We performed a comparison between Perimeter 81 and Prisma Access by Palo Alto Networks based on real Peerspot user reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Perimeter 81 is known for being user-friendly, having SD-WAN capabilities and helpful customer service. However, users suggest that it could improve its customization options and security capabilities. On the other hand, Prisma Access is praised for its top-notch security features, flexibility in policy application and ease of administration. Users suggest that it could improve its end-user requirements and support. Prisma Access is more expensive but is recommended for higher-end organizations, while Perimeter 81 has the potential to provide a positive ROI for its customers.
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution provides us with an easy way to configure and join the VPN with Perimeter 81."
"It keeps us all accountable and ensures secure internet connections while we all work remotely."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
"Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN."
"It helps to quickly get access to the pages I need."
"Scaling Perimeter 81 was easy to do."
"The stacked policies, event policies, and routing policies are easy to understand for someone with general knowledge."
"Prisma integrates well with Cortex XDR and Cortex Data Lake. My company has been also using Prisma Access in-house for nearly a year, and it integrates seamlessly."
"Prisma Access protects all app traffic, so that users can gain access to all apps and that's very important because we need to be able to access everything. It also allows us to access non-web apps; anything internal that we need access to, we can access."
"It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
"The visibility perspective is pretty cool. If I want to know how much data is being used for a specific project, I can look at how much data has been used, from which region, and which users have been connected. That visibility is very good so that I can see how many licenses we have and how many are used."
"Panorama provides centralized management capabilities for all our firewalls and locations so that we can manage different data centers through a single device, a very valuable feature. We don't have to log into various devices to oversee them individually."
"We're now able to go after contracts that require a Zero Trust solution and Prisma's other technology solutions."
"A feature I've found very helpful is run time security because most of the products on the market will look at security during the build time, and they don't really look at what happens once you're going into production."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful."
"One of our challenges is ensuring the security of our cloud-based operations."
"I have found that the log-in/out process takes quite some time."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"There is a very small amount of downtime."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit."
"It applies commits to the firewalls slowly. There isn't an API you can use for anything. We've previously had trouble with the egress IP addresses though we expressed to engineering that those mustn't change. They changed several times without warning, causing a lot of headaches."
"I would like the solution to support a different type of authentication. We can't configure a secondary method for our portal."
"While Palo Alto has understood the essence of building capabilities around cloud technology and have come up with a CASB offering, that is a very new product. There are other companies that have better offerings for understanding cloud applications and have more graceful controls. That's something that Palo Alto needs to work on."
"It's not very easy to use. Sometimes it's buggy and there are problems when doing updates. The user interface is okay, but some configuration items are difficult. I would like it to be less buggy and easier to configure, to better streamline the user experience."
"The BGP filtering options on Prisma Access should be improved."
"Palo Alto Prisma 10 came out over a year ago. Palo Alto added this identity management feature. The legacy way Palo Alto selected which user is sitting on an IP address it passes through has been clunky."
"The Cloud Management application has room for improvement. There are a lot of things on the roadmap for that application; things are going to happen soon."
"One area for improvement is for them to stay on top of keeping their CVEs on their platform up to date."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Perimeter 81 is ranked 6th in Secure Web Gateways (SWG) with 19 reviews while Prisma Access by Palo Alto Networks is ranked 3rd in Secure Web Gateways (SWG) with 31 reviews. Perimeter 81 is rated 9.4, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Perimeter 81 writes "Great user experience, available on mobile, and is easy to set up". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Makes us part of a bigger security ecosystem with updates taken care of for us, but pricing and support need work". Perimeter 81 is most compared with Zscaler Private Access, Cato Networks, Cloudflare Access, Cisco Umbrella and Zscaler SASE, whereas Prisma Access by Palo Alto Networks is most compared with Cisco Umbrella, Netskope , Zscaler Private Access, Prisma SD-WAN and Zscaler SASE. See our Perimeter 81 vs. Prisma Access by Palo Alto Networks report.
See our list of best Secure Web Gateways (SWG) vendors, best Enterprise Infrastructure VPN vendors, and best ZTNA as a Service vendors.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.