Top 8 Cloud Workload Security Tools
Prisma Cloud by Palo Alto NetworksMicrosoft Defender for CloudCheck Point CloudGuard Posture ManagementMorphisec Breach Prevention PlatformCheck Point Harmony Email & OfficeGuardicore CentraOrca SecurityCisco Secure Workload
Prisma Cloud also provides the visibility and control you need, regardless of how complex or distributed your cloud environments become. It helps to simplify that complexity. Now we know what the best practices are, and if something is missing we know.
It is very intuitive when it comes to policy administration, alerts and notifications, and ease of setting up roles at different hierarchies. It has also been good in terms of the network technology maps. It provides a good overview, but it also depends on the complexity of your network.
The reporting is quite good. It is the most powerful aspect of this solution.
The dashboard is intuitive. You know if you're compliant or not, and then it gives you a remediation plan.
Morphisec is a no-brain solution that is efficient and very stable.
Morphisec Guard enables us to see at a glance whether our users have device control and disk encryption enabled properly. This is important because we are a global company operating with multiple entities. Previously, we didn't have that visibility. Now, we have visibility so we can pinpoint some locations where there are machines that are not really protected, offline, etc. It gives us visibility, which is good.
We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).
The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user.
I found the solution to be stable.
The most valuable feature is the visibility of processes and connections.
The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments.
The most valuable feature is micro-segmentation, which is the most important with respect to visibility.
The most valuable feature of this solution is security.