We performed a comparison between Cisco Umbrella and Prisma Access by Palo Alto Networks based on Peerspot users’ reviews in five parameters. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Cisco Umbrella is commended for its advanced DNS security, user-friendly interface, and extensive licensing options, while Prisma Access is valued for its accessibility, top-quality security features, and adaptable policy application. Nevertheless, there is room for improvement in certain areas for both products, such as pricing and integrability for Cisco Umbrella and support and licensing for Prisma Access. Ultimately, the decision between the two will be influenced by the specific needs and priorities of the organization.
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The solution is stable."
"There is much differentiation within the licensing so if anyone wants DNS security from the DNS security log, we are there already, and if anyone wants to go to a secure internet gateway, that is also available. We can get the integrated cloud DLP license keys. That is a good benefit with Cisco Umbrella. You can get a complete solution in a single licensing."
"The reports and notifications are the most useful part of the platform. As soon as you deploy the security layers, the reporting is very comprehensive. It helps you to have, at a glance, a clear view of what's going on."
"Web proxy adds an effective layer for security."
"A single pane of glass saves time... This does have a lot of options available for us to see who's doing what, what trends, what errors. We can set up our alerting through it as well. It is definitely a great dashboard."
"The agent that gets installed on the endpoints or on people's laptops and devices is a Cisco AnyConnect Umbrella module. It's one of the most impressive things because you are able to protect your users anywhere they are."
"Meraki features and cloud-based functionality are advanced and easy to manage centrally."
"The single-pane-of-glass management is very important. We have a very small team. We can't spend a lot of time going from product to product to product to either investigate or set up policy. We need to have one place that we can go to and set everything up."
"Cisco's technical support is pretty good. When a solution is available, they will find it. On a scale from one to ten with ten being the best, I'd rate Cisco's technical support at nine."
"Prisma's most valuable feature would be its ability to identify bad or risky configurations."
"I like it because it's very easy to use. You install the client and you have to know your gateway, but that's something we give to our users. Beyond that, it takes about three seconds to train them on how to use it. And it just works well. That's great for us because it means less administrative time."
"The solution improved the consistency of our security controls and the BCP. There has been a 20 percent reduction in TCO. Prisma Access also enabled us to deliver better applications by centralizing security management."
"It's great that we can make sure a machine meets the minimum requirements before users are allowed to log in."
"It is easy to use, easy to integrate, and is stable. It's scalable as well."
"The performance is good."
"The features I find most valuable is WildFire, user integration, and the basic technology features."
"Prisma Access gives us security from a single point. It controls mobile users and determines how secure their networks will be, including from where they will get internet access. We can optimize things and add security profiles centrally."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The solution is very expensive in Brazil."
"It would be better if there was a little bit of flexibility for organizations that don't have SD One in their environment. Because of the complexity of the environment, it's not easy to actually turn on the feature of the secure internet gateway for our users. We have not been able to explore that option yet."
"It needs better integration with external threat feeds to improve scoring."
"It could be more secure. It would be better if they provided a transferring proxy as an add-on and more integration."
"They need to improve analytics so they report on more of the specifics of user activity."
"It would be good if the more complex versions of Umbrella are simplified so that we can offer them in a more standardized way. We, as a telco, do not operate the same as a traditional integration partner would, who can sell all its services. We try to have a standardized approach as much as we can so that we can sell the solution with as many services added to it as possible. If you look at the structure of businesses in Switzerland, 95% of them have 10 persons or less, and they do not have a security specialist. Therefore, the higher the automated and standardized features, the better it is for them."
"This solution does not give us full, 360-degree protection."
"I'm hoping for the conversion of Cisco ZTNA's features from Duo to Umbrella."
"When it comes to the VPN, it uses the global protect VPN functionality to connect remotely, but it has a feature limitation for assigning multiple IP sub-links to different user groups. It would be much better if we are able to assign the current IP blocks for the sub-links based on the user groups."
"There is some particular traffic that the security team wants to filter out and apply their own policies and they cannot."
"While Palo Alto has understood the essence of building capabilities around cloud technology and have come up with a CASB offering, that is a very new product. There are other companies that have better offerings for understanding cloud applications and have more graceful controls. That's something that Palo Alto needs to work on."
"Sometimes, you have these notifications sent out about changes in App-IDs, modifications in App-IDs, or even the introduction of entirely new App-IDs to replace. Sometimes, the recommendations are followed, but even then, when the package is installed on the firewall, it gets messed up. I remember a particular one was with Tableau, and suddenly, people weren't able to use Tableau, which is an analytics tool for business."
"The product's current price is an area of shortcoming where improvements are required."
"One thing that would help is if we could get a guide. With Cisco, for example, you can just type the problem regarding your Cisco product and you will easily get your solution. In Palo Alto, however, it's not easy to find the solutions."
"The frequency of updates could be reduced."
"The documentation is generally good, but they could provide a more detailed description of all the configuration steps. I have to search for information or call support. Palo Alto could add more knowledge base articles about configuration with screenshots and walkthroughs. That would be helpful. When configuring a product, you want to see examples of how it is done."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Cisco Umbrella is ranked 1st in Secure Web Gateways (SWG) with 55 reviews while Prisma Access by Palo Alto Networks is ranked 3rd in Secure Web Gateways (SWG) with 25 reviews. Cisco Umbrella is rated 8.8, while Prisma Access by Palo Alto Networks is rated 8.4. The top reviewer of Cisco Umbrella writes "We can see all of our locations in one place and only have to make changes once for all our locations". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Supports auto-scaling for mobile users and provides the ability to create custom threat signatures". Cisco Umbrella is most compared with Zscaler Internet Access, Microsoft Defender for Cloud Apps, Palo Alto Networks DNS Security, Fortinet FortiGate SWG and Infoblox Advanced DNS Protection, whereas Prisma Access by Palo Alto Networks is most compared with Netskope , Zscaler SASE, Zscaler Private Access, Prisma SD-WAN and Zscaler Internet Access. See our Cisco Umbrella vs. Prisma Access by Palo Alto Networks report.
See our list of best Secure Web Gateways (SWG) vendors, best Cloud Access Security Brokers (CASB) vendors, and best Secure Access Service Edge (SASE) vendors.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.