Cisco Secure Workload vs. Palo Alto Networks Prisma Cloud

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cisco Secure Workload
Score 8.6 out of 10
N/A
The Cisco Secure Workload (formerly Tetration) platform offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows users to identify security incidents faster, contain lateral movement, and reduce the attack surface. Tetration's infrastructure-agnostic approach supports both on-premises and public cloud workloads.N/A
Palo Alto Networks Prisma Cloud
Score 7.7 out of 10
N/A
Prisma Cloud, from Palo Alto Networks (based on technology acquired with Evident.io, or the Evident Security Platform) is presented as a comprehensive Cloud Native Security Platform (CNSP) that delivers full lifecycle security and full stack protection for multi- and hybrid-cloud environments. The solution is dedicated to reducing attack surface and checking for vulnerabilities against known or custom signatures of threats and provides daily risk reports, and also detects what users were…N/A
Pricing
Cisco Secure WorkloadPalo Alto Networks Prisma Cloud
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco Secure WorkloadPalo Alto Networks Prisma Cloud
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsCisco Secure Workload software is licensed based on the number of workload equivalents or devices (endpoints) depending on the agent or sensor type being used. Telemetry data can be collected using agents, supported by other supported sensors or collectors, in any combination. Policy enforcement is enabled through agents with enforcement capability with infrastructure enforcement delivered through Cisco Secure Firewall Integration, Application Delivery Controllers (ADCs), and Security Groups in public cloud infrastructure or orchestrated via streamed Kafka policy. Workload is defined as a virtual machine, bare-metal server, or container host and includes server and desktop operating systems.
More Pricing Information
Community Pulse
Cisco Secure WorkloadPalo Alto Networks Prisma Cloud
Best Alternatives
Cisco Secure WorkloadPalo Alto Networks Prisma Cloud
Small Businesses

No answers on this topic

No answers on this topic

Medium-sized Companies

No answers on this topic

CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises

No answers on this topic

CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cisco Secure WorkloadPalo Alto Networks Prisma Cloud
Likelihood to Recommend
7.3
(1 ratings)
9.0
(6 ratings)
Usability
-
(0 ratings)
9.0
(1 ratings)
User Testimonials
Cisco Secure WorkloadPalo Alto Networks Prisma Cloud
Likelihood to Recommend
Cisco
The biggest challenge with this product is it crosses lines. You need somebody who can support servers as well as somebody who supports the infrastructure. And that's usually two different jobs, two different job titles, two different departments. So if you have a lot of silos within your organization and you have groups that don't work particularly well together between the server team and the network team, you will have problems developing and working on this product. If your server team and your network team work well together, then you'll have a lot fewer problems, it'll work pretty well. But if your server team and your network team are like oil and water don't bother.
Read full review
Palo Alto Networks
Finding specific Cloud Vendor specific Cloud resource configuration, tags, network information and etc. is fairly easy to do. Cloud alert capabilities are pretty good and with proper knowledge top notch alerts can be created. Only downside I can think of is ease of use.
Read full review
Pros
Cisco
No answers on this topic
Palo Alto Networks
  • Vulnerability assessment using Twistlock
  • Enhancing Security by scanning workload based on different Security standards and provide a compliance report
  • CF template integration with CI/CD pipeline to identify any security issue before workload are deployed
  • IAM/UEBA features additional to enchaining security posture
  • Auto remediation
  • Integration is simple and solution is supported on multiple cloud
  • Customized dashboard/queries
Read full review
Cons
Cisco
No answers on this topic
Palo Alto Networks
  • Real-time supports would be much appreciated. At the moment they have a third-party ticketing support tool, which can be replaced with real-time support, which can be provided to the user at the time of the issue.
  • The user should be provided with all the learning material by the Palo Alto team at the time of license purchase. This would save a lot of users' time, which is taken up by research and finding the correct documents from the website.
  • Themes can be introduced in the feature set, which would help the user customize the software as per their needs.
Read full review
Usability
Cisco
No answers on this topic
Palo Alto Networks
It is no doubts about their functionalities and top-notch security features. The Products do really well in their every feature and gives you complete visibility to your valuable Data at all. The Support for the Palo Alto Networks Prisma Cloud is also one of the plus point where you gain the confidence into the product.
Read full review
Alternatives Considered
Cisco
No answers on this topic
Palo Alto Networks
Prisma Cloud stacks well with other similar Palo Alto products. UI is beautiful, has decent documentation and some trainings as in other platforms.
Read full review
Return on Investment
Cisco
No answers on this topic
Palo Alto Networks
  • Help reduce the cost by assisting what resources can be removed according to usage.
  • Report the vulnerabilities.
  • Time saved in investigating the issue.
Read full review
ScreenShots

Cisco Secure Workload Screenshots

Screenshot of Secure Workload DashboardScreenshot of Secure Workload Policy CanvasScreenshot of Secure Workload Flow Logs and Telemetry