We compared Netskope and Prisma Access by Palo Alto Networks based on our users' reviews across four parameters. After reading all of the collected data, you can find our conclusion below.
Users prefer Netskope for its advanced analytics and granular policy enforcement, while Prisma Access may be a better choice for its scalability and ease of use. Users praise Netskope for its comprehensive data protection capabilities, advanced analytics, and granular policy enforcement. However, they have expressed a desire for a more intuitive interface, better customer support, improved performance during high-traffic periods, and more comprehensive reporting capabilities. Users appreciate Prisma Access for its ease of use, scalability, and flexibility but have concerns about speed and performance, compatibility with certain applications and platforms, and customer support.
Features: Netskope offers comprehensive data protection, advanced threat protection, advanced analytics, and granular policy enforcement. Prisma Access by Palo Alto Networks focuses on robust security measures, advanced threat prevention, secure connectivity, scalability, and flexibility.
Pricing and ROI: Netskope is praised for its competitive pricing options and straightforward setup process, ensuring a smooth customer experience. Prisma Access by Palo Alto Networks is affordable and provides good value for money. The setup cost is reasonable, and the licensing process is user-friendly for both products. Netskope users reported significant value and cost savings, emphasizing its effectiveness in data protection. Prisma Access users also experienced positive results, indicating a significant ROI.
Room for Improvement: Netskope could improve its interface, customer support, performance during high-traffic periods, and reporting capabilities. Prisma Access could enhance its speed and performance, compatibility with certain applications and platforms, and customer support.
Deployment and customer support: Some Netskope users found the initial setup to be simple and quick, as it only involves rolling out an agent and can be deployed on the cloud. However, others mentioned that the implementation phase can be complex and time-consuming, requiring coordination and effort. The deployment process was generally considered easy, especially for those with a networking background. Palo Alto Networks has a setup that varies in terms of ease and complexity. Some users found the initial setup to be straightforward, while others mentioned it was more complex and required help from Palo Alto or a partner. The deployment durations range from a few hours to several months, depending on factors such as the size of the environment and the number of branch offices. Users praise Netskope for their knowledge and expertise in addressing queries and concerns, emphasizing the excellent level of assistance received. Prisma Access received positive feedback for its knowledgeable and friendly staff, who efficiently address concerns and provide valuable guidance.
The summary above is based on 38 interviews we conducted with Netskope and Prisma Access by Palo Alto Networks users. To access the review's full transcripts, download our report.
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The solution is stable."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"In Azure, we have multiple subscriptions and with every subscription, we add some kind of instance ID. We can work with the instance ID so that we allow all of the instances containing nodules. Everything else, we block. This way, if you go to outlook.com and check your email, if you log in with your company account, the instance ID will show. The network will take action according to the instance ID and say, "You are using the enterprise email. I'll let you surf. I'll let you see your email." But when you try to log in with your own email address, like Hotmail or Gmail, the instance ID will be different. This way we are not completely blocking Outlook, but we are blocking people from accessing their Outlook. We are only allowing the enterprise-level emails, and we are not allowing user-based emails."
"Technical support is pretty good."
"The detection capability is very nice and lightweight."
"It's one of the top-ranking solutions in the market, and it's very responsive. We are using Netskope, and Netskope provides a load of features for SQL, STP, and traffic control."
"The most valuable features were related to discovery, data protection, and ensuring compliance with regulations."
"The most useful feature of this solution is Cloud Control, which allows me to schedule cloud uploads."
"The initial setup of Netskope CASB is easy, it is not complex."
"The client size and architectural components in Netskope are far better than other solutions."
"The solution's most valuable features were the model's reduced complexity on the client side and its capability to provide security."
"Being able to use the user ID or Active Directory Group is one of the great features for control and providing more flexibility without worrying about IP addresses."
"The product's initial setup phase is simple."
"It has predefined or preconfigured rules, which are getting periodically updated. They are providing continuous improvements and periodically updating all search queries that they are looking for. That is one thing that helps us to stay vigilant and focused. If we query our AWS account for any breaches or vulnerabilities with any of the cloud tests, and it alerts us based on these predefined rules. It also provides an option to configure our own rules, and based on these rules, it can query the cloud trail logs, pull the information, and trigger alerts in real-time. I haven't explored this feature much because there are multiple accounts, and we don't have enough time to explore this feature. It also provides multiple integrations. When vulnerabilities or breaches are happening, you should be aware of them immediately. It provides integration with tools such as Slack, PagerDuty so that you can get alerted as soon as the high severity stuff comes up. For example, you have a security group that has allowed public traffic on port 22. As TechOps, you should be aware of this immediately. You cannot scan each machine or look into all security groups to identify it. So, Prisma helps us and alerts us when this kind of high-priority stuff comes up. It has different statistics, analytics, and graphs for data. The description of alerts is also pretty good. They describe what are the possible causes for this and what are the solutions. From Prisma Cloud, you can directly go to the AWS account. When you click on an alert, a resource, or a resource ID, it takes you to the AWS console where you need to log in. If you are already logged in, it will take you to that instance directly, and you can fix the issue there. I have found this feature very useful."
"It's great that we can make sure a machine meets the minimum requirements before users are allowed to log in."
"The users can securely access any cloud data centers or cloud platforms. In terms of the features, it has all the features that Palo Alto Next-Generation Firewall has. It is also very stable and scalable."
"The initial setup is very straightforward."
"The visibility perspective is pretty cool. If I want to know how much data is being used for a specific project, I can look at how much data has been used, from which region, and which users have been connected. That visibility is very good so that I can see how many licenses we have and how many are used."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"The solution's implementations can be made much easier because, currently, it is complex in nature."
"If we need to allow a process that is blocked by Netskope, we have to manually check the logs to see why it is blocked. This can be time-consuming and inefficient"
"Netskope needs to improve its stability."
"The configuration and user behaviour analytics can be improved."
"In terms of improvements, enhancing support, particularly for OEM support with quicker response times would be beneficial."
"The solution's documentation still needs to be improved."
"The CSPM model needs to improve."
"The product's high price is an area of concern where improvements are required."
"Their next release should provide solutions for the mobile environment."
"Better integration with the MDM solution would be useful."
"Palo Alto needs to improve the GlobalProtect agent to work as a secure web gateway agent, not only as a VPN agent because some companies would want only a secure gateway. They wouldn't want a full VPN. So, Palo Alto has to make the VPN agent work as a secure web gateway agent for those customers who want only the secure web gateway solution."
"Sometimes, you have these notifications sent out about changes in App-IDs, modifications in App-IDs, or even the introduction of entirely new App-IDs to replace. Sometimes, the recommendations are followed, but even then, when the package is installed on the firewall, it gets messed up. I remember a particular one was with Tableau, and suddenly, people weren't able to use Tableau, which is an analytics tool for business."
"Lacks a hybrid model which has API plus in-line security."
"It would be nice to manage Prisma Access through the cloud instead of through Panorama. You can use the cloud version to monitor Prisma Access, but it doesn't have all the features yet, and it's not 100% done."
"It wasn't so satisfying to work with it. There is room for improvement in the policy management. It is difficult to cover the entire scenery through Palo Alto products."
"Its integration with non-Palo Alto products can be improved. Currently, it is easy to integrate it with other Palo Alto products such as Cortex XDR. It integrates well with other Palo Alto products. A major part of our network is based on Palo Alto products, but for those companies that use multi-vendor products in their infrastructure, Palo Alto should optimize the integration of Prisma Access with the network devices from other vendors."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Netskope is ranked 4th in Cloud Access Security Brokers (CASB) with 35 reviews while Prisma Access by Palo Alto Networks is ranked 3rd in Cloud Access Security Brokers (CASB) with 57 reviews. Netskope is rated 8.4, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Netskope writes "Network proxy that provides visibility during deployment and allows you to control PII". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Netskope is most compared with Zscaler Internet Access, Microsoft Defender for Cloud Apps, Cisco Umbrella, Skyhigh Security and Forcepoint ONE, whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Cisco Umbrella, Zscaler Internet Access, Prisma SD-WAN and Microsoft Defender for Cloud Apps. See our Netskope vs. Prisma Access by Palo Alto Networks report.
See our list of best Cloud Access Security Brokers (CASB) vendors and best Secure Access Service Edge (SASE) vendors.
We monitor all Cloud Access Security Brokers (CASB) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.