Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

11 AWS reviews

External reviews

746 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Mike W.

Simplifies security configuration reviews

  • December 15, 2022
  • Review provided by G2

What do you like best about the product?
Wiz has made our monthly cloud security reviews much simpler and more thorough at the same time. The easy to understand layout of findings make it approachable to everyone rather than needing a cloud configuration engineer for everything.

The ability to create custom controls and frameworks is incredibly helpful as we work to exceed industry standards and hold ourselves to a higher bar. The built-in frameworks are excellent measuring tools to see where you stack up to common certifications and regulations.
What do you dislike about the product?
Out-of-the-box Wiz is a great tool to help ensure security. There are times when it becomes a rabbit hole which has the potential for someone to become concerned with all of the findings and devices and paths and all the other available information. It can become overwhelming pretty easily.
What problems is the product solving and how is that benefiting you?
Cloud providers can very often give you all the information you'd ever want, but in a way that makes you dig for it to find the useful bits. Wiz makes everything easy to find, easy to understand, and easy to take action on.


    Outsourcing/Offshoring

Must have technology for CSPM

  • December 08, 2022
  • Review provided by G2

What do you like best about the product?
The correlated visulaization and context provided around the misconfiguration helps to prioritize the remediations.
What do you dislike about the product?
Case sensitive searches, it becomes difficult to find the asset specially when using fqdns.
What problems is the product solving and how is that benefiting you?
Visibility, remediation prioritisation and single pane of glass for cloud platforms.


    Health, Wellness and Fitness

It was a great learning experience. Learned a lot of new things

  • December 08, 2022
  • Review provided by G2

What do you like best about the product?
I like the flexibility of having compliance to pick from and inventory list
What do you dislike about the product?
The reports are hard to read and understand. It requires some time to read through the json file to find out what issues are there
What problems is the product solving and how is that benefiting you?
Wiz is a great security scanning platform. We have wiz cli integrated, which helps in having a governance around what can and cannot be deployed


    reviewer2041074

Multiple features help us prioritize remediation, and agentless implementation reduces overhead

  • December 01, 2022
  • Review provided by PeerSpot

What is our primary use case?

The Primary use cases are within cloud security posture management, in which we identify misconfigurations and any type of what they call "toxic combinations" of risk and vulnerabilities that are affecting our cloud deployments.

In the last year we have enabled DSPM and expanded on CIEM use cases.

In addition to the agentless functionality, we have deployed the Wiz Sensor and enabled Admission Controller in our Kubernetes workloads.

How has it helped my organization?

We don't consider Wiz just a cyber security tool. What we have done is opened up the visibility to our cloud users. Now, our cloud users are able to see for themselves what is affecting their assets. It helps enable a shared model of responsibility for security. With the visibility that Wiz enables, our users are no longer receiving a report in the form of a spreadsheet. They're able to quickly see and navigate, and drill into anything, if they need to, to see what is affecting their environments.

Now that we have given them visibility into what's running in production, through some of the capabilities available in Wiz, we are investing in how we can shift things and identify some of those issues earlier in the pipeline so that they don't have to worry about things after going to production.

In addition, the fact that Wiz is agentless and that it's leveraging APIs to give us visibility at the organizational or the account level, are factors that have definitely reduced some of the overhead that come with other technologies that use agents to attain the same results.

Another benefit is that it consolidates tools. We now have one tool that is capable of giving us vulnerabilities, not just on modern services or cloud-ready services, but also on traditional instances in which we would have been using an agent to be able to pull the information we need. The fact that Wiz is agentless and is capable of looking at traditional compute as well as modern compute has reduced the need for additional tools that are agent-based.

What is most valuable?

Out of all the features, the one item that has been most valuable is the fact that Wiz puts into context all the pieces that create an issue, and applies a particular risk evaluation that helps us prioritize when we need to address a misconfiguration, vulnerability, or any issue that would put our environment into risk. The fact that it's able to reveal those toxic combinations has been really key for us in prioritizing what to fix first.

Having visibility with a contextual view for prioritizing potentially critical risks has been quite important. Especially in the cloud, it's no longer about applying a particular patch or applying particular updates to address a CVE. It's more about, for example, how a combination of a misconfiguration with the fact that it's externally facing allows us to prioritize that to be addressed first. There's a higher risk for an externally facing asset that has a vulnerability with, potentially, a service account that has high privileges. We're able to say, "Hey, we need to fix that first," and not worry so much about a compute engine that might be vulnerable, but is still protected by some other security controls that are in place. Knowing where we gain the most value, from a security perspective, and where we can reduce the most risk, has been a critical piece of our adoption of Wiz.

The solution's Security Graph has been key as well. One of the things that Wiz provides is out-of-the-box dashboards, but the Security Graph allows us to pinpoint things by creating custom reports to target specific vulnerabilities. We have multiple use cases in which we can target, for example

  • a subscription ID that we are after, and that we are trying to prioritize for remediation
  • if a particular CVE is part of our environment.

Through the Security Graph, we're able to quickly determine those types of things. It also enables us to start looking at our assets and our inventory. It's almost human-readable. I don't have to write any type of RQL code. Rather, it allows me to quickly select, through the UI, the pieces that I'm interested in and build a report or query for it.

In addition, the automated attack path analysis is one of the factors that we use when we're prioritizing where we should focus first in our remediation. Understanding any type of lateral movement within an attack path helps us determine the type of urgency involved, as we try to prioritize what to address first. It has been very important in detecting assets that we consider valuable and quickly identifying if they are well protected.

What needs improvement?

Something that we're starting to look into is identifying vulnerabilities for which we potentially need to delay the remediation. We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade. We don't have remediation prevention capabilities available through Wiz. We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately.

For how long have I used the solution?

We've been using Wiz for almost 4 years.

What do I think about the stability of the solution?

It is pretty stable. We initially had some problems with timeouts, but they addressed them and the platform has been quite stable.

What do I think about the scalability of the solution?

We have not had any problems with being able to scale to meet our demands.

Which solution did I use previously and why did I switch?

We did not have a previous solution for the cloud.

How was the initial setup?

It was straightforward. We did it in partnership with Wiz.

We have it deployed across multiple public clouds and it's deployed at the organization level. All of our application teams and our 250-plus cloud users are able to see the data through Wiz.

We started with one FTE on Wiz and, since then, we have grown the team to three FTEs.

In terms of maintenance, no solution is perfect. We have been able to identify issues on the platform and to engage support to either address the bugs and issues that we see, or to enable a feature enhancement for a particular use case.

What was our ROI?

We have seen ROI from Wiz and we continued to see value in Wiz. Although we have been using Wiz for close to two years, one of the key items that we are still driving is adoption. The more cloud users that adopt the tool, the more value we gain from it. We still continue to see value added.

In terms of immediate benefits, the first major benefit was asset management. We got a better understanding of the type of workloads or services that were being run in our cloud. The second benefit was around vulnerabilities. Wiz quickly proved that a lot of our application teams were not following best practices related to patching. We were able to quickly tell a story: although you are using a modern service in the form of a container, you are not maintaining the container image in a way that prevents vulnerabilities.

One of the main values that we see is that as a SaaS platform, Wiz continues to deploy new features. As those new features are enabled, more value is being gained by us and by our community.

What's my experience with pricing, setup cost, and licensing?

I believe they're moving to a different licensing model. We are still grandfathered to the initial pricing models. What I do like is that the pricing seems pretty simple. We don't have to do a lot of calculations to figure out what the components are. They do it by enabling specific features, either basics or advanced, which makes it easy to select. But I'll have to see how the new pricing model will work for us.

Which other solutions did I evaluate?

We evaluated Aqua Cloud Security Posture Management, Prisma Cloud, and Orca Security. Wiz seems to be more user-friendly. It enables a user to quickly identify risks with minimal intervention. That was definitely a positive factor and a welcome one because it's less hands-on than some of the other tools.

Also, the fact that Wiz is able to see and contextualize multiple components or issues, provides a richer way of looking at risk. It takes into account not just a particular vulnerability that is CVE-driven, but also items like misconfigurations, over-privileged service accounts, and other factors that help us better prioritize our risk.

What other advice do I have?

Initially, there was unplanned work when our cloud owners saw the risks in their environments. But because we were prioritizing what needed to be fixed first, they were able to utilize existing staff resources to address those vulnerabilities. We were not just trying to patch or fix something that might be low risk. Rather, we were always trying to identify where our critical issues were and address those first.

If you're looking at Wiz but are concerned that your existing products already give you a lot of alerts, I would ask about your journey to the cloud and what you're focusing on. Are you mainly focusing on what I call CVEs and patching? Or are you looking into other areas like compliance and identity and access management pieces? If you are, then Wiz is definitely the right choice. It has to be driven based on that journey to the cloud. Visibility, once deployed, is one thing, and visibility prior to deployment is another thing. You should have a good understanding of what your requirements are and where you see the value of addressing any type of risk that is introduced into your environment.

Understand what is important to you. Are you more focused on the CSPM features that are available through Wiz? Are you more focused on cloud infrastructure entitlements that are available through Wiz? Are you looking to remove existing agents that could create overlap, and how does that fit into your roadmap? Understanding your requirements for the type of information that you want to see out of the tool is going to be critical to understanding your use cases, and how your community is engaged with those use cases, regardless of how easy the tool is to integrate. Those are factors that are going to be vital to your success.


    Entertainment

SRE using wiz to manage vulns

  • November 30, 2022
  • Review provided by G2

What do you like best about the product?
The continuous scanning of our infra without human interaction
What do you dislike about the product?
Too many tickets created for only one issue
What problems is the product solving and how is that benefiting you?
Vulnerability management and discovery


    Media Production

CSP graph at a glance

  • November 29, 2022
  • Review provided by G2

What do you like best about the product?
The ease at finding risks to the organization and conveying them to others
What do you dislike about the product?
Aggregation has to be done external for advanced grouping
What problems is the product solving and how is that benefiting you?
Reducing security risks across the multi vendor cloud service provider landscape


    Media Production

Complete visibility

  • November 29, 2022
  • Review provided by G2

What do you like best about the product?
Scalability
Ease of use
Speed
Graph ql

Query
What do you dislike about the product?
None. Everything is good about the tool.
What problems is the product solving and how is that benefiting you?
Visibility


    Financial Services

Great security findings and integrations with Servicenow

  • November 29, 2022
  • Review provided by G2

What do you like best about the product?
UI is extremely user friendly and the data provided is beneficial
What do you dislike about the product?
I currently don't have any major negatives as we are still learning a lot
What problems is the product solving and how is that benefiting you?
Security unknowns are immediately brought to our attention with details on how to fix


    Management Consulting

Director, Information Security and Risk Management

  • July 21, 2022
  • Review provided by G2

What do you like best about the product?
Wiz provides us valuable insights into our cloud workloads. Wiz provides robust security visibility around compliance, entitlements, configurations, and vulnerabilities in an easy to navigate and intuitive interface. It has become the preferred platform for our organization and several internal teams that are involved in the deployment, monitoring and design of our cloud applications and infrastructure.
What do you dislike about the product?
Wiz has a robust roadmap but does not yet have an API discovery and inventory capability. Projects are an integral use case for our organization but would like if the process to apply filters across the platform did not always require them.
What problems is the product solving and how is that benefiting you?
Wiz has provided our organization with increased visibility into the security, hardening and compliance of our cloud workloads. We have benefited from its findings both in resolving unknown issues and preventing future ones.


    Oscar C.

Rest easy with Wiz cluster monitoring

  • May 11, 2022
  • Review provided by G2

What do you like best about the product?
The fact that Wiz can see what we cannot, is due to our human nature. Vulnerability points, misconfiguration, and unnecessary connections between pods. Wiz automates that
What do you dislike about the product?
Nothing so far, maybe pricing? But I think that is affordable. Maybe not for every organization, but if you are into maintaining a Kubernetes cluster, that should be the case
What problems is the product solving and how is that benefiting you?
To comply with our security audits, adding up to vulnerability checks for our endpoints and the business logic, this could check which connections should not be there or to be monitored closely
Recommendations to others considering the product:
The ramp up period to be able to understand the results and the graphs provided