We performed a comparison between Odo and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two ZTNA as a Service solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We have access to great functionality while establishing a remote connection."
"The solution is stable and without any issues at this moment."
"The advanced protection, centralized administration, and the ability to have experts hand in hand providing us with good best practice solutions and centralized management have been useful."
"Odo helped us a lot to be able to efficiently, effectively, and robustly have our employees who will work from their homes in times of the pandemic."
"It supports auto-scaling for mobile users. It auto-scales depending on the mobile user traffic. For example, if 1,000 people are working from home today, and tomorrow, the number increases to 2,000, it is not going to be an issue."
"The most valuable features of the solution stem from the fact that it offers stability and scalability while being a very secure product."
"The tool's consolidation is pretty quick."
"The product's initial setup phase is simple."
"Security is absolutely spot-on, really top-notch. It's the result of all the components that come together, such as the HIP [Host Information Profile] and components like Forcepoint, providing end-user content inspection, and antivirus. It incorporates DLP features and that's fantastic because Prisma Access makes sure that all of the essential prerequisites are in place before a user can log in or can be tunneled into."
"The solution improved the consistency of our security controls and the BCP. There has been a 20 percent reduction in TCO. Prisma Access also enabled us to deliver better applications by centralizing security management."
"The protection for web-based applications was helpful for my colleagues who didn't want a particular application on their devices. And the non-web access protection was more for our developers because they were writing and building code on their computers. Prisma Access was able to protect them."
"A feature I've found very helpful is run time security because most of the products on the market will look at security during the build time, and they don't really look at what happens once you're going into production."
"They should centralize the configuration interfaces into a single pane since sometimes a point is being configured, and you have to move to another point to finish the configuration."
"Until now, I have not found anything that I do not like about this service, however, security trends and vulnerabilities will always exist and there should always be new ways to protect the perimeters of our corporate infrastructure."
"We'd like this simplified to provide a prompt and efficient installation since, in many cases, the solution or the guides provided by the manufacturer are a bit complex."
"Scalability is very limited."
"I would like to see better pricing and an easier logging process. Also, if there was a way to log a global log, everything could go onto the system. It would be better if there was a third log, otherwise one would have to do everything manually."
"Its integration with non-Palo Alto products can be improved. Currently, it is easy to integrate it with other Palo Alto products such as Cortex XDR. It integrates well with other Palo Alto products. A major part of our network is based on Palo Alto products, but for those companies that use multi-vendor products in their infrastructure, Palo Alto should optimize the integration of Prisma Access with the network devices from other vendors."
"The cloud setup is straightforward, and the onboarding process is much better, but the on-premises initial setup is slightly complex."
"Though the monitoring is fine, the solution should improve its application graphs and interface monitoring."
"We would like to see improvements in the licensing; currently, Palo Alto provides 500 to 1000 licenses for users, and we want to see 1500 to 2000 licenses for one version."
"It applies commits to the firewalls slowly. There isn't an API you can use for anything. We've previously had trouble with the egress IP addresses though we expressed to engineering that those mustn't change. They changed several times without warning, causing a lot of headaches."
"The user interface could be better. They need to work a little bit on the console. It is similar to their firewalls but not exactly. They need to clean it up a bit."
"The licensing model isn't flexible enough. It's an all-or-nothing model. Other providers in the market allow you to buy modules or add-ons separately. With Prisma Access, you have to purchase the same module for all users."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Odo is ranked 17th in ZTNA as a Service with 4 reviews while Prisma Access by Palo Alto Networks is ranked 2nd in ZTNA as a Service with 58 reviews. Odo is rated 8.0, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Odo writes "Easy to use and manage and straightforward to set up". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Odo is most compared with , whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our Odo vs. Prisma Access by Palo Alto Networks report.
See our list of best ZTNA as a Service vendors.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.