We use the compliance and vulnerability management modules. We are a bank and have certain controls in place. My business unit is cloud-only, and we need to enforce controls, and for audit purposes, we need to collect evidence of control enforcement. We have a number of controls around cloud resources. We configure Prisma to enforce those controls pretty automatically. Prisma generates evidence of the controls that we can present to auditors when we are audited. If we didn't solve this problem, we could lose our license.
Prisma Cloud (Annual Contract)
Palo Alto NetworksExternal reviews
External reviews are not included in the AWS star rating for the product.
Automation and integration capabilities of Prisma have allowed us to save a lot of engineer time
What is our primary use case?
How has it helped my organization?
It's hard for me to say how Prisma has improved our organization because it was implemented before I joined. But given the number of security controls that have been automated with Prisma, we have managed to achieve a fair amount of manual cost reduction for our control testers. And the automation and integration capabilities of Prisma have allowed us to save a lot of engineer time on evidence. Without Prisma, we would have to do all these things manually. Overall, it results in a huge FTE reduction.
With the number of controls that need to be tested, we would be talking about a team of around 100 people. With the Australian salaries, Prisma is probably saving us $1,000,000 to $2,000,000 a year.
What is most valuable?
The framework to configure controls is pretty good; it's pretty sophisticated. We can implement a fair amount of testing for a fair number of controls.
It's vulnerability management is quite good, and its integration functionality is something that we have found to be pretty capable.
We also use Twistlock for container security, which is good.
And Prisma Cloud's security automation capabilities are quite good. We use the periodic scanners, and we feed Prisma filings into our control evidence management system. They tick all the boxes for us.
What needs improvement?
One thing that is missing is Cloud Run runtime security—serverless. That would be great to have in the tool. It's not that easy to have Cloud Run in specific environments.
We have also found that Google Security Command Center has a little bit better coverage for GCP because it's native. That's why we pay for both tools. But ideally, we should only need one tool. Prisma Cloud's coverage of GCP is okay, but a little better coverage would be better.
Our cloud environment is complex, and Prisma doesn't cover all aspects of it. We don't rely on Prisma for any kind of security discovery. We just rely on it as a control-test and automation tool.
We get a few alerts in Prisma, and it allows us to trace any violations back to the source. It's a pretty straightforward interface.
Another thing that we have found useful with Prisma is its Jira integration. When our integration finds a new alert, it creates a ticket in Jira, so it's fully visible and tracked, appearing in all the dashboards.
For how long have I used the solution?
I joined this branch of the bank six months ago, and Prisma is my portfolio now.
What do I think about the stability of the solution?
It's stable enough. I can't remember any outages of Prisma Cloud.
What do I think about the scalability of the solution?
It's a SaaS service and is licensed both for our team and for the enterprise. On our side, there are 1,000-plus user licenses. We have five or six integration points, so in that regard, it's not humongous.
We are growing extremely quickly, and Prisma Cloud provides all the required services without any need for us to do anything to scale. It's pretty elastic. We'll probably grow by 10 times in the next couple of years. So far, I don't have any doubts that Prisma will support us.
How are customer service and support?
I've never dealt with their technical support. Prisma Cloud just works.
Which solution did I use previously and why did I switch?
Our bank itself is huge and uses all sorts of solutions. My business unit is quite young, it's only three years old, and I don't think there were any solutions in this space.
How was the initial setup?
Deploying it was pretty straightforward compared to other tools. We implemented a fair number of compliance rules pretty quickly. I recently participated in some integration activities, and integration-wise, it was very straightforward.
As for maintenance on our side, there really isn't any. We periodically need to review the controls being tested and the control automation, to make sure that they're aligned with changes in the controls. Other than that, it's pretty maintenance-free.
What was our ROI?
We have managed to save a fair amount of money and effort in hiring manual testers. That's what automation does for us.
What's my experience with pricing, setup cost, and licensing?
I wouldn't mind if it were cheaper. We are spending a fair amount of money on Prisma Cloud. It's probably okay, but, funnily enough, banks don't have money. Periodically, we have cycles of cost-cutting, so if we could save on Prisma Cloud, that would be great.
What other advice do I have?
We don't use Prisma for build and deploy, we use another set of tools. Right now, we are doing our internal due diligence to figure out if we can replace all of those with a single tool, whether it's Prisma or any other tool. We don't know at the moment.
It's very hard to attribute any kind of runtime alert reduction to Prisma Cloud as we use a whole zoo of tools. Prisma is just one piece of the puzzle. We don't have too many runtime alerts thanks to the joint work between our build tools, deployment prevention security tools, and Prisma.
While it's a good tool, you need to be mindful of serverless because serverless runtime security is tricky and, unfortunately, Prisma doesn't do too much there. Other than that, it's a good tool.
Prompt support with good security and automation capabilities
What is our primary use case?
We primarily use the solution to ensure coverage of compliance. It's also used for security. It covers my workload, infrastructure, and applications.
How has it helped my organization?
It's improved the organization by providing vulnerability assessments. Having those assessment capabilities helps us assess the security vulnerabilities in cloud environments. Automation also helps us identify and remediate security weaknesses.
What is most valuable?
We have been using the solution to improve out posture management and network security, as well as identity security. This is important for us as these are the main pillars of our enterprise. It's ensuring everything we do remains seamless.
The product provides very good network security.
The support has been very prompt.
It provides security across multi-cloud and hybrid environments. The offering is very comprehensive. I'm able to have a strong security posture and it helps me take care of and protect my workloads. The network security is strong. It gives me complete traceability.
The automation depends on the technological stack, however, it helps with identifying vulnerabilities. If there is a violation happening, I can see it - plus it helps put in preventative measures. It helps me to identify issues in cloud deployments and also gives a prioritized list to help me maintain my operational efficiency. I can scan and assess weaknesses and have continuous monitoring and fixing with automation of remediation. We were able to realize benefits on day one using Prisma since we were able to see results immediately in terms of operational efficiency.
Prisma offers robust security features and seamless integration with AWS. It has complete capabilities, so I don't have to run my automated cloud resources while ensuring a proxy approach to cloud security.
The agent provides us with more security options. We can also easily integrate seamlessly with our CI/CD pipeline. It's simple. It's plug-and-play.
Prisma offers a single tool to protect all of our cloud resources and applications without having to manage and reconcile security and compliance reports. It's complete. We have everything under one single entity while fulfilling our compliance needs.
The solution provides risk clarity at runtime and across the entire pipeline, showing you issues as they are discovered. It can block according to our complex requirements.
With the increased operational efficiency, I am facing less downtime. It's reduced runtime alerts by two to three hours. It's also reduced alert investigation time.
We've been able to save money. We're getting a good return on investment. We're saving about 20 hours of work a week.
What needs improvement?
It would be ideal if they could somehow reduce the deployment time. It also required a skilled person to implement.
For how long have I used the solution?
I've been using the solution for three years.
What do I think about the stability of the solution?
We've had no issues with the stability.
What do I think about the scalability of the solution?
We only use the solution in one location. About 400 people use it right now.
We haven't had any issues with scaling.
How are customer service and support?
Support is prompt. We are pleased with the level of service.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution.
How was the initial setup?
It takes a while to deploy. It took us a week to deploy the solution.
Our goal was to ensure the minimum amount of downtime during the process. Two people were involved in the setup process.
Maintenance is required on a monthly basis.
What about the implementation team?
We had a consultant help us with the implementation.
What was our ROI?
We have witnessed an ROI with work savings of about 20 hours.
What's my experience with pricing, setup cost, and licensing?
I'm not sure of the exact cost of the solution.
Which other solutions did I evaluate?
We have looked at other options on the market. We did look at Microsoft Defender and Sentinel One. They both lacked the features we needed.
What other advice do I have?
We're Prisma Cloud customers.
I'd rate the solution eight out of ten.
It's a very good product if you look at the market right now. It offers all types of features, including cloud security, workflow protection, etc. It's all bundled together for convenience.
Good monitoring and compliance reporting but is very expensive
What is our primary use case?
We have deployed Prisma Cloud for one of our client premises. And we are managing it internally. Although we do have support and other stuff for this solution, it has two kinds of modes. One is the detect and protect mode, and one is only for the monitoring purpose. There's different licensing. If you need protection from Prisma Cloud, then you will purchase a firewall kind of module with that. Otherwise, by default, it comes in monitoring mode.
It's deployed on all VMs and workloads. With the Prisma Cloud, you can have it on a cloud server or you can deploy it as a stand-alone. That said, the container should be persistent. Otherwise, if you restart the container, you will lose your configuration and everything.
We were doing a deployment for a telecom client, and they have two different application pipelines. One was based in India with the Oracle team. They were developing their own application, so we have also incurred it to the Prisma Cloud in their CI/CD pipeline.
The second use case was to monitor the OpenShift environment. The solution was basically bare metal. Then on top of that, there was OpenStack. It's an on-prem cloud service. We have deployed the Prisma Cloud solution, so it was on top of an open stack.
How has it helped my organization?
If there is a large infrastructure involved, you need to run continuous vulnerability assessments. You also need comprehensive reports and complete inventory details. Doing everything manually would cost a lot of human resources. And it can take a long time. This helps automate and control vulnerability scanning that's continuous. It also helps with compliance. If I have to scan something monthly or quarterly, I can do it, and it will run. What Prisma Cloud actually does is that it keeps on doing this activity for you without any required request from the operator side. Its agents are deployed on the infrastructure, on all the components, on all the applications, on all the operating system images, VMs, or the old private cloud environment or your work on nodes. If you spread your agents all over your infrastructure, it'll keep scanning and reporting, and you can see everything from your dashboard.
What is most valuable?
We have integrated OpenStack, OpenShift, RH, et cetera. You don't need to integrate every individual part; you only need to integrate the worker node. And once you deploy it on the worker node, all the parts running on that worker node.
Prisma gives you full-fledged posture management. You get detailed insights into all your modules, how they are communicating, and on which ports they are communicating. If there is any unknown port or unknown address, et cetera, Prisma Cloud can show you the configuration, and the ports. That way, as an architect or product manager, you know through your documentation which application should be communicating on which ports. If there is any deviation from that documentation, Prisma Cloud can see that, and you can get the details for that.
With respect to virtual protection, it tells you which image, VM, physical server, worker node, or port has what kind of vulnerability. It gives you everything in real time.
Monitoring mode is great if a company wants to know every single vulnerability and loophole in its infrastructure. It gives you a complete inventory list of VMs and devices within your infrastructure from the dashboard. You can add new policies or elements easily. You just integrate it within Prisma Cloud. That way your inventory automatically gets updated.
Real-time continuous vulnerability assessment and reporting are key features. It's critical to most large-scale enterprises.
Prisma Cloud provides security scanning for multi and hybrid cloud environments. Sometimes, if we, for example, have some infrastructure on a public cloud, like AWS, then you need to monitor them continuously and you will require the inspector module of AWS. The inspector module is initially free of charge. And after two weeks, they'll start charging you. However, you can just put the credentials or access keys for AWS within the Prisma Cloud and assign the agent to that. It will start monitoring your cloud infrastructure as well with less overhead.
Prisma Cloud provides the needed visibility and control regardless of how complex and distributed the cloud environments become. What you do is you need to open the communication matrix. That communication matrix is the baseline or the product for the Prisma agent or CLIs, to communicate with the Prisma Cloud and share its findings directly. Whatever the agent finds on its local host, it will respond and share it with the Prisma Cloud.
Prisma Cloud has two types of interfaces. One is towards the Internet to the main Palo Alto cloud environment. The second interface is towards the infrastructure or architecture. Most of the time, the operators focus on the corporate side since their responsibilities are related to that scope. The other side should be automatically updated, similar to how Microsoft. They simply tell you updates have been downloaded and installed, and you need to restart your system. The update processes are transparent. There is nothing manual to worry about.
There are a lot of compliance rules that you can configure. If the product manager knows that there's a new compliance rule, they ensure that the new compliance rule is compatible with their product. Compliance is not an issue, however, rules should be configured. It's just like any other compliance activity.
Prisma Cloud enabled our customers to integrate security into their CI/CD pipeline. Our client was developing a large-scale application for billing purposes. And Oracle India was involved in that, and there was a DevOps pipeline. We have integrated the Prisma routes to the CLI within their pipeline; it was being handled through Prisma Cloud automatically within different DevOps gateways. It's seamless. Once you integrate it, then it's part of the pipeline, and it's being done automatically just like any other pipeline gate.
Having a single tool to monitor cloud sources has had a positive impact on our customers. Tasks that were headaches have become easier. It's easier to assess vulnerabilities and compliance thanks to automation.
Prisma Cloud provides risk clarity at runtime and across the entire pipeline showing issues as they are discovered in the build phases. The vulnerability will stay on the dashboard until you fix it as well. It will keep showing you the issue until it is resolved. Vulnerabilities that are identified are documented and stored in the vulnerability management system.
Prisma Cloud has reduced alert investigation times thanks to the comprehensive dashboard. You can directly search for any host you are targeting or go through the entire list and check everything.
It's helped customers save money in that it's helped them catch vulnerabilities thanks to 24/7 scanning. That helps you fix the issue earlier. If a vulnerability gets through and the company is breached, they can lose their reputation. The same is true if their service goes down - especially in a banking scenario. It can lead to a big financial loss. Having proper security controls and monitors in place mitigates this.
They have very rich documentation, and everything is very clear with respect to integration and configuration.
It provides a lot of compliance rules. It provides us with around 160 different rules. That way, you can define everything during scanning and the system will keep checking for compliance, which is automated.
What needs improvement?
One single drawback is that updates are not directly based on push notifications. There is a lot of software that gets updated automatically. Since this is a security product, this product should be automatically updated. Right now, it must be manually updated. I should be able to focus on vulnerabilities and security, not updating.
Delays can be very costly. Even with a minute delay in updating, if an attack is successful, when you have this corrupted million-dollar product, it's useless to you then. That's why updates should be automatically done.
It doesn't patch your products; it only provides insights into vulnerabilities. It's merely a value-added service for your overall security posture.
They are missing some compatibility details in their documentation. If I am choosing a product, the first thing I look at before recommending it to my organization, is the documentation, including how it is organized, if their documentation is informative, what information they are providing, et cetera. Prisma Cloud has one issue within its documentation, and that is that it does not provide exact details of every single plugin. I was very concerned about which version of Prisma Cloud was compatible with which version of the solutions we had in our CI/CD pipeline. They need to be more clear.
What do I think about the stability of the solution?
The solution is stable and is capable of covering large enterprises. I've never faced issues once I've deployed it. However, if you will be holding the data for the long run, you need to think about storage. That's it.
What do I think about the scalability of the solution?
It's scalable. You can scale horizontally or vertically.
How are customer service and support?
Their support is not very good.
How would you rate customer service and support?
Negative
How was the initial setup?
I've deployed it from scratch in a containerized environment. I am running a persistent container for Prisma Cloud.
The setup is very straightforward, thanks to their documentation. It's rich and comprehensive. They just don't provide version compatibility.
We deployed the solution in a day.
There is no other complexity in the implementation. It can be anywhere in the VM or any other component of your infrastructure. The agent should be able to ping its Prisma Cloud server. Once that is done, there is no other complexity. You just deploy the agent. The agent will keep updating automatically via the Prisma Cloud, and it will start finding new vulnerabilities. That's it. There are no such complex issues with the Prisma cloud deployment.
The implementation strategy was that we knew for which kind of infrastructure we were going to deploy it.
There isn't much maintenance needed. The only thing is that sometimes you integrate Prisma Cloud with something that is not supported by Prisma Cloud or documentation does not explain it. In that case, you need to engage their support team. Their support is not very good.
What's my experience with pricing, setup cost, and licensing?
The solution is very expensive. They must have decided internally not to go after SMEs or startups. They are targeting multi-million or trillion-dollar organizations. Those are the companies that can afford their products.
What other advice do I have?
We're an MSP; we provide this product to customers. We provide security as a service.
We wouldn't recommend the solution for SMEs or startups. This is for larger corporate enterprises like large banks, fintechs, or telcos. It's good for larger infrastructures that might have legacy controls or devices.
Prisma is not the only solution in the market; there are others as well. It offers good core functionality, and it covers your whole cloud environment. It's a fully-fledged package that can help provide insights into security threats in any kind of development environment, from production to staging.
I'd rate the solution seven out of ten.
If you are interested in Prisma Cloud, look at your business cases first. If you have a massive, large-scale infrastructure, they should not go into new products blindly.
Gives us a one-stop shop for managing all clouds, whether public or private
What is our primary use case?
There are five pillars of Prisma Cloud, including CWPP for workloads and security posture in the basic configuration. We have also been working with application APIs. These are the areas in which I'm working.
How has it helped my organization?
Most of our customers are using multi-cloud or hybrid cloud environments, and the problem they were facing was that they didn't have a one-stop shop for managing all the clouds. For example, Azure has something like that capability, but there are some problems and gaps. Every cloud provider says, "This is our territory, and we can only secure our territory." But the whole idea of Prisma Cloud is that it can take any cloud, whether public or private, bring the accounts on board, and after that, everything is managed by Prisma Cloud.
Another problem with Azure is that it has very overwhelming alerts, making it hard to manage them in native Azure. With Prisma Cloud, we have different rules and it is easier and more manageable. It is not overwhelming. We can look at its different modules. If we're talking about identity management, we can go to that module and see the identity. That makes things quite manageable with Prisma Cloud.
When it comes to investigation time, Prisma Cloud has something like 18,000 or 19,000 predefined policies and has remediations as well, so we know what to do or what not to do. It helps reduce investigation time because all those policies are already there. They are the "top" policies, and it provides remediations alongside.
What is most valuable?
Most of the customers we are tackling have different tools and solutions, like Qualys, Nessus, and vulnerability management assessment solutions. There are plugins for them, and we can integrate Prisma Cloud with them. We can enrich our telemetry with their data and use the predefined correlation rules in Prisma Cloud. That means we have that work done in seconds.
We also like the firewalls.
It also perfectly provides security across multi- and hybrid cloud environments. We use it with multi-cloud environments, and there are five cloud providers supported, including Amazon Web Services, Oracle, GCP, Azure, and Alibaba. Most of the big companies out there are using multi-cloud or hybrid environments, and they share dependencies on different types of cloud.
The basic idea of Prisma Cloud, and what I like the most, is that it is a managed cloud and everything is easy to do. So we can integrate different cloud-native services. We can use solutions like Defender for Cloud, Azure, and Amazon Inspector and enhance our telemetry using these data lakes. Prisma Cloud is the best for integrating with these cloud-native solutions.
The automation is good so far. If we look at the Kubernetes runtime environment, there is good automation for that.
Prisma Cloud is all about a preventative approach, and we can use it for compliance as well.
We can also integrate it into a CI/CD pipeline, and it can scan different images and containers, such as Kubernetes. Also, when we are loading an account, there are some agents that scan as well. There is Lambda for automation, and, in the first phase—the staging environment—we can have our work done. Pipelining is a continuous process, and the scanning takes place in the previous stage only. It runs in a sandbox environment and gives us all the remediations.
Sometimes, credentials are hardcoded. We can use the code security module and correlate with the predefined rules provided by Prisma Cloud. We get alerts, and based on these alerts, we can harden the policies for that code.
And the dashboard provided by Prisma Cloud has capabilities through which we can make alerts visible based on their severity level. We can create a separate dashboard for rules related to medium or high severity. That way, without wasting our time, we get to the medium- and high-level alerts and tackle the things that need attention the most.
What needs improvement?
The automation capabilities are growing each day, but the problem is that the updates are not that frequent. There are some services on Amazon that have come out with updates, and Azure is also getting up to date. But Prisma takes some time to follow. There's a time gap that Prisma inherits from these clouds. I understand why it takes some time, but that time should be reduced.
For how long have I used the solution?
I have been using Prisma Cloud by Palo Alto Networks for two years.
What do I think about the stability of the solution?
The stability is a 10 out of 10.
What do I think about the scalability of the solution?
The scalability is also a 10 out of 10.
We have a team of 25 to 30 people. Our company is based in India, but we have offices in Malaysia, Singapore, and Bangladesh, and we have clients in India and outside of India. Most of them are enterprise-level.
How are customer service and support?
Their technical support comes up with great solutions. Every time we call we definitely get a solution.
How would you rate customer service and support?
Positive
How was the initial setup?
It is onboarding in the cloud. There are a lot of documents, but it is quite easy. I'm into training as well, and it is quite easy for me to train my interns on how to onboard accounts to Prisma Cloud. If we are only onboarding one account, it happens in minutes.
What's my experience with pricing, setup cost, and licensing?
In terms of price, we have to see the value we are getting for the particular penny we are paying. In that context, Prisma Cloud is a value-back cloud-managed solution; cloud-native solutions are quite expensive. That's why a lot of our clients are shifting from cloud-native to Prisma Cloud: because of its effectiveness and because it is budget-friendly as well.
What other advice do I have?
I love Prisma Cloud. It's a one-stop shop for managing cloud security. And it is very easy to use. The dashboard and all the UI are very easy.
Users can bring applications to production without vulnerabilities or malicious packages
What is our primary use case?
I am using five modules of Prisma Cloud, and I have expertise in CSPM. The use cases are related to securing our host container environment and multi-cloud environment.
We were looking to resolve issues related to host and container security in the Kubernetes environment, vulnerability management, and compliance management.
How has it helped my organization?
One of the benefits of using Prisma Cloud is that we can easily make our cloud environment compliant. We can make it vulnerability-free, helping coders or application users bring their applications to production without vulnerabilities or malicious packages.
We have gotten good reviews from our customers, saying that they have improved their security with Prisma Cloud for their cloud environments. That includes customers in finance and in the medical field. And the reporting we get from Prisma is excellent.
It has helped us reduce runtime alerts by 70 to 80 percent.
And because it's very transparent, we can directly investigate things. It has reduced investigation time by 100 percent. We can easily go to the dashboard and check what's happening when investigating. We have to be experts with our tools to investigate and do a deep dive into an incident.
What is most valuable?
The best feature of Prisma Cloud is that the various modules have different features. With the CSPM, we have compliance management, and we also have an auto-remediation module. In CWP, we can go with runtime, where one of the great features is blocking vulnerabilities or malicious activities from the pipelines or CI. All five modules are taking a preventative approach to the security of the cloud environment, from the network to the cloud, posture management and workload protection.
In CI/CD, we have the option to add a Prisma scan, which helps us remove the vulnerabilities and malicious parts of packages used to create an application. This option enables us to scan the images before running or building them and to get a vulnerability report.
Prisma scans things and shows all the vulnerabilities and packages that are vulnerable, and which layers, by default, have vulnerabilities. So developers can easily go into the package or a particular layer and make changes to their code. It's very transparent.
Reporting from Prisma Cloud is very straightforward. We can export reports in CSV format, or we can use the APIs in Prisma to fetch reports. Reporting is very easy and customizable.
It is also compatible with multi-cloud and hybrid environments. It gives the option to onboard with five clouds: AWS, Azure, Alibaba, Oracle, and GCP. Most of the companies we deal with use parts of various services from different clouds. To provide them with solutions, we need Prisma Cloud, as it helps manage multi-cloud environments.
A lot of automation capabilities are coming out with the updates, and they are growing day by day. The basic automation covers remediation of alerts, and in live applications we can block malicious activities in the files where the vulnerabilities come across.
In terms of cloud-native application comprehensiveness, we can integrate various cloud-native applications with Prisma Cloud. We can use Defender to protect workloads or Kubernetes in any native cloud like AWS EKS.
The CSPM provides the whole asset inventory, where we can see all the services in our cloud environment and how they are working, as well as how the assets are connected to each other and which network is connected. We can see the configuration.
What needs improvement?
We face some GUI issues related to new permissions for AWS. So far, we don't have any automation to complete them through the GUI. We have to manually update the permissions. Our customers have faced some issues with that.
For how long have I used the solution?
I have been using Prisma Cloud by Palo Alto Networks for more than four years.
What do I think about the stability of the solution?
The stability is a nine out of 10.
What do I think about the scalability of the solution?
The scalability is a nine out of 10. We just need some of the automations to come around in Prisma.
How are customer service and support?
With all the capabilities it has and how comprehensive it is, with CSPM, CWPP, and more, we get help from the technical team at Palo Alto. They help us to get into what Prisma Cloud is and all the capabilities it has.
Their technical support comes up with good solutions for every difficulty we face.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment is very straightforward, with the help of the technical team and tech support. It's very easy to get into Prisma Cloud. It takes time, one to two weeks, to complete the deployment. Most of our customers are enterprise-level, although we also have small clients.
The maintenance is mostly handled by Palo Alto teams. The updates are scheduled so that we know at what time they will update and what the new features are. They are good when it comes to updates.
What's my experience with pricing, setup cost, and licensing?
I'm on the technical side and not into sales, but Prisma Cloud is better than the native applications when it comes to pricing.
What other advice do I have?
I suggest that my customers adopt Prisma for every module. It's the best security platform, where we can provide security for multiple clients without using the native security approach.
I highly recommend this solution.
Provides insight into our entire inventory of assets and everything happening in our multi-cloud or hybrid environments
What is our primary use case?
My company provides solutions for Cisco customers and helps them secure their cloud environments. Most of our clients are adapting to the cloud, and we're trying to resolve vulnerabilities in their configurations. I use all of the Prisma Cloud modules but have expertise in the CSPM and CWP modules. We work with SMEs but also have some enterprise clients.
How has it helped my organization?
Using Prisma Cloud has improved customer satisfaction. Our customers are happy with the solution and the level of security we can provide with this. Prisma can secure a cloud-native development cycle. We can configure Prisma to run a scan before we build the images.
Prisma is known for its visibility and comprehensiveness. It provides insight into our entire inventory of assets and everything happening in our multi-cloud or hybrid environments. We want to know all the services working in our environment and who is accessing them.
It provides a single tool for protecting all cloud resources without the need to reconcile compliance reports. All of our reports come into Prisma's CSPM module via the APIs. It's easy to get the reports coming into CSPM. We can get the inventory, asset, and alert reports containing all of the alert notifications coming into the CWPP and the reliability and compliance. It has enhanced our overall reporting experience. We can do a deep dive into alerts from various integrated third-party applications and get alerts sent via email or SMS text to keep track of any incidents in our environment.
What is most valuable?
My favorite feature is the CWPP module. We can define various kinds of rules for vulnerabilities, incidents, or suspicious activities. Prisma Cloud covers various cloud providers, including AWS and GCP. It covers every cloud on the market.
Many customers in finance, healthcare, and other industries are adopting cloud or hybrid environments. Some of them are using GCP, AWS, and Azure services together, and Prisma is compatible with all of them.
Prisma's ability to protect a fully cloud-native stack is comprehensive. We benefit from Palo Alto's technical knowledge, training sessions, and learning programs to develop robust solutions for our customers. Prisma's automation features are helpful. We can set up automated remediation, messaging, and alerts. The CSPM module can be automated directly, and we can automate runtime rules in the CWP module. We can also automate some code scanning.
Prisma is integrated into our CI/CD pipeline through the CWP module. We can load the images into Azure DevOps and scan them for vulnerabilities or compliance issues. We can block the vulnerabilities or disable the application so it cannot run with the vulnerabilities in place.
Runtime alerts are among the best capabilities. In CWP, we have to block malicious or suspicious activities to stop the incoming attacks against our workloads. Using various templates, we can reduce our runtime alerts by 60 to 70 percent.
What needs improvement?
I have some challenges customizing and personalizing some of the capabilities in the CSPM in terms of new policies and services. We have to reconfigure and rebuild the CSPM.
For how long have I used the solution?
I have used Prisma Cloud for around three years.
What do I think about the stability of the solution?
I rate Prisma Cloud nine out of 10 for stability.
What do I think about the scalability of the solution?
I rate Prisma Cloud nine out of 10 for scalability.
How are customer service and support?
I rate Palo Alto support 10 out of 10. They come and help us a lot.
How would you rate customer service and support?
Positive
How was the initial setup?
Deploying Prisma Cloud is straightforward. We received some training from Palo Alto's technical team. The deployment time varies depending on the client and the modules you deploy. It may take a few weeks or a couple of months. After deployment, Palo Alto handles the maintenance. They notify us by text or email when there will be a scheduled maintenance window.
What's my experience with pricing, setup cost, and licensing?
I'm not involved on the financial side, but I know that Prisma Cloud isn't cheap.
Which other solutions did I evaluate?
I've seen some other solutions with CSPM and CWP capabilities, but they do not have the same coverage of multi-cloud or hybrid environments. That's an area where Prisma stands out from its competitors.
What other advice do I have?
I rate Prisma Cloud 10 out of 10.
Its architecture is well-designed, more reliable, and more secure
What is our primary use case?
We use Prisma Cloud Data Security for security compliance and detection.
We implemented Prisma Cloud because it eliminates the need for hardware appliances, thereby reducing our on-premises footprint.
How has it helped my organization?
Prisma Cloud provides security scanning multi and hybrid cloud environments which is important.
Prisma Cloud provides comprehensive protection for the entire cloud-native stack, encompassing threat protection, global protection, threat intelligence, and zero-trust architecture.
Prisma Cloud's security automation capabilities are effective. It utilizes AI-powered cloud-based technology to analyze unknown files and identify potential threats.
Prisma Cloud employs a combination of features to safeguard against both known and unknown threats, including IPS and threat intelligence integration.
Prisma Cloud has benefited our organization by providing URL filtering, facilitating secure customer connections, implementing endpoint security with a zero-trust architecture, and enabling user identification.
Prisma Cloud safeguards our entire cloud-native development lifecycle. Palo Alto's architecture encompasses multiple engines, each with distinct functionalities. These engines include the SP3 engine, application visibility control engine, URL filtering engine, Wildfire, intelligent saving, zero trust, threat prevention, and content infection. Together, these engines enhance security, reliability, and threat monitoring.
Prisma Cloud provides visibility and control of our web traffic at the URL level and across other technologies.
Prisma Cloud's visibility improves our confidence in our security compliance posture.
Prisma Cloud effectively integrates security into our CI/CD pipeline and seamlessly harmonizes with existing DevOps processes.
Prisma Cloud provides a single monitoring tool. The single point of monitoring makes our company more secure.
Prisma Cloud provides up-to-date information about real-world threats at runtime and across the entire pipeline, through communications, community, and mail.
Prisma Cloud reduces the number of runtime alerts. The extent to which alerts are reduced depends on the appliance and the number of throughputs purchased.
Prisma Cloud has saved our organization money.
What is most valuable?
What I like most about Prisma Cloud is its zero-day signatures, maximum security, minimal downtime, cloud visibility, control, and ease of deployment.
Firewalls can identify application and user activity within network traffic. This includes information such as, what applications are being used, what URLs are being accessed, how frequently applications are being accessed, and how much time users are spending on particular applications.
What needs improvement?
The Palo Alto support needs to improve. Their response time is not good.
For how long have I used the solution?
I have been using Prisma Cloud by Palo Alto Networks for two years.
What do I think about the stability of the solution?
Prisma Cloud is stable.
What do I think about the scalability of the solution?
Prisma Cloud is scalable.
How are customer service and support?
The technical support is slow to respond.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used Fortinet, CheckPoint, and Cisco. Palo Alto Prisma Cloud is more efficient in single scans.
How was the initial setup?
The initial deployment was straightforward. Using a basic configuration, we can deploy within six hours. I completed the deployment myself.
What's my experience with pricing, setup cost, and licensing?
Prisma Cloud by Palo Alto Networks carries a higher cost, but its enhanced security measures justify the expense.
What other advice do I have?
I would rate Prisma Cloud by Palo Alto Networks nine out of ten. Its architecture is well-designed, more reliable, and more secure.
We have Prisma Cloud deployed in multiple locations across the globe.
The maintenance is done on the cloud.
I recommend Prisma Cloud to others.
Great visibility, helpful UI, and excellent support staff
What is our primary use case?
The solution is integrated with cloud environments such as Azure, Alibaba, and Oracle. After integrating, we do check the network logs, including what are the config logs or configuration issues clients are facing. We see what their cloud requirements are. There are email use cases specific to the modules, and we do have visibility over the entire cloud environment. We handle vulnerability management and can block according to the rules and policies.
We can manage identities as well, right down to a particular machine.
How has it helped my organization?
We've been able to solve various problems. It's helped with cloud security. It problem solves for threat detection and compliance.
It's helped clients with cloud security. When it comes to the financial aspect, we have clear visibility into what is going on, and we have a clear idea of how we can inspect and prevent issues.
What is most valuable?
It offers full visibility.
There is auto-remediation capability with this solution.
It offers threat detection across multi-cloud environments. Many clients are using hybrid setups and different clouds in India. When it integrates, it's helpful in gaining visibility across the entire environment.
It is comprehensive. It's very easy to define rules and auto-remediation. It's basically one click. It's great for protecting the full cloud-native stack.
The security automation capabilities are very good. It's played an important role with auto-remediation, which is important to the automation process. We can decide how we want to respond as well. We can arrange logs and alerts. All of this can be automated.
It allows us to take a preventative approach to security. When I started with Prisma, we had sessions about how we could work with the capabilities. We have a lot of features in Prisma Cloud. The UI has improved and helped us gather information about vulnerabilities and compliance issues.
The build, deploy, and run lifecycle is good. We have particular pipelines, and we have out-of-the-box policies defined. We can see what is going on. We can move faster within the environment with it.
It provides complete microservices that we can check on a micro level. The solution provides visibility and control regardless of how complex or distributed our cloud environments become.
The solution enabled us to enter our CI/CD pipeline and touchpoints into existing processes. It provides us with a good backbone.
We are provided with a single tool to protect all of our cloud resources and applications without having to manage and reconcile compliance reports. It can fetch the reports for us. We have APIs and pretty refined plugins to get the reports. We can get it all from the console. We can also schedule reporting. The third-party integrations are very helpful.
The runtime policy is very helpful. We can define runtime rules and go through alerts or blockages. It's one of the best parts of the solution. It's reduced the number of alerts, sometimes by 80% to 90%, depending on the situation.
With the amount of visibility we get, we've been able to reduce alert investigation times. We can investigate if we need to, or we can make custom answers to specific alerts. Depending on your level of expertise in the tool, it barely takes any time at all. If you understand the case, if you already know the type of answer, you can put it in. With Prisma, we've been able to reduce investigation times by 80%.
While, as a cloud security engineer, I can't say how much money it saves, I can see the credit, and it looks like less money is spent.
What needs improvement?
When there are updates, whether daily, weekly, or monthly, it needs configuration or permission adjustments. There is no automation for that, which is too bad.
For how long have I used the solution?
I've been using the solution for two years.
What do I think about the stability of the solution?
This is a very stable product.
What do I think about the scalability of the solution?
Prisma users are increasing day by day. We have a team of around 12 people using the solution. We have a variety of clients coming onto Prisma, and we work to help them become more compliant using the solution.
It's very scalable and very easy to use.
How are customer service and support?
We used technical support during deployment, and they were very good. Technical support is awesome.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I haven't really worked with other tools. I started with Prisma Cloud.
How was the initial setup?
The initial setup is pretty straightforward. We had good support to help with learning and the capabilities of the solution.
The training took two to three weeks. The deployment would take around two to three days.
There isn't too much maintenance. There are updates. There's nothing other than that.
What about the implementation team?
Prisma's support helped with the deployment.
What other advice do I have?
We are a Palo Alto partner.
After using the solution for about two years, I would rate it nine out of ten so far.
Helps reduce run-time alerts, and investigation time, and provides deep visibility
What is our primary use case?
Prisma Cloud by Palo Alto Networks is a comprehensive cloud security platform that encompasses vulnerability management, container management, Kubernetes management, and serverless management. It utilizes modules, such as Cloud Workload Protection, to provide comprehensive cloud security. Before deploying any applications, Prisma Cloud performs cloud scans to identify and address vulnerabilities, minimizing potential threats. The solution provides visibility into our cloud environment, enabling us to effectively manage and monitor our infrastructure. This capability is particularly valuable in the financial industry, where hybrid multi-cloud environments are prevalent.
We use all the modules Prisma Cloud offers.
How has it helped my organization?
Prisma Cloud offers security scanning for multi-cloud and hybrid cloud environments. This is crucial because managing multiple cloud accounts, such as AWS, GCP, and Azure, typically necessitates accessing each account individually to view the inventories of assets and services. Prisma Cloud eliminates this inconvenience by consolidating all of this information into a single unified interface, providing a comprehensive overview.
The comprehensiveness enhances threat protection by providing integrated and out-of-the-box policies, along with all the necessary components, to effectively secure cloud environments and achieve comprehensive visibility through Prisma's capabilities.
The security automation capabilities of Prisma Cloud are effective. We can automatically remediate some of the alerts using predefined policies. We utilize Defender to detect vulnerabilities in our containers, AKS, and GKE environments.
Prisma Cloud has benefited our organization in so many ways that we can't count them all on our fingers. The Cloud Security Posture Management module of Prisma provides a wide range of capabilities, including visibility, governance, compliance, auto-remediation, integration with hybrid cloud environments, vulnerability reporting, and blocking capabilities. It also offers compliance reports, integration with third-party tools for vulnerability and alert notifications, and Cloud Workload Protection capabilities for blocking, alerting, and specifying affected containers or servers. Additionally, it provides visibility into code security by monitoring the Infrastructure as a Code environment for unauthorized users.
It enables a proactive approach to cloud security, allowing us to prevent vulnerabilities, threats, and complications arising in cloud or hybrid cloud environments. We can easily investigate and obtain comprehensive reports.
We spent the first five months after implementing Prisma Cloud familiarizing ourselves with the solution and completing the training sessions provided by Palo Alto. During this time, we began to see the benefits that Prisma Cloud offered our organization.
Prisma Cloud works with the CIB. Therefore, when we build and deploy something, we can incorporate a Prisma scan, which assists us in scanning the images and gaining insights into the state of our environment. It provides us with comprehensive visibility and raises alerts or triggers notifications to inform us of any missing elements or potential issues. This is how Prisma can contribute to the build and deploy phases.
It provides deep visibility and control regardless of how complex our cloud environment becomes.
Prisma Cloud enables us to integrate security into our CI/CD pipeline and it provides us with a single tool to protect all of our cloud resources.
Prisma Cloud provides run-time risk clarity throughout the entire pipeline, revealing issues as they arise. This enables us to effectively block vulnerabilities and rectify identified problems.
We have reduced run-time alerts. The run-time protection has helped many of our clients protect their environments.
Prisma Cloud has significantly reduced our investigation time. The clear visibility it provides into our environment and the process flow has streamlined our investigations. Additionally, using Prisma to investigate issues rather than directly accessing our cloud accounts saves valuable time.
What is most valuable?
The most valuable features of Prisma Cloud are its cloud security posture management and cloud workload protection capabilities. Integrating Prisma Cloud with our cloud service providers provides a comprehensive view of our multiple cloud environments through a single dashboard. This enhanced visibility improves vulnerability management and compliance. With CWP, we can gain complete visibility into all workloads within our environment.
What needs improvement?
We are encountering issues with the new permissions required for AWS integration with Prisma. Specifically, we need a mechanism to automatically identify and integrate the missing configuration permissions that are introduced on a biweekly or monthly basis. We have requested the Palo Alto team to develop this automation, and we are eagerly awaiting its implementation. We appreciate the efforts of the engineering team for their contributions.
For how long have I used the solution?
I have been using Prisma Cloud by Palo Alto Networks for two years.
What do I think about the stability of the solution?
Prisma Cloud is a stable platform. The only downtime we experience is scheduled, and Palo Alto notifies us in advance of the scheduled outage and its duration.
What do I think about the scalability of the solution?
I would rate the scalability of Prisma Cloud a nine out of ten. I have received positive feedback from our clients indicating that Prisma Cloud is an excellent fit for their environment.
How are customer service and support?
We have repeatedly contacted technical support to address issues encountered by both ourselves and our clients. The support is helpful.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used AWS GuardDuty for vulnerability management and compliance visibility, but it was not user-friendly due to the requirement to log into separate accounts to access reports.
How was the initial setup?
When I first started using Prisma, I found it to be very easy to learn. Several of our engineers were already familiar with Prisma Cloud and were able to help me understand how it worked, including the UI, navigation, and integration with other tools. They also showed me how to make API calls and integrate Prisma with third-party tools. Additionally, the Prisma team was incredibly helpful whenever I contacted them for assistance. They were always willing to answer my questions and help me troubleshoot any issues I was having.
What about the implementation team?
I completed the implementation myself after completing the training sessions with the Palo Alto team and attending a lab session for the Prisma Cloud deployment.
What's my experience with pricing, setup cost, and licensing?
I don't have direct access to financial information, so I'm not fully aware of the overall costs. However, I do work with clients and solution teams to provide relevant solutions. I also collaborate with the research team to explain Prisma's capabilities and its comprehensive range of features. When I see the credits and other similar programs may make Prisma's licensing costs appear lower than those of competing tools, it's important to consider the overall cost when evaluating cloud security solutions. For example, when implementing cloud security measures for CSPs or CWPs, other tools may be required, potentially leading to higher overall costs than Prisma Cloud's comprehensive solution.
What other advice do I have?
I would rate Prisma Cloud by Palo Alto Networks nine out of ten.
Prisma Cloud necessitates maintenance for both weekly and monthly updates.
My advice to new users and researchers is to delve into Prisma Cloud's capabilities and potential. Understanding the full scope of what it can do is crucial for new users. It's not just about visibility or the GUI; it's about the underlying work that engineers do, such as runtime protection, virus detection, and code security. New users should have a clear understanding of these capabilities. They should participate in sessions, practices, and labs to gain hands-on experience.