We performed a comparison between Prisma Cloud by Palo Alto Networks and Skyhigh Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Ease of Deployment: Prisma Cloud by Palo Alto Networks has a straightforward setup process, while Skyhigh Security's setup can be complex and time-consuming, requiring expertise in McAfee products and cloud-based security. Prisma Cloud does not have any such prerequisites.
Features: Prisma Cloud provides a comprehensive cloud security solution that includes continuous compliance monitoring, auto-remediation, and identity-based micro-segmentation. Meanwhile, Skyhigh Security is known for its strong URL spam filtering and efficient backup features. However, it lacks SD-WAN capabilities that are available with Palo Alto's Prisma Cloud. Prisma Cloud needs to enhance its dashboard customization, automation and integration capabilities, alerting process and support, and more. On the other hand, Skyhigh Security needs to improve its virtual solution, integration, encrypted disk implementation, technical support, and more.
Pricing: Prisma Cloud's pricing is complex and based on credits, while Skyhigh Security has mixed reviews on pricing and licensing. While Prisma Cloud is generally considered expensive, it offers excellent value, and there are no hidden costs. However, additional costs for workload security protections and other features may apply. Skyhigh Security's pricing is okay but needs improvement in terms of value and ROI, and it has an annual licensing cost and expensive hardware.
Service and Support: Prisma Cloud's technical support and account managers have received some positive reviews, but slow response times have been a point of frustration for some customers. Similarly, Skyhigh Security's technical support has been helpful for some users, but others have experienced slow response times and unhelpful engineers.
ROI: Prisma Cloud by Palo Alto Networks and Skyhigh Security both offer benefits such as risk reduction, compliance improvement, and enhanced productivity. Prisma Cloud offers faster issue detection and increased risk clarity, while Skyhigh Security provides increased visibility and control over security posture.
Comparison Results: Prisma Cloud by Palo Alto Networks is the better choice compared to Skyhigh Security. It has comprehensive and effective features, including a management console for easy visibility, continuous cloud compliance monitoring, and identity-based micro-segmentation. Skyhigh Security offers good protection overall, but lacks SD-WAN and has weak API integration and limited training resources.
"I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we have and the applications installed on each. I like Wiz's security graph because you can use it to see the whole organization even if you have multiple accounts."
"With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"The vulnerability management modules and the discovery and inventory are the most valuable features. Before using Wiz, it was a very manual process for both. After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud. We're able to correspond and understand what the vulnerability landscape looks like a lot faster."
"The solution is very user-friendly."
"The security baseline and vulnerability assessments is the valuable feature."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The most valuable feature of Prisma Cloud by Palo Alto Networks is the CSPM, which we use the most. Additionally, the investigation and alerts are useful, and the creation of queries."
"The solution's dashboard looks very user-friendly."
"Prisma Cloud's most important feature is its auto-remediation."
"Prisma scans things and shows all the vulnerabilities and packages that are vulnerable, and which layers, by default, have vulnerabilities. So developers can easily go into the package or a particular layer and make changes to their code. It's very transparent."
"CSPM is very useful because it gives us good policies and violation alerts."
"It has helped us understand the dynamic topology of our containers, and manage security through the application of policies that our pipelines apply straight from Git."
"I like Palo Alto's threat protection and Wi-Fi coverage. It has advanced features like DNS security and sandboxing. The automation capabilities are excellent."
"The most valuable features are vulnerability monitoring, serverless access, container runtime features, and Defender."
"The stability is the most valuable feature. We haven't had any issues with the product."
"Box API features with DLP capabilities."
"Shadow IT reporting capabilities."
"The product has a very high rating from reviewers. It's a well-respected product."
"It is easy to configure rules."
"Offers a very strong URL spam filtering feature."
"The other products that I have evaluated do not have the scalability options that McAfee has."
"The risk rating of each cloud application has been very useful. Whenever we discover a new application is use, we are able to quickly determine if this application is safe to use and whether or not we should allow our end users to be able to access it."
"The only thing that needs to be improved is the number of scans per day."
"Given the level of visibility into all the cloud environments Wiz provides, it would be nice if they could integrate some kind of mechanism to better manage tenants on multiple platforms. For example, let's say that some servers don't have an application they need, such as an antivirus. Wiz could include an API or something to push those applications out to the servers. It would be great if you could remedy these issues directly from the Wiz platform."
"The reporting isn't that great. They have executive summaries, but it's only a compliance report that maps all current issues to specific controls. Whether you look at one subscription or project, regardless of the size, you will get a multipage report on how the issues in that account map to that control. Our CSO isn't going to read through that. He won't filter that out or show that to his leadership and say, "Here's what we're doing." It isn't a helpful report. They're working on it, but it's a poor executive summary."
"One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
"The remediation workflow within the Wiz could be improved."
"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform."
"The automation must continue to become much smoother."
"There are hundreds of built-in policies for AWS and Azure, but GCP and Oracle are not covered as much as AWS. There is a lot of work to do on that part. There is, obviously, a tiny bit of favoritism towards AWS because it has the most market share."
"When there are updates, whether daily, weekly, or monthly, it needs configuration or permission adjustments. There is no automation for that, which is too bad."
"Palo Alto should work on ease-of-use and the user-friendliness to be more competitive with some competing products."
"In terms of improvement, there are some small things like hardening and making sure the Linux resources are deployed well but that's more at an operational level."
"When it comes to protecting the full cloud-native stack, it has the right breadth. They're covering all the topics I would care about, like container, cloud configuration, and serverless. There's one gap. There could be a better set of features around identity management—native AWS—IAM roles, and service account management. The depth in each of those areas varies a little bit. While they may have the breadth, I think there's still work to do in flushing out each of those feature sets."
"We'd like to have more native integration with clouds and additional security checks in the future."
"Prisma Cloud's dashboards should be customizable. That's very important. Other similar solutions are more elastic so you have the power to create customized dashboards. In Prisma Cloud, you cannot do that."
"The performance of the tool can be improved to provide faster report generation."
"It is an expensive solution."
"I would like to see more power being given to the admin. In the sense that in case an employee is facing an issue and they want to configure a service, like attaching an email in Gmail, for example, they should be given the option to make the service request and get that configured on the go."
"Though the Skyhigh Dashboard is processing large amounts of data, the speed of the Dashboard could be improved."
"McAfee Web Gateway could improve the reporting. We have the reporting on a separate server and sometimes the database becomes full. These aspects could improve."
"The solution is hard to configure, our team does not have specific training requirements for McAfee making it difficult."
"I think that the User Interface could be improved."
"The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities."
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
Prisma Cloud by Palo Alto Networks is ranked 1st in Cloud Security Posture Management (CSPM) with 83 reviews while Skyhigh Security is ranked 13th in Cloud Security Posture Management (CSPM) with 51 reviews. Prisma Cloud by Palo Alto Networks is rated 8.4, while Skyhigh Security is rated 8.4. The top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". On the other hand, the top reviewer of Skyhigh Security writes "Good scalability, but the technical support service needs improvement". Prisma Cloud by Palo Alto Networks is most compared with Microsoft Defender for Cloud, Aqua Cloud Security Platform, AWS Security Hub, CrowdStrike Falcon Cloud Security and AWS GuardDuty, whereas Skyhigh Security is most compared with Zscaler Internet Access, Netskope , Microsoft Defender for Cloud Apps, Symantec Proxy and Forcepoint Secure Web Gateway. See our Prisma Cloud by Palo Alto Networks vs. Skyhigh Security report.
See our list of best Cloud Security Posture Management (CSPM) vendors and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.