Try our new research platform with insights from 80,000+ expert users

Flow Security vs Wiz comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Flow Security
Ranking in Data Security Posture Management (DSPM)
11th
Average Rating
9.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
Database Security (7th)
Wiz
Ranking in Data Security Posture Management (DSPM)
1st
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
23
Ranking in other categories
Vulnerability Management (3rd), Container Security (2nd), Cloud Workload Protection Platforms (CWPP) (2nd), Cloud Security Posture Management (CSPM) (1st), Cloud-Native Application Protection Platforms (CNAPP) (1st), Compliance Management (2nd), Cloud Detection and Response (CDR) (1st)
 

Mindshare comparison

As of September 2025, in the Data Security Posture Management (DSPM) category, the mindshare of Flow Security is 0.3%, down from 0.4% compared to the previous year. The mindshare of Wiz is 22.2%, down from 26.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Security Posture Management (DSPM) Market Share Distribution
ProductMarket Share (%)
Wiz22.2%
Flow Security0.3%
Other77.5%
Data Security Posture Management (DSPM)
 

Featured Reviews

reviewer2231631 - PeerSpot reviewer
It gives us a risk report that helps us refine our process management by highlighting where we might be exposed
Flow's distinctive capability to analyze both data at rest and data in motion grants us the ability not only to get full visibility and classification of the data within our managed databases but also to visualize the data flows both within and beyond our environment. This enables us to achieve a comprehensive understanding of all our sensitive data, even as it traverses through applications, shadow databases, and external services such as third-party entities and SaaS applications. What we aspire to achieve with Flow is extended visibility into the external services themselves, which will allow us to see the data they contain.
Pietro Villivà - PeerSpot reviewer
Useful for security assessment and maintaining correct security posture
The tool keeps improving on a weekly basis. Wiz enters into a lot of partnerships with other technologies. I don't have any idea about the improvements needed in the tool at the moment. For me, Wiz is a very complete product, but it is not the perfect one. Other technologies are better for our customers' specific use cases. A possible way to grow the tool is by introducing new functionality or features. In the future, the tool can introduce an on-prem infrastructure or platform. Not having an on-prem version can be an obstacle for customers who have a large workload in an on-prem environment. The onboarding can be done in five minutes or five to ten minutes. Then, there is the configuration, and it depends on the type of the use case of the customer. There is a customer that has simple use cases for whom the onboarding can be done in four to eight hours a day. If there are some customers with a lot of use cases and a lot of different cloud providers, more time is needed. In general, we don't need more than five days to deploy the tool, even in the case of a very complex architecture and hybrid cloud environment. To deploy the tool, we need to have access to the account of the customer, and Wiz is a stuff that we need to make with the customer. We do the onboarding together. The customer creates the correct authorization in the cloud platform and gives us the key to connect to the platform, and then the platform connector starts and begins to collect information.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Before implementing Flow Security, we had no mechanism to alert us when third-party contractors were accessing sensitive data or moving it to locations with lower security. Now we know precisely where the data is stored and can assess the risk when someone wants to develop something. Flow Security lowers our risk of a data breach."
"The tool is very powerful in nature."
"The granularity of visibility that the platform provides is the most valuable aspect."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."
"A valuable feature is that Wiz helps in identifying vulnerabilities."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"The tool's most valuable feature is its attack path analysis."
"The security baseline and vulnerability assessments is the valuable feature."
 

Cons

"It provides a good overview of our infrastructure, but I need more end-to-end visibility, and SaaS is one of the gaps."
"We noticed some capabilities that were lacking, specifically ignoring some false-positive Issue findings. The good news - with the latest update, this has been resolved."
"It would be better if, when you get an alert type, you are able to view the regex or alert logic without having to dig through all the different options; it is difficult to find where the alert logic is because you have to go to the investigations and then actually find and search for the individual alert."
"The reporting isn't that great. They have executive summaries, but it's only a compliance report that maps all current issues to specific controls. Whether you look at one subscription or project, regardless of the size, you will get a multipage report on how the issues in that account map to that control. Our CSO isn't going to read through that. He won't filter that out or show that to his leadership and say, "Here's what we're doing." It isn't a helpful report. They're working on it, but it's a poor executive summary."
"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform."
"In Brazil, the cost is a significant issue due to the currency exchange rate."
"The remediation workflow within the Wiz could be improved."
"We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade... We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
 

Pricing and Cost Advice

Information not available
"If one is cheap and ten is expensive, I rate the tool's price as a five out of ten."
"The pricing is fair and comparable to their competitors. The cost seems to be going up, which is a concern. There are potential savings from consolidating tools, but we're uncertain how Wiz's pricing will change over time."
"The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing."
"Wiz is a moderately priced solution, where it is neither cheap nor costly."
"I wish the pricing was more transparent."
"Regarding pricing, it’s more than $100k because we have a very big infrastructure. Our environment supports around three thousand people, and we offer business-to-client financial services to around one million clients, so we rely heavily on Wiz."
"The pricing seems pretty simple. We don't have to do a lot of calculations to figure out what the components are. They do it by enabling specific features, either basics or advanced, which makes it easy to select."
"The cost of the other solutions is comparable to Wiz."
report
Use our free recommendation engine to learn which Data Security Posture Management (DSPM) solutions are best for your needs.
867,370 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
13%
University
10%
Manufacturing Company
7%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
10%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise5
Large Enterprise11
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Wiz?
With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment.
What is your experience regarding pricing and costs for Wiz?
This feedback is not based on much experience yet, as we have only conducted POV or POC.
What needs improvement with Wiz?
In Wiz, if there is one vulnerability that occurs multiple times, it is listed only once. However, even if it is a single vulnerability in the same category, it repeats multiple times. This feature...
 

Comparisons

 

Overview

 

Sample Customers

Information Not Available
Wiz is the fastest growing software company ever - $100M ARR in 18 months: Wiz becomes the fastest-growing software company ever | Wiz Blog  Discover why companies, including Salesforce, Morgan Stanley, Fox, and Bridgewater choose Wiz as their cloud security partner. Read their success stories here: Customers | Wiz
Find out what your peers are saying about Wiz, Palo Alto Networks, Varonis and others in Data Security Posture Management (DSPM). Updated: August 2025.
867,370 professionals have used our research since 2012.