We performed a comparison between AWS PrivateLink and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out what your peers are saying about OpenVPN, Fortinet, Cisco and others in Enterprise Infrastructure VPN."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"To quarantine and clean a malware file provides a lot of security."
"The users can securely access any cloud data centers or cloud platforms. In terms of the features, it has all the features that Palo Alto Next-Generation Firewall has. It is also very stable and scalable."
"It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
"The product's initial setup phase is simple."
"We have an application called ADEM that helps us troubleshoot network-related issues. It helps us to isolate an issue whether it is on the ISP level, endpoint level, or system access level."
"Palo Alto Firewall is one of the best firewalls in the world."
"The most valuable feature is the zero-trust part of this solution."
"Prisma integrates well with Cortex XDR and Cortex Data Lake. My company has been also using Prisma Access in-house for nearly a year, and it integrates seamlessly."
"There must be a more easy-to-use GUI."
"Security is an area of concern in the product where the solution needs to improve."
"There is room for improvement in the multi-environment visibility, especially around containers."
"The product's current price is an area of shortcoming where improvements are required."
"Dependencies of applications sometimes is a bit confusing."
"The price can be reduced to make it more competitive."
"Prisma would be a stronger solution if it could aggregate resources by project or by application. So say we have an application we've developed in AWS and five applications we've developed in Azure. The platform will group it according to those applications, but it's based on the tags we use in Azure, which means I have to rely on development teams to tag resources properly."
"They can add some new characteristics. For example, when an incident triggers, they can automatically send a template for a particular match that is related to the policy. We don't have that right now. It is something to improve. There could be more automation for certain actions. For example, for a particular group, it can send an administrator alert to their manager. It was one of the concerns of our customers."
"We are using the SaaS offering. We use our applications for microservices. We use Twistlock to scan containers, and it displays these results in Prisma, which is a good feature because we can see vulnerabilities with respect to these containers. We can see everything in a very detailed manner. However, when you have different environments for a single application, such as DEV, QA, PROD, and TEST, all these environments run multiple containers, which can lead to a very high number of containers. In such a scenario, it shows you the alerts for all those containers that have vulnerabilities. If you show the results of all the containers that share the same image, it is not going to add any value. Therefore, they should narrow down the alerts based on a container. It should show information for a single container. Otherwise, the person who is looking at the results gets the impression that he has to fix all these issues. This is something that they can improve."
"When it comes to the VPN, it uses the global protect VPN functionality to connect remotely, but it has a feature limitation for assigning multiple IP sub-links to different user groups. It would be much better if we are able to assign the current IP blocks for the sub-links based on the user groups."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
AWS PrivateLink is ranked 15th in Enterprise Infrastructure VPN with 1 review while Prisma Access by Palo Alto Networks is ranked 5th in Enterprise Infrastructure VPN with 55 reviews. AWS PrivateLink is rated 7.0, while Prisma Access by Palo Alto Networks is rated 8.4. The top reviewer of AWS PrivateLink writes "A highly stable tool that needs to improve its security". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". AWS PrivateLink is most compared with AWS Direct Connect, Microsoft Azure VPN Gateway, Check Point Remote Access VPN, Perimeter 81 and NordLayer, whereas Prisma Access by Palo Alto Networks is most compared with Netskope , Cisco Umbrella, Zscaler SASE, Zscaler Private Access and Prisma SD-WAN.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.