Overview
ProductRatingMost Used ByProduct SummaryStarting Price
IBM Terraform
Score 8.8 out of 10
N/A
IBM Terraform (formerly Hashicorp Terraform) is a cloud infrastructure automation tool used to create, change, and improve production infrastructure, and it allows infrastructure to be expressed as code. It is available Open Source, and via Cloud and Self-Hosted editions.
$0
Microsoft Defender for Cloud
Score 8.5 out of 10
N/A
Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources.N/A
Perforce Puppet
Score 8.5 out of 10
N/A
Puppet Enteprise is an IT automation and configuration management solution that enables users to manage and automate infrastructure and complex workflows. The vendor states Puppet Enterprise combines both model‑based and task-based capabilities in a way that enables organizations to scale their multi-cloud infrastructure as their automation footprint grows, with more flexibility from both agent-based and agentless capabilities.N/A
Pricing
IBM TerraformMicrosoft Defender for CloudPerforce Puppet
Editions & Modules
Open Source
$0
Team & Governance
$20/user
per user/per month
Enterprise
Contact sales team
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
IBM TerraformMicrosoft Defender for CloudPerforce Puppet
Free Trial
NoYesNo
Free/Freemium Version
YesNoNo
Premium Consulting/Integration Services
NoNoNo
Entry-level Setup FeeNo setup feeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
IBM TerraformMicrosoft Defender for CloudPerforce Puppet
Considered Multiple Products
IBM Terraform
Chose IBM Terraform
AWS CloudFormation is better if you just want to stick with AWS because it's integration with AWS is better, provides auto-rollback in case of failures, and has GUI to manage and view the stacks built. Terraform is better when we want to stay cloud-agnostic. Terraform is better …
Chose IBM Terraform
- Terraform syntax is much easier to read and learn than Cloud Formation. - Terraform already supports AWS as well as several other cloud providers. - Terraform is backed by a great and supportive open-source community.
Microsoft Defender for Cloud

No answer on this topic

Perforce Puppet

No answer on this topic

Best Alternatives
IBM TerraformMicrosoft Defender for CloudPerforce Puppet
Small Businesses
HashiCorp Vagrant
HashiCorp Vagrant
Score 10.0 out of 10

No answers on this topic

HashiCorp Vagrant
HashiCorp Vagrant
Score 10.0 out of 10
Medium-sized Companies
Ansible
Ansible
Score 9.2 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Ansible
Ansible
Score 9.2 out of 10
Enterprises
Ansible
Ansible
Score 9.2 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Ansible
Ansible
Score 9.2 out of 10
All AlternativesView all alternativesView all alternativesView all alternatives
User Ratings
IBM TerraformMicrosoft Defender for CloudPerforce Puppet
Likelihood to Recommend
8.4
(30 ratings)
8.1
(56 ratings)
7.0
(12 ratings)
Likelihood to Renew
-
(0 ratings)
8.9
(4 ratings)
-
(0 ratings)
Usability
8.1
(5 ratings)
8.2
(2 ratings)
-
(0 ratings)
Performance
9.4
(3 ratings)
-
(0 ratings)
-
(0 ratings)
Support Rating
7.4
(5 ratings)
-
(0 ratings)
8.0
(1 ratings)
Ease of integration
9.2
(3 ratings)
-
(0 ratings)
-
(0 ratings)
User Testimonials
IBM TerraformMicrosoft Defender for CloudPerforce Puppet
Likelihood to Recommend
IBM
Anything that needs to be repeated en masse. Terraform is great at taking a template and have it be repeated across your estate. You can dynamically change the assets they're generating depending on certain variables. Which means though templated assets will all be similar, they're allowed to have unique properties about them. For example flattening JSON into tabular data and ensuring the flattening code is unique to the file's schema.
Read full review
Microsoft
Microsoft is well-suited with its definitive cloud, and I also like its Microsoft Intune ID. The conditional policies are great with that, and they're really good and well situated, so you can't beat them at that conditional policy level. Less appropriate, as I said, some of these low-hanging fruit features, like being good in phishing campaigns, and then I feel like maybe doing better at their seam products. So we'll see how that goes.
Read full review
Perforce Software
Puppet is good enough to get the job done, you can use it to automate deployments and maintain files and configurations, if this is all you're looking for it's great. If you're looking for more control over your systems as a whole without having to write your own scripts or install multiple configuration management systems then Puppet is not what you're looking for.
Read full review
Pros
IBM
  • Terraform is cloud agnostic. Just select the suitable provider for the cloud and it will do the job.
  • Templating is possible to make the Terraform templates reusable.
  • Variables can be created to make the templates generic so that it can be reused for different environments or resources.
Read full review
Microsoft
  • I like that with Microsoft Defender for Cloud you can track your secure score to see how well you are doing with your security controls.
  • There are remediation steps for findings with the platform and some can be fix automatically with a few clicks.
  • There are recommendations for exactly what controls to put in place to ensure a more secure environment for Azure.
Read full review
Perforce Software
  • Provides a clear map of how a system is configured
  • Eases the creation of a system in a specific cluster as it is scripted in code
  • Simplifies configuration changes to a cluster or to every system such as rolling out vhost configurations, updating ldap roles, NFS mounts, etc
  • The syntax is very easy to read and carries a lot of fluidity once the language is learned.
Read full review
Cons
IBM
  • The language itself is a bit unusual and this makes it hard for new users to get onboarded into the codebase. While it's improving with later releases, basic concepts like "map an array of options into a set of configurations" or "apply this logic if a variable is specified" are possible but unnecessarily cumbersome.
  • The 'Terraform Plan' operation could be substantially more sophisticated. There are many situations where a Terraform file could never work but successfully passes the 'plan' phase only to fail during the 'apply' phase.
  • Environment migrations could be smoother. Renaming/refactoring files is a challenge because of the need to use 'Terraform mv' commands, etc.
Read full review
Microsoft
  • Granular permissions and role-based access management could improve security. This would enable organizations to control who has access to and can set specific features.
  • While it offers integration with various Microsoft services, expanding support for third-party cloud platforms and applications would enhance its versatility. Many organizations use multiple cloud providers, and broader compatibility would be advantageous.
  • The cost structure could be more transparent, especially for larger organizations with extensive cloud resources. Clearer cost breakdowns and predictions would help organizations budget more effectively.
Read full review
Perforce Software
  • The setup of Puppet is a nightmare compared to ansible. Anyone watching a youtube video can easily set up ansible with minimal IT knowledge. All one needs is the source IP addresses and we are good to go. Setting up Puppet is a more hands-on task and pushing the puppet agents to all the boxes is another issue. If the installation and setup were simplified like ansible that would attract a lot of people to this platform
  • The syntax of the code for Puppet is not as easy as ansible. Ansible simply follows a YAML format and it's like typing in normal English. Even complicated tasks can be written by just understanding YAML syntax. Perhaps Puppet needs to revisit the lanugage used and try to come up with a much simpler lanugage for writing code. This will make day-to-day usage easier.
Read full review
Likelihood to Renew
IBM
No answers on this topic
Microsoft
It is a great product that integrates nicely when running an Azure platform and even multi-cloud environment. Not looking for point-solutions but a suite that answers most requirements. It is very comfortable being able to use KQL, workbooks and automation that is native to the azure platform
Read full review
Perforce Software
No answers on this topic
Usability
IBM
I love Terraform and I think it has done some great things for people that are working to automate their provisioning processes and also for those that are in the process of moving to the cloud or managing cloud resources. There are some quirks to HCL that take a little bit of getting used to and give picking up Terraform a little bit of a learning curve, thus the rating
Read full review
Microsoft
My visibility is limited because I'm only doing very small pieces of what the overall org does. And also, we have limitations on what we're allowed to use. It's not like we get a new product as users or leadership level users, and everything is on, and we can just do whatever we want. We're very restricted in what we can use any tooling within the org because of the different levels of regulatory constraints we have, because of just the nature of who we are inherently. So that's why. I don't think it's necessarily the product. I think it's more or less of what we're able to do with the product.
Read full review
Perforce Software
No answers on this topic
Performance
IBM
Terraform's performance is quite amazing when it comes to deployment of resources in AWS. Of course, the deployment times depend on various parameters like the number of resources to deploy and different regions to deploy. Terraform cannot control that. The only minor drawback probably shows up when a terraform job is terminated mid way. Then in many cases, time-consuming manual cleanup is required.
Read full review
Microsoft
No answers on this topic
Perforce Software
No answers on this topic
Support Rating
IBM
I have yet to have an opportunity to reach out directly to HashiCorp for support on Terraform. However, I have spent a great deal of time considering their documentation as I use the tool. This opinion is based solely on that. I find the Terraform documentation to have great breadth but lacking in depth in many areas. I appreciate that all of the tool's resources have an entry in the docs but often the examples are lacking. Often, the examples provided are very basic and prompt additional exploration. Also, the links in the documentation often link back to the same page where one might expect to be linked to a different source with additional information.
Read full review
Microsoft
No answers on this topic
Perforce Software
Puppet has top class support. You can simply mail them with their query and they will respond to your query in a timely manner. We do have enterprise license for puppet. Also there is a vibrant community for puppet out there. So even if you dont purchase a premium support option you can simply google your queries and get answers
Read full review
Alternatives Considered
IBM
Terraform is the solid leader in the space. It allows you to do more then just provisioning within a pre-existing servers. It is more extensible and has more providers available than it competitors. It is also open source and more adopted by the community then some of the other solutions that are available in the market place.
Read full review
Microsoft
Microsoft Defender for Cloud is definitely the choice with the latest market trend and attacks that are currently happening. Microsoft has been able to safe guard a lot after the recent serious attacks happening globally in the digital world. There is a trust in this software and with the latest updates and machine learning capabilities, Microsoft Defender for Cloud should be the choice.
Read full review
Perforce Software
HPSA is a licensed product and incurs significant upfront investment costs due to COTS licensing. Puppet Data Center Automation has a significantly lower upfront investment and product documentation is more readily available. Chef is a very similar offering, however, at the time our decision was considered, the adoption of Chef vs. Puppet was significantly less in the community.
Read full review
Return on Investment
IBM
  • we are able to deploy our infrastructure in a couple of ours in an automated and repeatable way, before this could take weeks if the work was done manually and was a lot of error prone.
  • having the state file, you can see a diff of what things have changed manually out side of Terraform which is a huge plus
  • if state file gets corrupted, it is very hard to debug or restore it without an impact or spending hours ..
  • writing big scale code can be very challenging and hard to be efficient so it's usable by the whole team
Read full review
Microsoft
  • It simplifies security management and saves time. I'm not sure, but I'm very confident it saved me a couple of paychecks by centralizing the data I need to secure the cloud environment.
  • I also utilize the inventory overview to monitor my team's activities and verify they are following internal regulations, as well as cost overruns.
  • The recommendations can be utilized as a valuable instructional tool. I have the team explain why they are receiving them, why they are not following them, and what they are doing differently.
Read full review
Perforce Software
  • Cut deployment times down to around 1 hour from 4-5 hours.
  • Allows us to get a fully running system up from scratch in around 30 minutes.
  • Allows for a more clear view of what is required to get a host running.
Read full review
ScreenShots

IBM Terraform Screenshots

Screenshot of Terraform StateScreenshot of Terraform RunsScreenshot of Terraform VariablesScreenshot of Terraform WorkspacesScreenshot of Terraform Cost Estimation

Microsoft Defender for Cloud Screenshots

Screenshot of Remediation of critical issues in codeScreenshot of Cloud security benchmark mapped to industry FramworksScreenshot of Prioritization of critical risks with contextual threat analysisScreenshot of Workload protectionScreenshot of Unified DevOps VisibilityScreenshot of Visualizations to improve security posture proactively