Try our new research platform with insights from 80,000+ expert users

Azure Confidential Computing vs Wiz comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Azure Confidential Computing
Ranking in Compliance Management
19th
Average Rating
0.0
Reviews Sentiment
8.5
Number of Reviews
1
Ranking in other categories
Data Privacy Management Software (11th)
Wiz
Ranking in Compliance Management
1st
Average Rating
9.0
Reviews Sentiment
7.1
Number of Reviews
33
Ranking in other categories
Vulnerability Management (1st), Container Security (2nd), Cloud Workload Protection Platforms (CWPP) (2nd), Cloud Security Posture Management (CSPM) (1st), Cloud-Native Application Protection Platforms (CNAPP) (1st), Data Security Posture Management (DSPM) (1st), Cloud Detection and Response (CDR) (1st)
 

Mindshare comparison

As of January 2026, in the Compliance Management category, the mindshare of Azure Confidential Computing is 1.3%, up from 0.1% compared to the previous year. The mindshare of Wiz is 19.4%, down from 27.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Compliance Management Market Share Distribution
ProductMarket Share (%)
Wiz19.4%
Azure Confidential Computing1.3%
Other79.3%
Compliance Management
 

Featured Reviews

Cuneyt-Gurses - PeerSpot reviewer
Director of Cloud Solution Group at DTech Cloud Corporation
Improves confidential data protection but needs improved efficiency in encryption algorithms
I have private data and want to prevent others, including Microsoft, from seeing it, I have control. By setting up a landing zone for sovereignty, the data is stored in MCFS landing zones. This data is encrypted in use, at rest, and in transit. While the data is in use, no third-party user or Microsoft can view, capture, or read it. These landing zones are for specific customers. When I enter an MCFS zone, my data remains strictly confidential, and unauthorized users cannot see it. This is the basic principle. Confidential computing is used for data in use. There are three types of data: in-use, in-transit, and at-rest data. At rest means the stored data is encrypted. In-use data means when the data is in memory, it remains confidential to other users, cloud users, or hackers, preventing data leakage or hacking. None can capture my data. Confidential computing involves data in use. This serves as a reference architecture, not just a unique service. Compliance and governance are core concepts of sovereignty. Sovereignty combines compliance rules with local compliance regulations. Each country can develop its compliance rules and integrate them into Azure. Globally, countries have developed their compliance rules and sovereignty compliance packs for Azure. For example, GDPR is implemented in some countries. In Turkey, there is a regulation named Kaveh Kaka. In Italy, there are specific data classification and compliance rules. They package their computing and compliance rules for Azure, allowing access to Italian compliance rules in Azure. If I implement Microsoft Cloud for Sovereignty landing zones, I see specialized and customized computing packages.
Marcel Velica - PeerSpot reviewer
Senior Program Manager, Security at Eventbrite
Unified cloud visibility has transformed our risk prioritization and reduced alert fatigue while improving collaboration across security and DevSecOps teams
The standout features of Wiz that make it valuable for me include good multi-cloud environment support, data governance, shadow IT detection, DevSecOps governance, automation, level reporting, threat detection, and good infrastructure detection. Wiz has positively impacted my organization by implementing zero trust authorization, providing good reporting that shows the top attack path, critical assets, overall risk posture, and demonstrating AI and ML workload capabilities towards my team, as well as good infrastructure detection and vulnerability detection accuracy with security posture management at massive scale and identity exposure. There is a massive reduction in risk exposure, immediate visibility across the entire cloud estate, reduced noise and better prioritization, stronger DevSecOps collaboration, continuous compliance instead of ad hoc panic, faster incident response with real context, significant cost savings through tool consolidation, and stronger AI and data governance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"When I enter an MCFS zone, my data remains strictly confidential, and unauthorized users cannot see it."
"The benefit of Microsoft Cloud for sovereignty is boundless."
"The solution is very user-friendly."
"The most valuable feature of Wiz is that it keeps information up to date without needing to perform scans or schedule maintenance windows. It provides a fresh snapshot of our vulnerability metrics."
"Wiz has helped me consolidate some tools, as it is not just doing the job of the security tool alone, and we do not need to invest in multiple tools because all aspects such as infrastructure, application, vulnerabilities, and the regular security scoring patterns are in-built into Wiz along with the inventory manager."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"If anyone wants to secure their infrastructure, cloud environment, or Kubernetes cluster, I would strongly recommend Wiz as a tool because it is easy to use and user-friendly."
"Wiz stands out for its strengths, particularly in agentless scanning and graph-based risk prioritization, in addition to its comprehensive CNAPP capabilities and multi-cloud coverage."
"One feature I particularly appreciate about Wiz is that, similar to other cloud-native security tools like Microsoft's Defender for Cloud, it allows you to define policies as code and deploy them through a version control system with a continuous deployment pipeline."
"Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."
 

Cons

"Scientists are still working to improve the efficiency and latency of data in use algorithms."
"There is an improvement area for data in use. It is still a research subject globally."
"In Brazil, the cost is a significant issue due to the currency exchange rate."
"Wiz can be improved with better maturity in code scanning and developer workflows, expanding secret detection to full lifecycle management, stronger IAM across multi-account environments, more transparent attack path scoring and risk modeling, improved AI and ML security scanning, reduced false positives in runtime threat detection, more fine-grained access control and tenant separation, and better integration for serverless workloads."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"As the tool is a good fit for small and medium-sized businesses, the solution should focus on making the product suitable for large-scale businesses."
"One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging."
"The only thing that needs to be improved is the number of scans per day."
"We are still analyzing its behavior as we are in the midst of the implementation."
"The reporting should be improved because until a few months ago, the reports were only in CSV format, which made it difficult to clean up. Wiz tried to improve the reporting process, but it's not as valuable as Tenable."
 

Pricing and Cost Advice

Information not available
"I wish the pricing was more transparent."
"The pricing is fair and comparable to their competitors. The cost seems to be going up, which is a concern. There are potential savings from consolidating tools, but we're uncertain how Wiz's pricing will change over time."
"The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing."
"Wiz is a moderately priced solution, where it is neither cheap nor costly."
"Based on the features and capabilities, the product pricing seems reasonable."
"If one is cheap and ten is expensive, I rate the tool's price as a five out of ten."
"The cost of the other solutions is comparable to Wiz."
"Regarding pricing, it’s more than $100k because we have a very big infrastructure. Our environment supports around three thousand people, and we offer business-to-client financial services to around one million clients, so we rely heavily on Wiz."
report
Use our free recommendation engine to learn which Compliance Management solutions are best for your needs.
879,422 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
9%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise8
Large Enterprise18
 

Questions from the Community

What is your experience regarding pricing and costs for Azure Confidential Computing?
The setup contains an overhead, especially for the nodes used in implementing a landing zone, MCFS landing zone. These nodes are specialized for confidential computing, resulting in some overhead. ...
What needs improvement with Azure Confidential Computing?
There is an improvement area for data in use. It is still a research subject globally. Scientists are working to improve the efficiency and latency of data in use algorithms. For example, they are ...
What is your primary use case for Azure Confidential Computing?
I have utilized Amazon MQ for my Python automation projects. It serves as a middleware layer service for my projects, particularly when using Amazon MQ. I can state that it is one of the essential ...
What do you like most about Wiz?
With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment.
What is your experience regarding pricing and costs for Wiz?
My experience with pricing, setup cost, and licensing for Wiz was through an RFP where they offered us a good price, and the licensing was a flexible solution based on our business.
What needs improvement with Wiz?
I feel there is a delay in detection, though I am uncertain whether this is due to our implementation disadvantage. Wiz can detect all the issues, threats, and security vulnerabilities, but the del...
 

Comparisons

No data available
 

Overview

 

Sample Customers

Information Not Available
Wiz is the fastest growing software company ever - $100M ARR in 18 months: Wiz becomes the fastest-growing software company ever | Wiz Blog  Discover why companies, including Salesforce, Morgan Stanley, Fox, and Bridgewater choose Wiz as their cloud security partner. Read their success stories here: Customers | Wiz
Find out what your peers are saying about Wiz, SentinelOne, Vanta and others in Compliance Management. Updated: December 2025.
879,422 professionals have used our research since 2012.