We performed a comparison between GoodAccess and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Secure Web Gateways (SWG) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution is stable."
"This simple, stable, affordable VPN solution scaled with us over the first year of use, allowing for an expansion of remote/hybrid workers to remotely access key systems otherwise restricted to our internal office network."
"Access control allows us to manage permissions efficiently, ensuring secure and tailored access."
"The VPN's role in facilitating remote work has improved internal efficiency."
"No extra hardware is needed, and it is very easy to set up"
"GoodAccess offers a very available professional support service - it can be via chat service, email, or phone."
"GoodAccess VPN has brought a transformative shift to our organization, notably enhancing collaboration and enabling seamless remote work."
"The solution has easy-to-use administration and offers an easy implementation."
"We love the simple interface and speed and reliability of the system."
"It supports auto-scaling for mobile users. It auto-scales depending on the mobile user traffic. For example, if 1,000 people are working from home today, and tomorrow, the number increases to 2,000, it is not going to be an issue."
"The features I find most valuable is WildFire, user integration, and the basic technology features."
"Prisma helped us build a moat around our production systems. It's now impossible to log into our production from a non-MDM laptop. Prisma Access provides decent security overall."
"The protection for web-based applications was helpful for my colleagues who didn't want a particular application on their devices. And the non-web access protection was more for our developers because they were writing and building code on their computers. Prisma Access was able to protect them."
"The stacked policies, event policies, and routing policies are easy to understand for someone with general knowledge."
"The Autonomous Digital Experience Management (ADEM) offered by Palo Alto is a good reporting tool. It gives insights into how things are going within the network. It takes all the data from the users' endpoints and does an analysis, and it suggests changes as well."
"Security is absolutely spot-on, really top-notch. It's the result of all the components that come together, such as the HIP [Host Information Profile] and components like Forcepoint, providing end-user content inspection, and antivirus. It incorporates DLP features and that's fantastic because Prisma Access makes sure that all of the essential prerequisites are in place before a user can log in or can be tunneled into."
"Prisma Access by Palo Alto Networks is a seamless solution."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"It would be useful to see the weekly usage information within the program itself and a dashboard for all usage data."
"The latest upgrade to the Windows version of the app (unconfirmed on the Mac client) adds some unnecessary stylized animation to the GUI."
"There is one minor drawback to mention: occasionally, the Internet connection tends to slow down noticeably while using the VPN."
"Their recent revision in pricing was a jolt. Though any business understands the need for periodic pricing evaluations, a clearer communication strategy and more gradual changes might have been more palatable for long-term clients like us."
"The price tier is not suited for small teams."
"The interface information could show more information about how threats have occurred. Right now, it only shows basic threat information."
"I've found some bugs."
"There could be a better view of which type of communication is going through the system."
"When we deploy firewall rules via Panorama, we find it's a little bit slow. We have a global environment and might have 100 gateways or VPNs in the cloud. When we deploy something, it tries to deploy it one-by-one, and that can be slow."
"One thing that would help is if we could get a guide. With Cisco, for example, you can just type the problem regarding your Cisco product and you will easily get your solution. In Palo Alto, however, it's not easy to find the solutions."
"They automatically update and they should give us time to fully understand what they're updating so that we can make sure it doesn't impact production."
"It is a managed firewall. When you run into issues and have to troubleshoot, there is a fair amount of restriction. You run into a couple of restrictions where you don't have any visibility on what is happening on the Palo Alto managed infrastructure, and you need to get on a call to get technical assistance from Palo Alto's technical support. You have to get them to work with you to fix the problem. I would definitely like them to work on the visibility into what happens inside Palo Alto's infrastructure. It is not about getting our hands onto their infrastructure to do troubleshooting or fixing problems; it is just about getting more visibility. This will help us in guiding technical support folks to the area where they need to work."
"It's not really Prisma's fault, but when you try to create exceptions you don't really have those abilities. You cannot say, on the management platform, "Hey, for these users I want to create these exceptions." That is one thing that I have gotten some complaints about, and we have faced some challenges there."
"We are using the SaaS offering. We use our applications for microservices. We use Twistlock to scan containers, and it displays these results in Prisma, which is a good feature because we can see vulnerabilities with respect to these containers. We can see everything in a very detailed manner. However, when you have different environments for a single application, such as DEV, QA, PROD, and TEST, all these environments run multiple containers, which can lead to a very high number of containers. In such a scenario, it shows you the alerts for all those containers that have vulnerabilities. If you show the results of all the containers that share the same image, it is not going to add any value. Therefore, they should narrow down the alerts based on a container. It should show information for a single container. Otherwise, the person who is looking at the results gets the impression that he has to fix all these issues. This is something that they can improve."
"Sometimes, you have these notifications sent out about changes in App-IDs, modifications in App-IDs, or even the introduction of entirely new App-IDs to replace. Sometimes, the recommendations are followed, but even then, when the package is installed on the firewall, it gets messed up. I remember a particular one was with Tableau, and suddenly, people weren't able to use Tableau, which is an analytics tool for business."
"The tools' scalability is subject to some limitations when done on-premise due to the need for additional licenses. However, in other scenarios, increasing scalability involves expanding infrastructure to accommodate more third-party VPN access. It is scalable as long as you pay the money. Also, it needs to improve security."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
GoodAccess is ranked 7th in Secure Web Gateways (SWG) with 19 reviews while Prisma Access by Palo Alto Networks is ranked 3rd in Secure Web Gateways (SWG) with 57 reviews. GoodAccess is rated 9.2, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of GoodAccess writes "Robust, allows for remote work, and has comprehensive support". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". GoodAccess is most compared with , whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our GoodAccess vs. Prisma Access by Palo Alto Networks report.
See our list of best Secure Web Gateways (SWG) vendors and best Enterprise Infrastructure VPN vendors.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.