We performed a comparison between Prisma Cloud by Palo Alto Networks and Skyhigh Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Ease of Deployment: Prisma Cloud by Palo Alto Networks has a straightforward setup process, while Skyhigh Security's setup can be complex and time-consuming, requiring expertise in McAfee products and cloud-based security. Prisma Cloud does not have any such prerequisites.
Features: Prisma Cloud provides a comprehensive cloud security solution that includes continuous compliance monitoring, auto-remediation, and identity-based micro-segmentation. Meanwhile, Skyhigh Security is known for its strong URL spam filtering and efficient backup features. However, it lacks SD-WAN capabilities that are available with Palo Alto's Prisma Cloud. Prisma Cloud needs to enhance its dashboard customization, automation and integration capabilities, alerting process and support, and more. On the other hand, Skyhigh Security needs to improve its virtual solution, integration, encrypted disk implementation, technical support, and more.
Pricing: Prisma Cloud's pricing is complex and based on credits, while Skyhigh Security has mixed reviews on pricing and licensing. While Prisma Cloud is generally considered expensive, it offers excellent value, and there are no hidden costs. However, additional costs for workload security protections and other features may apply. Skyhigh Security's pricing is okay but needs improvement in terms of value and ROI, and it has an annual licensing cost and expensive hardware.
Service and Support: Prisma Cloud's technical support and account managers have received some positive reviews, but slow response times have been a point of frustration for some customers. Similarly, Skyhigh Security's technical support has been helpful for some users, but others have experienced slow response times and unhelpful engineers.
ROI: Prisma Cloud by Palo Alto Networks and Skyhigh Security both offer benefits such as risk reduction, compliance improvement, and enhanced productivity. Prisma Cloud offers faster issue detection and increased risk clarity, while Skyhigh Security provides increased visibility and control over security posture.
Comparison Results: Prisma Cloud by Palo Alto Networks is the better choice compared to Skyhigh Security. It has comprehensive and effective features, including a management console for easy visibility, continuous cloud compliance monitoring, and identity-based micro-segmentation. Skyhigh Security offers good protection overall, but lacks SD-WAN and has weak API integration and limited training resources.
"Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."
"Out of all the features, the one item that has been most valuable is the fact that Wiz puts into context all the pieces that create an issue, and applies a particular risk evaluation that helps us prioritize when we need to address a misconfiguration, vulnerability, or any issue that would put our environment into risk."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The vulnerability management modules and the discovery and inventory are the most valuable features. Before using Wiz, it was a very manual process for both. After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud. We're able to correspond and understand what the vulnerability landscape looks like a lot faster."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"The solution is very user-friendly."
"I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we have and the applications installed on each. I like Wiz's security graph because you can use it to see the whole organization even if you have multiple accounts."
"The container and serverless security is most valuable. It is quite a new technology for this region. Even though containers have been there for a long time, the adoption of containers is very minimal in this region. When it comes to using Kubernetes containers in a complex architecture, there is a lack of security in the market. People aren't aware of the security controls or the process for governance. Container security provided by Prisma Cloud is quite good at filling that gap."
"One of the main reasons we like Prisma Cloud so much is that they also provide an API. You can't expect to give someone an account on Prisma Cloud, or on any tool for that matter, and say, "Go find your things and fix them." It doesn't work like that... We pull down the information from the API that Prisma Cloud provides, which is multi-cloud, multi-account—hundreds and hundreds of different types of alerts graded by severity—and then we can clearly identify that these alerts belong to these people, and they're the people who must remediate them."
"I've been really pleasantly surprised with how Prisma Cloud is, over time, covering more and more of the topics I care about, and listening to customer feedback and growing the product in the right directions."
"Syslog CLIs are the best feature."
"Prisma Cloud's inventory reporting is pretty good."
"Integrating with a CI/CD pipeline and incorporating a vulnerability assessment process are highly effective features, especially when combined with runtime protection."
"It has improved the overall collaboration between SecOps and DevOps. Now, instead of asking people to do something, it is a default offering in the CI/CD. There is less manual intervention and more seamless integration. It is why we don't have many dependencies across many teams, which is definitely a better state."
"It has helped us understand the dynamic topology of our containers, and manage security through the application of policies that our pipelines apply straight from Git."
"The initial setup is fairly straightforward and easy to perform."
"The feature I found most valuable is the API."
"There is [a feature] called cloud registry where we can see a risk assessment for the cloud services being used. If we want to add a new cloud service or a new cloud application, we can check into it and do an assessment through the cloud registry."
"They were very, very aggressive in the market to get a new market share or to take over market share while other companies were being broken up."
"It help us monitor high risk services, blocking them, and also feeding them to our egress points."
"Data loss prevention and user behavior analysis are two valuable features."
"Good anti-virus filtering, URL categorization, and reporting capabilities."
"The stability is the most valuable feature. We haven't had any issues with the product."
"The solution's container security could be improved."
"The remediation workflow within the Wiz could be improved."
"We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade... We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately."
"Wiz's reporting capabilities could be refined a bit. They are making headway on that, but more executive-style dashboards would be nice. They just implemented a community aspect where you can share documents and feedback. This was something users had been requesting for a while. They are listening to customer feedback and making changes."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"The reporting isn't that great. They have executive summaries, but it's only a compliance report that maps all current issues to specific controls. Whether you look at one subscription or project, regardless of the size, you will get a multipage report on how the issues in that account map to that control. Our CSO isn't going to read through that. He won't filter that out or show that to his leadership and say, "Here's what we're doing." It isn't a helpful report. They're working on it, but it's a poor executive summary."
"The only thing that needs to be improved is the number of scans per day."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
"It would be nice Prisma Cloud merged its modules for CSPM and infrastructure as code. It would simplify the pricing and make it easier for customers to evaluate the solution because there are different modules, and you need to add it to your subscription separately."
"The first time I looked at Prisma Cloud, it took me a while to understand how to implement the integration or how to enable features by using the interface for integration. That portion can probably be improved."
"The visibility on the SIEM needs to be streamlined so we can get the data without any issues."
"We face some GUI issues related to new permissions for AWS. So far, we don't have any automation to complete them through the GUI. We have to manually update the permissions. Our customers have faced some issues with that."
"This solution is more AWS and Azure-centric. It needs to be more specific on the GCP side, which they are working on."
"There is room for improvement on the logging and monitoring front because it's still not as holistic as I would want it to be."
"The alignment of Twistlock Defender agents with image repositories needs improvement. These deployed agents have no way of differentiating between on-premise and cloud-based image repositories. If I deploy a Defender agent to secure an on-premise Kubernetes cluster, that agent also tries to scan my ECR image repositories on AWS. So, we have limited options for aligning those Defenders with the repositories that we want them to scan. It is scanning everything rather than giving us the ability to be real granular in choosing which agents can scan which repositories."
"A couple of exporting functionalities should be more user-friendly because if I want to export something, I can get a lot of data visible to that particular CSV."
"MVISION Cloud is not well known and there should be more information about the solution. There could be integration to local applications."
"The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer."
"User interface could be more intuitive."
"One area for improvement I've seen in Skyhigh Security is that it lacks support for unsanctioned applications, where customers have their applications. Those applications do not come from Microsoft or other popular vendors. For example, Microsoft has support for Teams and it has support for OneDrive, but it doesn't have support for custom applications built by customers. Customers have internal teams building and publishing applications to the external world, but Skyhigh Security doesn't have support for those applications, and this is the main problem I've seen. The solution only supports a pool of applications that are from Microsoft and other major SaaS vendors. McAfee doesn't provide support for custom applications, compared to other vendors who provide it. For example, Bitglass and Netskope both have support for custom applications. Another area for improvement in Skyhigh Security is that its API support is a little weak. I also have not seen a strong integration between the solution and other McAfee products."
"The documentation could be improved."
"The pricing of the solution could be adjusted to make it more reasonable."
"They could be integrated with CASB. I think normally McAfee has this solution in the cloud, but for us the best is on-premise."
"You can integrate Skyhigh's rules with Active Directory groups. For example, you can allow access to a specific website for a defined set of users. I can do that, but the rules are not straightforward. It can look up the group in Active Directory. However, it doesn't always find the proper group name. The rule configuration should be simpler and more granular. The admin should be able to map 80 groups in the rules quickly."
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
Prisma Cloud by Palo Alto Networks is ranked 1st in Cloud Security Posture Management (CSPM) with 82 reviews while Skyhigh Security is ranked 14th in Cloud Security Posture Management (CSPM) with 51 reviews. Prisma Cloud by Palo Alto Networks is rated 8.4, while Skyhigh Security is rated 8.4. The top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". On the other hand, the top reviewer of Skyhigh Security writes "Good scalability, but the technical support service needs improvement". Prisma Cloud by Palo Alto Networks is most compared with Microsoft Defender for Cloud, Aqua Cloud Security Platform, AWS Security Hub, CrowdStrike Falcon Cloud Security and AWS GuardDuty, whereas Skyhigh Security is most compared with Zscaler Internet Access, Netskope , Microsoft Defender for Cloud Apps, Symantec Proxy and Forcepoint Secure Web Gateway. See our Prisma Cloud by Palo Alto Networks vs. Skyhigh Security report.
See our list of best Cloud Security Posture Management (CSPM) vendors and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.