We changed our name from IT Central Station: Here's why

Top 8 Cloud Workload Security Tools

Prisma Cloud by Palo Alto NetworksMicrosoft Defender for CloudCheck Point CloudGuard Posture ManagementMorphisec Breach Prevention PlatformCheck Point Harmony Email & OfficeGuardicore CentraOrca SecurityCisco Secure Workload
  1. leader badge
    Prisma Cloud also provides the visibility and control you need, regardless of how complex or distributed your cloud environments become. It helps to simplify that complexity. Now we know what the best practices are, and if something is missing we know.
  2. leader badge
    It is very intuitive when it comes to policy administration, alerts and notifications, and ease of setting up roles at different hierarchies. It has also been good in terms of the network technology maps. It provides a good overview, but it also depends on the complexity of your network.
  3. Find out what your peers are saying about Palo Alto Networks, Microsoft, Check Point and others in Cloud Workload Security. Updated: January 2022.
    564,729 professionals have used our research since 2012.
  4. leader badge
    The reporting is quite good. It is the most powerful aspect of this solution.The dashboard is intuitive. You know if you're compliant or not, and then it gives you a remediation plan.
  5. leader badge
    Morphisec is a no-brain solution that is efficient and very stable.Morphisec Guard enables us to see at a glance whether our users have device control and disk encryption enabled properly. This is important because we are a global company operating with multiple entities. Previously, we didn't have that visibility. Now, we have visibility so we can pinpoint some locations where there are machines that are not really protected, offline, etc. It gives us visibility, which is good.
  6. We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user.
  7. I found the solution to be stable. The most valuable feature is the visibility of processes and connections.
  8. report
    Use our free recommendation engine to learn which Cloud Workload Security solutions are best for your needs.
    564,729 professionals have used our research since 2012.
  9. The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments.
  10. The most valuable feature is micro-segmentation, which is the most important with respect to visibility.The most valuable feature of this solution is security.
Find out what your peers are saying about Palo Alto Networks, Microsoft, Check Point and others in Cloud Workload Security. Updated: January 2022.
564,729 professionals have used our research since 2012.