PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias.
Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why.
You can read user reviews for the Top 5 Cloud Workload Security Software Tools to help you decide which solution is best for you.
Users compare and give feedback on Cloud Workload Security Software Tools that they’ve used — based on product reviews, ratings, and comparisons.
#1 Prisma Cloud by Palo Alto Networks
Prisma Cloud by Palo Alto Networks is ranked as PeerSpot’s #1 Cloud Workload Security Software Tool. Our users give Prisma Cloud by Palo Alto Networks an average rating of 8 out of 10.
Luke L., Cloud Security Specialist at a financial services firm, says, “For me, what was valuable from the outset was the fact that, regardless of what cloud service provider you're with, I could segregate visibility of specific accounts to account owners. For example, at AWS, you might have an estate that's solely managed by yourself, or there might be a number of teams within the organization that do so. You can also integrate with Amazon Managed Services. You can also get a snapshot in time, whether that's over a 24-hour period, seven days, or a month, to determine what the estate might look like at a certain point in time and generate reports from that for vulnerability management forums.”
A Director of Cloud Engineering at a pharma/biotech company mentions, "The ability to monitor the artifact repository is one of the most valuable features because we have a disparate set of development processes, but everything tends to land in a common set of artifact repositories. The solution gives us a single point where we can apply security control for monitoring. That's really helpful."
A Security Architect at an educational organization comments, "The application visibility is amazing. For example, sometimes we don't know what a particular custom port is for and what is running on it. The visibility enables us to identify applications, what the protocol is, and what service is behind it. Within Azure, it is doing a great job of providing visibility. We know exactly what is passing through our network. If there is an issue of any sort we are able to quickly detect it and fix the problem."
#2 Microsoft Defender for Cloud
Microsoft Defender for Cloud is ranked as PeerSpot’s #2 Cloud Workload Security Software Tool. Our users give Microsoft Defender for Cloud an average rating of 8 out of 10.
PeerSpot user Rajanikanth P., Associate Principal - Cloud Solutions at Apexon, says, "It is very intuitive when it comes to policy administration, alerts and notifications, and ease of setting up roles at different hierarchies. It has also been good in terms of the network technology maps. It provides a good overview, but it also depends on the complexity of your network."
Thiago A., Global Cloud Security Architect at a consumer goods company, states, "One of the features that I like about the solution is it is both a hybrid cloud and also multi-cloud. We never know what company we're going to buy, and therefore we are ready to go. If they have GCP or AWS, we have support for that as well. It offers a single-panel blast across multiple clouds."
Shaik F., Network & Security Architect at SNP Technologies, Inc., explains, "It has seamless integration with any of the services I mentioned, on Azure, such as IaaS platforms, virtual machines, applications, or databases, because it's an in-house product from Microsoft within the Azure ecosystem."
#3 Check Point CloudGuard Posture Management
Check Point CloudGuard Posture Management is ranked as PeerSpot’s #3 Cloud Workload Security Software Tool. Our users give Check Point CloudGuard Posture Management an average rating of 8 out of 10.
An Advisory Information Security Analyst at a financial services firm expresses, “The policy compliance piece is probably the most valuable. It provides monitoring of your environment and whether you are actively looking at it. So, if I have a user who will try to spin up a network in the cloud that isn't inline with our policies, it will automatically stop that from being able to be created, then delete it. Therefore, it will take action whether or not we are explicitly looking at the platform, keeping it in compliance with the rest of the company at all times.
Basil D., Sr. Manager IT Security at a financial services firm, says, "It helps us to analyze vulnerabilities way before they get installed in production and the web. It gives us more security in the production environment."
A Network Security Engineer/Architect at a tech services company mentions, "On Dome9, you can have reports on compliance, users created, and EAM access to the cloud infrastructure. For example, if some machine is exposed to the Internet, importing and exporting to the Internet when it shouldn't, we get immediate alerts if someone does this type of configuration by mistake. Dome9 is very important because AWS doesn't protect us from this. It is the client's responsibility to make sure that we don't export things to the Internet. This solution helps us ensure that we comply with our security measures."
#4 Morphisec Breach Prevention Platform
Morphisec Breach Prevention Platform is ranked as PeerSpot’s #4 Cloud Workload Security Software Tool. Our users give Morphisec Breach Prevention Platform an average rating of 10 out of 10.
Dominic P., Information Technology Manager at a financial services firm, comments, "Morphisec stops attacks without needing to know what type of threat it is, just that it is foreign. It is based on injections, so it would know when a software launches. If a software launches and something else also launches, then it would count that as anomalous and block it. Because the software looks at the code, and if it executes something else that is not related, then Morphisec would block it. That is how it works."
Jeff M., Sr. IT Architect at Yaskawa Motoman Robotics, says, "There are two primary valuable features. It works without the end-user having to do anything. It just works. Second, the fact that it's signatureless is valuable. It's very light on the endpoint and does not have any performance hindrance on the endpoint. That is a huge plus as well. We've used some other products in the past that just really bogged down the machine. If we do scans in the background, and I get a request that someone wants to do scans at night, it's fine. You can take your computers home and turn them off in the evening. I don't have any of those kinds of issues with Morphisec.”
#5 Check Point Harmony Email & Office
Check Point Harmony Email & Office is ranked as PeerSpot’s #5 Cloud Workload Security Software Tool. Our users give Check Point Harmony Email & Office an average rating of 10 out of 10.
David A., Manager Firewall and Security at W.R. Grace & Co., mentions, "The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
David U., CISO at IMC Companies, states, “The mail firewall and the Office 365 Control are its two most valuable features. It is very intuitive. It is a point and click type of deal. The other slick thing is it has a cleanup process. So, we can set it up and tell it to just deliver files that have been cleaned or transformed to a clean type of document.”