We compared Versa Unified Secure Access Service Edge (SASE) Platform and Prisma Access by Palo Alto Networks across several parameters based on our user reviews. After reading the collected data, you can find our conclusion below:
Initial Setup: The duration required to establish Versa Unified Secure Access Service Edge (SASE) Platform varies, with some users reporting longer timeframes for deployment and setup. Users of Prisma Access by Palo Alto Networks reported similar timeframes for both phases.
Valuable Features: Versa Unified Secure Access Service Edge (SASE) Platform is known for its robust security measures, efficient network connectivity, advanced analytics capabilities, and reliable customer support. Prisma Access by Palo Alto Networks stands out for its advanced threat prevention capabilities, secure remote office and mobile user connectivity, ease of use, scalability, and flexibility.
Room For Improvement: Versa Unified Secure Access Service Edge (SASE) Platform could improve in terms of performance, reliability, user interface, navigation, documentation, and integration options. Prisma Access by Palo Alto Networks needs enhancements in speed, connectivity, compatibility, integration, and customer support.
Setup Cost: Versa Unified Secure Access Service Edge (SASE) Platform is deemed affordable and reasonable, with transparent and flexible licensing terms. Prisma Access by Palo Alto Networks is also regarded as reasonably priced, with a straightforward and user-friendly licensing process.
ROI: Versa Unified Secure Access Service Edge (SASE) Platform offers increased network security, simplified management, improved performance, and cost savings. Users praise its integrative features and flexibility. Prisma Access by Palo Alto Networks also provides positive results and a significant ROI.
Customer Service: Versa Unified Secure Access Service Edge (SASE) Platform stands out for its highly praised customer service and support. Users commend the top-notch assistance and guidance provided by the platform's support team. Palo Alto Networks received positive feedback for its prompt, effective customer service.
Versa Unified Secure Access Service Edge (SASE) Platform is preferred over Prisma Access by Palo Alto Networks. The Versa SASE Platform is praised for its robust security measures, seamless integration, advanced analytics, simplicity of use, and reliable customer support. Users also highlight the positive ROI, reasonable pricing, and flexibility of the Versa SASE Platform. User feedback suggests that Prisma Access could benefit from improvements in speed, performance, seamless integration, and support responsiveness.
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution is stable."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"There are plenty of features this solution provides and the most valuable would be the complete security protection we are receiving. We are provided with similar security that the Palo Alto AWS solution has. This includes features such as a firewall and machine learning AI."
"The features I find most valuable is WildFire, user integration, and the basic technology features."
"The most valuable feature is the ability to join your network and provide access through the VPN."
"It's great that we can make sure a machine meets the minimum requirements before users are allowed to log in."
"The most valuable feature of Prisma Cloud-native, in my opinion, is that it assists in identifying, analyzing, and remediating vulnerabilities."
"It has predefined or preconfigured rules, which are getting periodically updated. They are providing continuous improvements and periodically updating all search queries that they are looking for. That is one thing that helps us to stay vigilant and focused. If we query our AWS account for any breaches or vulnerabilities with any of the cloud tests, and it alerts us based on these predefined rules. It also provides an option to configure our own rules, and based on these rules, it can query the cloud trail logs, pull the information, and trigger alerts in real-time. I haven't explored this feature much because there are multiple accounts, and we don't have enough time to explore this feature. It also provides multiple integrations. When vulnerabilities or breaches are happening, you should be aware of them immediately. It provides integration with tools such as Slack, PagerDuty so that you can get alerted as soon as the high severity stuff comes up. For example, you have a security group that has allowed public traffic on port 22. As TechOps, you should be aware of this immediately. You cannot scan each machine or look into all security groups to identify it. So, Prisma helps us and alerts us when this kind of high-priority stuff comes up. It has different statistics, analytics, and graphs for data. The description of alerts is also pretty good. They describe what are the possible causes for this and what are the solutions. From Prisma Cloud, you can directly go to the AWS account. When you click on an alert, a resource, or a resource ID, it takes you to the AWS console where you need to log in. If you are already logged in, it will take you to that instance directly, and you can fix the issue there. I have found this feature very useful."
"The product's initial setup phase is simple."
"Panorama provides centralized management capabilities for all our firewalls and locations so that we can manage different data centers through a single device, a very valuable feature. We don't have to log into various devices to oversee them individually."
"Versa FlexVNF is a scalable product because it does not have any hardware dependencies. This makes it a versatile solution that can be easily integrated with any firewall."
"Versa is a good centralized solution, where you're setting up your infrastructure in a data center type thing."
"The granularity when it comes to configuration and security features are valuable."
"There are great security and ops features without the need for having a different box for security."
"The most valuable aspects of the solution are the next-generation firewall features and geo-blocking capabilities."
"I like all the features. We utilize different LAN, bandwidth transferring, bandwidth balancing, and mappings. We use it as a centralized solution, and use the same product at all our locations."
"The necessary enhancement pertains to the controller segment, specifically addressing the issue of frequent flapping when a link is left. In the case of Versa Unified, if a link experiences frequent flapping within an entire branch, it triggers instability. Hence, it is imperative that the overall routing system is not contingent solely upon the active dial branches."
"The division of Control Plane and Data Plane is most valuable. It can be deployed anywhere, and you can control it and configure it from anywhere. This is one of the good features of this solution."
More Versa Unified Secure Access Service Edge (SASE) Platform Pros →
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"When we deploy firewall rules via Panorama, we find it's a little bit slow. We have a global environment and might have 100 gateways or VPNs in the cloud. When we deploy something, it tries to deploy it one-by-one, and that can be slow."
"It's not really Prisma's fault, but when you try to create exceptions you don't really have those abilities. You cannot say, on the management platform, "Hey, for these users I want to create these exceptions." That is one thing that I have gotten some complaints about, and we have faced some challenges there."
"Palo Alto needs to improve the GlobalProtect agent to work as a secure web gateway agent, not only as a VPN agent because some companies would want only a secure gateway. They wouldn't want a full VPN. So, Palo Alto has to make the VPN agent work as a secure web gateway agent for those customers who want only the secure web gateway solution."
"It is a managed firewall. When you run into issues and have to troubleshoot, there is a fair amount of restriction. You run into a couple of restrictions where you don't have any visibility on what is happening on the Palo Alto managed infrastructure, and you need to get on a call to get technical assistance from Palo Alto's technical support. You have to get them to work with you to fix the problem. I would definitely like them to work on the visibility into what happens inside Palo Alto's infrastructure. It is not about getting our hands onto their infrastructure to do troubleshooting or fixing problems; it is just about getting more visibility. This will help us in guiding technical support folks to the area where they need to work."
"Sometimes, we encountered a portal crash. When we told Palo Alto they said it might be the browser or cache, but I think they need to improve it on their side."
"The BGP filtering options on Prisma Access should be improved."
"Prisma would be a stronger solution if it could aggregate resources by project or by application. So say we have an application we've developed in AWS and five applications we've developed in Azure. The platform will group it according to those applications, but it's based on the tags we use in Azure, which means I have to rely on development teams to tag resources properly."
"There is some particular traffic that the security team wants to filter out and apply their own policies and they cannot."
"Certainly, there are areas that require enhancement, and the current focus is on improvements. Presently, I believe that the emphasis should be on enhancing user interface (UI) features, particularly over end devices. The issue arises when attempting to log in to Versa from other devices, as the UI is not device-specific. Consequently, guiding someone to log in to Versa antivirus becomes challenging. Despite the absence of issues on the website, the lack of a login scope impedes graphical representation of user data or databases. Since work databases support only a limited range of features, I recommend augmenting features for end devices to address these limitations."
"The VPN feature is relatively new. It came out two releases ago, and they're still fixing that up."
"The stability of FlexVNF's controller and devices could be improved."
"The interface could be simpler."
"Another thing that should be improved in Versa are their firewall features."
"The solution lacks a mobile version where small, manageable platforms can be developed."
"With the pandemic and changing work models, it would be ideal if the product more accessibility options or more diversity within the solution itself."
"I heard about them for the first time just before I started working on Versa. They do have blogs for information, but they could publicize more about the documentation and architecture. It doesn't seem to have that much exposure, and they should work on their customer base more."
More Versa Unified Secure Access Service Edge (SASE) Platform Cons →
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
More Versa Unified Secure Access Service Edge (SASE) Platform Pricing and Cost Advice →
Prisma Access by Palo Alto Networks is ranked 1st in Secure Access Service Edge (SASE) with 57 reviews while Versa Unified Secure Access Service Edge (SASE) Platform is ranked 13th in Secure Access Service Edge (SASE) with 20 reviews. Prisma Access by Palo Alto Networks is rated 8.2, while Versa Unified Secure Access Service Edge (SASE) Platform is rated 8.0. The top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". On the other hand, the top reviewer of Versa Unified Secure Access Service Edge (SASE) Platform writes "A flexible, stable and scalable solution ". Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN, whereas Versa Unified Secure Access Service Edge (SASE) Platform is most compared with Cisco SD-WAN, Fortinet FortiGate, VMware SD-WAN, Cato SASE Cloud Platform and Peplink SpeedFusion. See our Prisma Access by Palo Alto Networks vs. Versa Unified Secure Access Service Edge (SASE) Platform report.
See our list of best Secure Access Service Edge (SASE) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.