plus in-line security, where the user's data is controlled via an API call and also controlled in-line.

2021-06-05T14:55:44Z
author avatar
Real User

We are using the SaaS offering. We use our applications for microservices. We use Twistlock to scan containers, and it displays these results in Prisma, which is a good feature because we can see vulnerabilities with respect to these containers. We can see everything in a very detailed manner. However, when you have different environments for a single application, such as DEV, QA, PROD, and TEST, all these environments run multiple containers, which can lead to a very high number of containers. In such a scenario, it shows you the alerts for all those containers that have vulnerabilities. If you show the results of all the containers that share the same image, it is not going to add any value. Therefore, they should narrow down the alerts based on a container. It should show information for a single container. Otherwise, the person who is looking at the results gets the impression that he has to fix all these issues. This is something that they can improve.

2021-04-10T09:28:11Z
author avatar
Top 20Real User

My clients would like to see a more feature-rich product.

2021-04-08T12:51:36Z
author avatar
Top 20Reseller

The price can be reduced to make it more competitive.

2020-06-07T09:09:01Z
author avatar
Real User

Overall it is actually very good. I haven't yet had any issue at all. One thing that would help is if we could get a guide. With Cisco, for example, you can just type the problem regarding your Cisco product and you will easily get your solution. In Palo Alto, however, it's not easy to find the solutions.

2019-09-01T08:49:00Z
author avatar
Real User

They automatically update and they should give us time to fully understand what they're updating so that we can make sure it doesn't impact production.

2019-05-16T06:50:00Z
author avatar
Top 20Real User

There are a lot of cloud-based applications that are supported, such as Box, Skype, Google Drive, and SharePoint, but there are many more than have not been totally integrated. They cannot use in-house apps because they are not generic services. I would like to see support for custom applications. There are also certain storage services that are not integrated, like AWS S3. If the services are created by the customer then it would be very nice to have those protected too. Right now, this is a data at rest CASB, but it would be nice if it included features such as forward proxy or reverse proxy. It would be able to provide the OTP to those gateways and anyone who can integrate with Aperture can send the data to have it authenticated, via Aperture to the cloud, rather than just scanned. Essentially, if it can be made to act as an auth server, to automatically handle the forward proxy CASB, it would be good.

2019-05-15T05:16:00Z
Learn what your peers think about Prisma SaaS by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
564,643 professionals have used our research since 2012.