We performed a comparison between Prisma Cloud by Palo Alto Networks and VMware NSX based on real PeerSpot user reviews.Find out in this report how the two Microsegmentation Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
"As a pure-play CSPM, it is pretty good. From the data exposure perspective, Prisma Cloud does a fairly good job. Purely from the perspective of reading the conflicts, it is able to highlight any data exposures that I might be having."
"I found the network queue sets useful. I also liked the Workload Protection Module, the vulnerability findings, and how the rule sets handle the vulnerabilities based on severity."
"The application visibility is amazing. For example, sometimes we don't know what a particular custom port is for and what is running on it. The visibility enables us to identify applications, what the protocol is, and what service is behind it. Within Azure, it is doing a great job of providing visibility. We know exactly what is passing through our network. If there is an issue of any sort we are able to quickly detect it and fix the problem."
"The most valuable feature is the continuous cloud compliance monitoring and alerting."
"The CVEs are valuable because we used to have a tool to scan CVEs, at the language level, for the dependencies that our developers had. What is good about Prisma Cloud is that the CVEs are not only from the software layer, but from all layers: the language, the base image, and you also have CVEs from the host. It covers the full base of security."
"It has improved the overall collaboration between SecOps and DevOps. Now, instead of asking people to do something, it is a default offering in the CI/CD. There is less manual intervention and more seamless integration. It is why we don't have many dependencies across many teams, which is definitely a better state."
"Technical support is quite helpful."
"We were pleased with Prisma's custom and built-in reports. We could go into the dashboard and see all these notifications telling us which subscriptions didn't have TLS 1.2 enabled. The security controls were the most valuable features."
"The most valuable features of VMware NSX are the tight integration with the VMware Hypervisor natively and the management console. We have a lot of other integrations where you are able to see the virtual machine's end-to-end visibility."
"I have found VMware NSX to be easy to use."
"The most valuable feature of VMware NSX is the ability to set up virtual networking environments."
"Though I haven't been working a lot on VMware NSX, it's good to have. What I like the most about it is that its console is good, and it doesn't take a lot of effort in terms of doing my daily tasks on it or what it's meant for. VMware NSX is still a preferred product in the market."
"The alert features are the most valuable."
"The most valuable features are ease of use and user interface."
"Overall, I would say the solution has been quite stable."
"The most valuable features are stability and low cost."
"Areas like the deployment of their defenders and their central control need manual intervention. They should focus more on automation. They have a very generic case for small companies. However, for bigger companies to work, we have to do a lot of changes to our system to accommodate it. Therefore, they should change their system or deployment models so it can be easy to integrate into existing architectures."
"While Prisma provides a lot of visibility, it also creates a ton of work. Most customers that implement Prisma Cloud have thousands of alerts that are urgent."
"They charge seven workloads for monitoring one compute, and that is quite expensive. This makes it difficult to move fully with the compute part because of the workload."
"One of the main backlogs in their development is in the area of integration. For example, we have ServiceNow in place for ticket management and Prisma Cloud is supposed to send closure emails for incidents. But from time to time, it fails to do so. We have several other mismatches between Prisma Cloud and ServiceNow."
"When it comes to protecting the full cloud-native stack, it has the right breadth. They're covering all the topics I would care about, like container, cloud configuration, and serverless. There's one gap. There could be a better set of features around identity management—native AWS—IAM roles, and service account management. The depth in each of those areas varies a little bit. While they may have the breadth, I think there's still work to do in flushing out each of those feature sets."
"The access controls for our bank roles were not granular enough. We needed specific people to do particular actions, and we often had to give some people way too much access for them to be able to do what they needed in Prisma. They couldn't do their jobs if they didn't have that level of access, so other people had to do that part for them. It would help to have more granular role-based access controls."
"In terms of securing cloud-native development at build time, a lot of improvement is needed. Currently, it's more a runtime solution than a build-time solution. For runtime, I would rate it at seven out of 10, but for build-time there is a lot of work to be done."
"They need to make the settings more flexible to fit our internal policies about data. We didn't want developers to see some data, but we wanted them to have access to the console because it was going to help them... It was a pain to have to set up the access to some languages and some data."
"The technical support could use some improvement."
"There are sometimes mismatch in the control, the details and what you actually see on the transport note."
"It's not feature-rich."
"An area for improvement in VMware NSX is that it uses up more resources and is heavy on the network. What I'd like to see in the next release of the solution is more automation."
"There are always issues integrating with Cisco."
"Their licensing model should make it easier to purchase licenses."
"VMware NSX should be able to scale for different customers, even the big ones. Its scalability needs improvement. Stability for it should also be improved."
"Our technical team is always looking for the solutions that they work with to offer more convenient integrations."
Prisma Cloud is a comprehensive cloud-native security platform (CNSP) that provides security and compliance coverage for infrastructure, applications, data, and all cloud-native technology stacks throughout the development lifecycle. Prisma Cloud safeguards cloud operations across hybrid and multi-cloud environments, all from a single, unified solution, using a combination of cloud service provider APIs and a unified agent framework.
The move to the cloud has changed all aspects of the application development lifecycle, with security being foremost among them. Security and DevOps teams face a growing number of entities to secure as organizations adopt cloud-native approaches. Constantly changing environments challenge developers to build and deploy at a rapid pace without compromising on security. Prisma Cloud by Palo Alto Networks delivers complete security and compliance coverage across the development lifecycle on any cloud environment, enabling you to develop cloud-native applications with confidence.
Prisma Cloud Features
Prisma Cloud offers comprehensive security coverage in all areas of the cloud development lifecycle:
Benefits of Prisma Cloud
Reviews from Real Users
Prisma Cloud stands out among its competitors for a number of reasons. Two major ones are its integration capabilities, as well as its visibility, which makes it very easy for users to get a full picture of the cloud environment.
Alex J., an information security manager at Cobalt.io, writes, “Prisma Cloud has enabled us to take a very strong preventive approach to cloud security. One of the hardest things with cloud is getting visibility into workloads. With Prisma Cloud, you can go in and get that visibility, then set up policies to alert on risky behavior, e.g., if there are security groups or firewall ports open up. So, it is very helpful in preventing configuration errors in the cloud by having visibility. If there are issues, then you can find them and fix them.”
Luke L., a cloud security specialist for a financial services firm, writes, “You can also integrate with Amazon Managed Services. You can also get a snapshot in time, whether that's over a 24-hour period, seven days, or a month, to determine what the estate might look like at a certain point in time and generate reports from that for vulnerability management forums.”
VMware NSX is a full-stack network and security virtualization platform that enables the virtual cloud network. NSX provides a software-defined process for networking that expands throughout cloud frameworks, data centers, and application structures. Users can join and secure applications within their container and multi-cloud infrastructure and their data center. With robust automated provisioning, the platform offers dynamic flexibility and scalability without compromising on network speed or agility.
VMware NSX recreates the whole software network model so that users can create and deliver apps quickly and securely. Users can customize security policies and leverage IDS/IPS to block against lateral threats. These security policies can be managed throughout private and public clouds from one pane of glass, no matter where your applications run. By consolidating networking and security tasks into a unified platform, users can save up to one-third of their budget.
VMware NSX Use Cases
VMware NSX brings the operational model of a virtual machine to users’ data center networks and revolutionizes the foundations of network and security operations. There are a number of use cases, including:
Reviews from Real Users
Through a policy-driven approach, VMware NSX provides VMware technologies to assist with network and security visualization in a unified solution. Users particularly like the distributed firewall and the management dashboard.
Kolawole O., a systems engineer at a tech services company, writes, "NSX's stand-out function is the distributed firewall. The firewall system is just top-notch, and I haven't seen another solution like it."
A head of business development and partners management at a comms service provider notes, "I really like the management dashboard, the tailor-made assurance, the telemetry, and the ease of integration with all other solutions of VMware, such as vSphere."
Prisma Cloud by Palo Alto Networks is ranked 1st in Microsegmentation Software with 20 reviews while VMware NSX is ranked 2nd in Microsegmentation Software with 39 reviews. Prisma Cloud by Palo Alto Networks is rated 7.8, while VMware NSX is rated 7.8. The top reviewer of Prisma Cloud by Palo Alto Networks writes "Gives us security control gates and automated notifications in container orchestrator, but deploy is API-driven, not a built-in integration". On the other hand, the top reviewer of VMware NSX writes "Reliable and has a good console that requires less effort when using, but is resource-intensive and not as easy to scale". Prisma Cloud by Palo Alto Networks is most compared with Microsoft Defender for Cloud, Aqua Security, Check Point CloudGuard Posture Management, Snyk and Cisco Secure Workload, whereas VMware NSX is most compared with Cisco ACI, Nutanix Flow Network Security, Cisco Secure Workload, Guardicore Centra and Cisco SD-WAN. See our Prisma Cloud by Palo Alto Networks vs. VMware NSX report.
See our list of best Microsegmentation Software vendors.
We monitor all Microsegmentation Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.