Threat Stack Cloud Security Platform and Prisma Cloud by Palo Alto Networks compete in the cloud security space. Prisma Cloud holds the advantage with its comprehensive feature set, offering more robust security coverage compared to Threat Stack, despite higher pricing.
Features: Threat Stack is tailored for AWS, offering real-time monitoring, threat detection, and container security with connectivity for Docker. It provides valuable configuration monitoring and custom rule capabilities. Prisma Cloud offers a broader range of features including multi-cloud security support, vulnerability scanning, compliance management, and runtime protection. It excels in container and serverless security, and integrates well with CI/CD pipelines.
Room for Improvement: Threat Stack could expand support beyond AWS, and enhance its integration with non-AWS environments. Improving user interface intuitiveness and simplifying rule customization could add value. Prisma Cloud could benefit from optimizing resource usage, enhancing ease-of-use in complex environments, and reducing noise from alerts.
Ease of Deployment and Customer Service: Threat Stack offers straightforward deployment with dedicated support, ideal for AWS-focused environments. Prisma Cloud provides seamless deployment across hybrid clouds with solid customer service, supporting complex integrations and broader environments.
Pricing and ROI: Threat Stack offers competitive pricing, delivering good ROI for AWS-focused security needs. Prisma Cloud is priced higher but justifies the cost with extensive features and wider adaptability across different cloud platforms.
It eliminates the need for additional hardware, making it a financially and technically sound investment.
Reputation and data security are the two most important things to a financial institution.
We may have prevented a security breach with remediation of the findings.
They can respond with technical documentation or pass on the case to the next level because it requires the development of a new feature or changing a feature due to a bug.
When you begin to deal with production workloads, issues need to be resolved faster.
You do not even get a valid or contextual answer.
It's very scalable and very easy to use.
It's scalable.
The scalability is also a 10 out of 10.
I would rate it a ten out of ten for stability.
There were some instances when it was not as stable, particularly the Defender setup, where it did not work for three days, so my team had to escalate, and then it suddenly worked.
Prisma Cloud is a stable platform.
From a developer's perspective, especially for organizations like banks developing their applications, ensuring API security before deploying them to the cloud is crucial.
Prisma Cloud is an excellent tool.
Even though documentation was available, it took a while for a new person to understand what integration meant, what will be achieved after the integration, or how the integration needed to be done on the Azure or AWS side.
The cost was not on the higher side.
That's why a lot of our clients are shifting from cloud-native to Prisma Cloud: because of its effectiveness and because it is budget-friendly as well.
The solution is very expensive.
CSPM can audit the current cloud configuration, identify misconfigurations, and assess risk.
It provides security across AWS, GCP, Azure, Oracle, and Alibaba.
Since the agent is already installed in the container, we can protect it directly from the application side.
Company Size | Count |
---|---|
Small Business | 34 |
Midsize Enterprise | 20 |
Large Enterprise | 58 |
Company Size | Count |
---|---|
Small Business | 2 |
Midsize Enterprise | 5 |
Large Enterprise | 2 |
Prisma Cloud by Palo Alto Networks provides comprehensive cloud-native security solutions. It covers dynamic workload identity, automated forensics, and multi-cloud protection, ensuring robust security across diverse cloud platforms.
Prisma Cloud delivers advanced capabilities for managing cloud security across AWS, Azure, and GCP platforms. It offers dynamic workload identity creation, real-time monitoring, and seamless integration into CI/CD pipelines. With automation, centralized dashboards, and enhanced visibility, users effectively manage security misconfigurations and vulnerabilities. While optimizing cloud environments through runtime protection and compliance, Prisma Cloud faces challenges with its navigation, pricing, and limited automation capabilities. Users seek improvements in API security, role-based access controls, and documentation quality, emphasizing the need for enhanced customization and reporting features.
What are the important features of Prisma Cloud?
What benefits or ROI should users consider in reviews?
Industries like finance and telecom rely on Prisma Cloud for managing cloud security posture and container security. Teams utilize its capabilities across hybrid and multi-cloud settings to ensure compliance and robust threat protection. Features like misconfiguration detection and runtime monitoring are critical in promoting security objectives in these sectors.
Threat Stack Cloud Security Platform [EOL] offers robust security features including endpoint monitoring, rule customization, and integration capabilities, with easy connectivity to cloud services like Docker and AWS.
Threat Stack Cloud Security Platform [EOL] provides tools for enhancing security visibility across cloud infrastructure. It supports AWS and Docker integration, facilitating efficient threat detection and management. Users appreciate its capability to configure customizable alerts and monitor endpoints, sessions, API interactions, and cloud services. However, there are areas needing improvement, such as better serverless environment support and reduced alert frequency. The platform services smaller organizations by compensating for limited security resources with its comprehensive monitoring and auditing tools.
What are the key features?In specific industries, Threat Stack Cloud Security Platform [EOL] is utilized for its strength in monitoring cloud infrastructure and preventing unauthorized access. Organizations in fields where cloud operations are critical use it for regular audits and monitoring. Its capabilities in threat management are leveraged to maintain secure operations and compliance, especially where there is no dedicated security team.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.