Try our new research platform with insights from 80,000+ expert users

Microsoft Defender for Cloud Apps vs Symantec CloudSOC CASB comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 7, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
7th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (7th), Internet Security (3rd), Web Content Filtering (1st), ZTNA as a Service (11th), Secure Access Service Edge (SASE) (10th)
Microsoft Defender for Clou...
Ranking in Cloud Access Security Brokers (CASB)
3rd
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
39
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Microsoft Security Suite (12th)
Symantec CloudSOC CASB
Ranking in Cloud Access Security Brokers (CASB)
20th
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2025, in the Cloud Access Security Brokers (CASB) category, the mindshare of iboss is 2.0%, up from 1.3% compared to the previous year. The mindshare of Microsoft Defender for Cloud Apps is 10.0%, down from 13.0% compared to the previous year. The mindshare of Symantec CloudSOC CASB is 0.7%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Access Security Brokers (CASB)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Jagadeesh Gunasekaran - PeerSpot reviewer
Saves us time, has good visibility, and a single dashboard
The solution is user-friendly and provides great visibility into threats. There are easy options available for specific workflow inspections. We can also get support by going through the Microsoft documentation, which is straightforward. Microsoft Defender for Cloud Apps helps us prioritize threats across our enterprise. It covers us from a compliance perspective and protects our organization's data. Data protection is a very important aspect of any new organization, as we need to protect our data from both external attacks and insider threats. Microsoft Defender for Cloud Apps helps us monitor for abnormal activity by insiders, which is one of the most important access points for attackers today. Additionally, the different cloud apps that Defender for Cloud Apps supports provide us with much more visibility into potential threats and activities on the internet. We have integrated Microsoft Defender for Cloud Apps alerts with Sentinel. The integration is straightforward. We can find the configuration details on Microsoft's official documentation website. If we are familiar with how Microsoft products work, we will be able to follow the instructions clearly. Microsoft Defender for Cloud Apps and Sentinel work natively together to deliver coordinated detection and response across our environment. Our integrated Microsoft solutions provide comprehensive threat protection, covering most of the tactics and techniques relevant to the MITRE ATT&CK framework. Sentinel allows us to ingest data from our entire ecosystem. When implementing an SIEM solution, there are always prerequisites such as Active Directory logs, security logs, firewall logs, and DNS logs. These are important logs that need to be ingested into the environment. Sentinel has many third-party connectors available that make integrations straightforward. Microsoft provides the configuration details in the Sentinel platform. It is important to integrate all relevant log sources into the SIEM solution so that we can detect and be alerted to any type of threat factor, whether it is from an internal or external source. Integrating third-party solutions into the platform requires a separate configuration, but Microsoft provides the necessary information. However, we need to have the appropriate permissions to execute these setups. Sentinel provides a centralized dashboard that covers threat management and configuration. It gives us complete insight into what entities are accessing, as well as full details for investigation. We can see how the alerts and threats are relevant to suspicious activities, whether they are related to malicious IP addresses, suspicious ASHAs, or any other indicators of compromise. All of this relevant data can be seen in a single pane. Recently, Microsoft introduced a new investigation experience in a single pane. This means that we can now get a lot of details in a single pane, without having to go there and execute a query. There are a lot of new insights being developed in the Sentinel platform these days. It has software intelligence. They recently introduced Microsoft Defender Threat Intelligence, which covers almost all IOCs. This protects organizational assets from threats and suspicious traffic associated with IOCs. If a match is found, alerts are generated. This is a very interesting feature. Another great feature is automation and logic apps. We can create a number of operations, such as posting in a team's channel if a severe incident occurs or sending an email notification. There are many operations available, so we can automate a lot of tasks. Microsoft Defender for Cloud Apps helps us stay compliant. It has predefined mechanisms in place to prevent attacks. For example, if an external user tries to access our SharePoint folders or files, an attack will be blocked. This is why it is important to give appropriate access to guest users. Microsoft Defender for Cloud Apps has many features and benefits. It provides a number of policies that can be configured to meet the specific needs of our security team. These policies can be used to customize cloud applications so that only authorized users can access them and perform operations that benefit the organization. In terms of safety and security, Microsoft Defender for Cloud Apps is top-notch. Using the solution's automation features, we can suppress false positive alerts. We can also close alerts, lower their severity from "high" to "low" or "informational," or close them immediately with the appropriate commands. This will depend on the configuration automation rule and the perspective from which we are testing. Microsoft Defender for Cloud Apps provides a single console. We are also provided with Microsoft templates to enable workbooks instantly. Alternatively, we can build our own customized workbooks to provide better insights and improve our SOC efficiency and overall performance. Consolidating all of our security data into one dashboard has saved our security operations team a significant amount of time. From an analyst's perspective, it is now much easier to correlate events, investigate alerts, and visualize specific entities. For example, an analyst can quickly see all of the alerts associated with a particular IP address, or they can view all of the activity for a specific entity over the past 24 hours or 7 days. This level of detail and insight would not be possible if our data were siloed in multiple dashboards. The single dashboard saves our operations approximately 20 hours per week by eliminating the need to access multiple consoles and tabs. Microsoft Defender for Cloud Apps threat intelligence can help us prepare for potential threats before they happen. However, it depends on how we develop the policies for the database to block or ignore things in our environment.
cto543714 - PeerSpot reviewer
Works very well in a hybrid environment in terms of DLP policies, but trying to do your own troubleshooting can be a little bit difficult
It does scale. They have different data centers spread out for you to do things. It scales just fine, but it is the setup and configuration that you have to do in order for it to scale the way you want it to. I know that some of the newer technologies, such as Zscaler, are doing SD-LAN type connections and things of that sort to improve performance and scalability. So, things are still evolving in terms of scalability. Depending on how you deployed it, you can run into some performance gotchas. If you take a VPN connection and try to overtax it, you can run into problems. You can't say that it didn't scale. You have to use a different method to get the traffic, or you may have to set up two VPN tunnels or things of that sort. So, if you want it to scale, you have to think it through and make sure you are deploying it in a manner to scale. It can scale, but you have to plan it and make sure you think everything through.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Our primary use case for this product is DLP,"
"Content filtering is the most useful feature of iboss."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"Microsoft Defender for Cloud Apps is very comprehensive, providing a complete 360-degree view of applications within an organization."
"We have become more aware of what services our users are using, how often they are using them, and what data is being sent out of the organization and to which services. So, it is really a lot about visibility and helping us make decisions based on that. It drives some of our policy decisions for adding extra security controls."
"The ability to prevent users from using certain applications is one of the most valuable features. It doesn't require any configuration for implementation from the client perspective. It just works right away and gives you the information you need."
"The feature that helps us in detecting the sensitive information being shared has been very useful. In addition, the feature that allows MCAS to apply policies with SharePoint, Teams, and OneDrive is being used predominantly."
"In Microsoft Defender for Cloud Apps, there is an option to enable files. Once you enable that, it will give you all the files in your organization and where they are located in the cloud... That feature is very useful for investigation purposes."
"I like the alert policies because they are quite robust. It has some built-in templates that we can easily pick up. One of them is the alert for mass downloads, when a particular user is running a massive download on your SharePoint site."
"The product’s most valuable feature is SQL database."
"On-demand scanning is the most valuable feature. In addition, it's a fairly fluid product. It syncs back to the cloud and provides metrics. It's pretty intelligent."
"The value in some of these solutions is just the integration of technologies with their on-prem DLP solution. So, you can tie on-prem and cloud DLP policies together. You can apply on-prem policies to the cloud to have consistent policies in a hybrid environment. So, it works very well in that hybrid environment of on-prem and cloud."
"This solution has improved my organization because it allows us to have visibility and monitoring over our global workforce connectivity to Office 365 and for Service Now."
"The active directory integration is very valuable as we can connect to the list of users that we have and the cloud control, the blocking, the access control of the cloud, can be handled by this product."
"The monitoring and threat protection were the solution's most valuable features."
"One of the most valuable features of Symantec CloudSOC CASB is its detection functionality. It uses the same base as Data Loss Prevention, allowing for close integration between on-premises DLP and the Symantec CloudSOC CASB. This integration lets you manage policies and incidents across both platforms."
"The ability to monitor for threats is the solution's most valuable aspect."
 

Cons

"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"Our iboss subscription access should be more secure with an OTP or VPN etc. It is easy to gain access if, for example, hackers obtain my username and password."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"One thing I would like to see differently with their Zero Trust platform is that some of the AI aspects related to high-risk activities have more false positives."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"Generally, the pricing can always be improved along with the management system."
"The integration with macOS operating systems needs to be better."
"They should continue integration with all other Microsoft security-related products. The integration with all the other products is still ongoing."
"Defender for Cloud apps is primarily useful for Azure apps. It has limited capabilities for applications based on other cloud platforms."
"I want them to enhance in-session policy."
"The product is very good so far, however, it would be better if it could include more up-to-date threat protection."
"I would like for it to be available on Mac and for it to support all of the features of Microsoft financing products. It is really for Windows."
"We are having trouble with our continuous reporting configuration and struggling with configuring the collector properly with our log parsing. We've also faced difficulties getting support for this issue. It's taken us months to figure this out after going through a couple of different support channels."
"I would like to see them develop the ability to integrate it with a central management system."
"The data security needs improvement. We should be able to leverage it a bit better for situations where someone may be trying to upload documents onto the cloud application."
"The solution should work to incorporate some machine learning policies like IDM and VML."
"They have some room for improvement in terms of being able to do troubleshooting. If you're trying to troubleshoot it, you have to work a lot with their backend people in order to get to a solution. So, trying to do your own troubleshooting can be a little bit difficult."
"It's a niche product. Not many people use it, and therefore there isn't as much of a knowledge base surrounding it."
 

Pricing and Cost Advice

"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is expensive compared to one of its competitors."
"The overall pricing for iboss is very competitive and transparent."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"Where we are right now, this is an acceptable pricing. I would like to see more transparency given to the end user. The end user given to us is via the cloud service provider. There are different programs and license models. Some include this, and some include that. It is all over the place. There can be a little more consistency or simplification in the pricing so that your parts list is not ten pages long, and you are not trying to determine, "If I have an E3, does this cover that?", or "Do I need to pay separately for the license?" Simplification would probably be better."
"It has fair pricing. You pay for what you get. As far as I know, there are no costs in addition to the standard licensing fee."
"We utilize the Microsoft E5 licensing, which encompasses the entire Microsoft suite; however, it is costly."
"The pricing is in the middle. It isn't too cheap or expensive compared to other antivirus or security products. It is priced according to industry standards."
"The pricing is a little bit high but right now, we are okay with it because of the compatibility with Office 365, Teams, and Azure AD."
"The cost could be improved when you need to pay for anything. For example, refreshing files takes time to load, though it may be my Internet. To improve the refresh time, Microsoft says that we need to pay for a Premium license, and I don't like paying for things that help make a solution better."
"The product's pricing seems fair."
"The pricing is fair."
"It compares well with the competition because they're all priced on a per-user basis. I've seen the rest of them. There is definitely a huge price difference between them."
report
Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
856,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
8%
Government
6%
Computer Software Company
16%
Financial Services Firm
12%
Manufacturing Company
8%
Government
7%
Financial Services Firm
27%
Comms Service Provider
9%
Real Estate/Law Firm
9%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
Which is the better security solution - Cisco Umbrella or Microsoft Cloud App Security?
Cisco Umbrella is an integral component of the Cisco SASE architecture. It integrates security in a single, cloud-nat...
What do you like most about Microsoft Cloud App Security?
It does a great job of monitoring and maintaining a security baseline. For us, that is a key element. The notificatio...
What is your experience regarding pricing and costs for Microsoft Cloud App Security?
My impression on the pricing, setup costs, and licensing of Microsoft Defender for Cloud Apps is that it's fair. I do...
What needs improvement with Symantec CloudSOC CASB?
After integrating the Gatelet with a live environment, users experienced connectivity issues because they were not im...
What is your primary use case for Symantec CloudSOC CASB?
The solution helps detect and control data in the cloud, focusing on Shadow IT and Shadow Data. The audit module help...
 

Also Known As

iBoss Cloud Platform
MS Cloud App Security, Microsoft Cloud App Security
CloudSOC, Symantec CloudSOC
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Customers for Microsoft Defender for Cloud Apps include Accenture, St. Luke’s University Health Network, Ansell, and Nakilat.
Globe Telecom
Find out what your peers are saying about Microsoft Defender for Cloud Apps vs. Symantec CloudSOC CASB and other solutions. Updated: June 2025.
856,873 professionals have used our research since 2012.